Currently trending CVE - hypeScore: 1 - Improper signature verification in AMD CPU ROM microcode patch loader may allow an attacker with local administrator privilege to load malicious CPU microcode resulting in loss of confidentiality and integrity of a confidential guest running under AMD SEV-SNP.
Currently trending CVE - hypeScore: 1 - Authentication bypass by spoofing in Azure AI Face Service allows an authorized attacker to elevate privileges over a network.
Currently trending CVE - hypeScore: 6 - Next.js is a React framework for building full-stack web applications. By sending a crafted HTTP request, it is possible to poison the cache of a non-dynamic server-side rendered route in the pages router (this does not affect the app router). When this crafted request is sent it
A vulnerability has been found in TinTin WinTin++ 1.97.9 and classified as very critical. Affected by this vulnerability is the function add_line_buffer. The manipulation leads to memory corruption.
This vulnerability is known as CVE-2008-0671. The attack can be launched remotely. Furthermore, there is an exploit available.
This blog post details our analysis of an SEO manipulation campaign targeting Asia. We also share recommendations that can help enterprises proactively secure their environment.
On Thursday, February 6, 2025, we experienced an outage with our object storage service (R2) and products that rely on it. Here's what happened and what we're doing to fix this going forward.
A vulnerability classified as critical has been found in Netentsec NS-ASG Application Security Gateway 6.3. This affects an unknown part of the file /admin/config_ISCGroupNoCache.php. The manipulation of the argument GroupId leads to sql injection.
This vulnerability is uniquely identified as CVE-2024-3457. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical was found in Netentsec NS-ASG Application Security Gateway 6.3. This vulnerability affects unknown code of the file /admin/add_ikev2.php. The manipulation of the argument TunnelId leads to sql injection.
This vulnerability was named CVE-2024-3458. The attack can be initiated remotely. Furthermore, there is an exploit available.