Vulnerability

PoC Exploit Released for Critical nftables Vulnerability in Linux Kernel

A critical vulnerability (CVE-2024-26809) in the Linux kernel’s netfilter subsystem allows local attackers to escalate privileges via a double-free flaw in the nft_set_pipapo module....

Chinese Hackers Leverage SAP RCE Vulnerability to Install Supershell Backdoors

A critical deserialization vulnerability, CVE-2025-31324, affecting SAP NetWeaver Visual Composer 7.x, is being actively exploited in the wild, according to recent research by Forescout....

Hackers Exploit Host Header Vulnerabilities to Breach Web Applications

Host header injection is an increasingly critical web application vulnerability that arises when a server or application trusts the HTTP Host header without proper...

AI-Generated Fake Vulnerability Submissions Overrunning Bug Bounty Platforms

A recent incident involving the curl open source project has put the spotlight on a growing threat to bug bounty platforms: automatically generated, fraudulent...

Cisco IOS XE NETCONF Flaw Enables Remote Root Access

Cisco has disclosed three critical privilege escalation vulnerabilities in its IOS XE Software, allowing authenticated attackers to gain root access on affected devices. Tracked...

Popular

Subscribe

spot_imgspot_img