Tag: Exploit

OAuth2 Session Hijack Vulnerability: Details Uncovered

A sophisticated exploit targeting Google's OAuth2 authentication system was uncovered by Prisma…

Stephanie Adlam Stephanie Adlam

Microsoft Disables MSIX App Installer Protocol

Microsoft reportedly disabled MSIX installer protocol in Windows, due to its exploitation…

Stephanie Adlam Stephanie Adlam

WordPress Critical Vulnerability Fixed in Patch 6.4.2

WordPress has rolled out version 6.4.2, addressing a critical remote code execution…

Stephanie Adlam Stephanie Adlam

BLUFFS Bluetooth Vulnerability Threatens Billions of Devices

Eurecom has uncovered a series of exploits named "BLUFFS", posing a significant…

Stephanie Adlam Stephanie Adlam

Zimbra Vulnerability Exploited in the Wild

Google TAG's recent discovery reveals a 0-day exploit, CVE-2023-37580, targeting Zimbra Collaboration.…

Stephanie Adlam Stephanie Adlam

VMWare Cloud Director Vulnerability Circumvents Authentication

VMware, a key player in virtualization services, is reaching out to users…

Stephanie Adlam Stephanie Adlam

New F5 BIG-IP Vulnerabilities Exploited In The Wild

Two new vulnerabilities in F5 BIG-IP reportedly allow for remote code execution…

Stephanie Adlam Stephanie Adlam

New Confluence Vulnerability Leads to Unauthorised Access

Another vulnerability in the flagship product of Atlassian corporation, Confluence, allows hackers…

Stephanie Adlam Stephanie Adlam

Can Zero-Day Attacks Be Prevented With Patches?

In recent years, zero-day exploits and attacks have become prominent emerging threats.…

Stephanie Adlam Stephanie Adlam

GameOver(lay) Vulnerabilities Endanger 40% of Ubuntu Users

Cloud security researchers have discovered two easily exploitable privilege escalation vulnerabilities called…

Stephanie Adlam Stephanie Adlam

Vulnerability in WordPress Plugin WooCommerce Payments Is Actively Used to Hack Sites

Hackers use a vulnerability in the widely used WooCommerce Payments WordPress plugin…

Vladimir Krasnogolovy Vladimir Krasnogolovy

Microsoft “nOAuth” is Vulnerable to Simple Email Spoofing

In June, researchers revealed a vulnerability in Azure Active Directory and third-party…

Stephanie Adlam Stephanie Adlam