Monday, April 27, 2026
HomeVulnerabilities

Vulnerabilities

Rockwell Arena Simulation Vulnerabilities Enable Remote Attacks

Rockwell Automation has disclosed three high-severity vulnerabilities affecting its Arena Simulation software that could allow attackers to execute arbitrary code on targeted systems. The vulnerabilities, discovered by security researcher Michael Heinzl and tracked as CVE-2025-7025, CVE-2025-7032, and CVE-2025-7033, affect all Arena Simulation versions 16.20.09...

Millions of Dell PCs at Risk from Broadcom Chip Vulnerabilities Allowing Device Takeover

A critical vulnerabilities affecting over 100 Dell laptop models that could allow attackers to completely compromise systems and steal sensitive data, including passwords and biometric information. The vulnerabilities, collectively dubbed "ReVault" by Cisco Talos researchers, pose a significant threat to millions of business-critical devices...

SharePoint Deserialization Vulnerabilities Lets Hackers Steal IIS Machine Keys

Security researchers have revealed alarming details about how attackers are exploiting recently disclosed Microsoft SharePoint vulnerabilities to steal critical IIS Machine Keys, potentially giving hackers persistent backdoor access to compromised servers. The exploitation campaign, which began approximately 10 days ago, leverages CVE-2025-53770 and CVE-2025-53771...

MediaTek Chipset Vulnerabilities Enable Unauthorized Access

MediaTek has disclosed three critical security vulnerabilities in its August 2025 Product Security Bulletin that affect a wide range of chipsets used in smartphones, tablets, and IoT devices. These out-of-bounds write vulnerabilities enable local privilege escalation attacks, potentially compromising millions of devices worldwide. This high-severity...

Claude AI Vulnerabilities Allow Attackers to Run Unauthorized Commands

Two critical security vulnerabilities discovered in Anthropic's Claude Code have demonstrated how artificial intelligence tools designed to enhance developer productivity can be weaponized against themselves through sophisticated prompt engineering techniques. The vulnerabilities, tracked as CVE-2025-54794 and CVE-2025-54795, allowed attackers to bypass security restrictions and...

Government Agencies at Risk Due to Vulnerabilities in Partner Software

A critical vulnerabilities in Partner Software and Partner Web applications that pose significant risks to government agencies and municipal organizations across the United States. The vulnerabilities allow authenticated attackers to execute arbitrary code on compromised systems, potentially granting complete control over affected infrastructure. Partner Software,...