Vulnerabilities

SAP Security Patch Day Fixes 15 Vulnerabilities, Including 3 Critical Injection Vulnerabilities

On August 12, 2025, SAP released its monthly Security Patch Day addressing 15 new vulnerabilities across multiple SAP products, marking…

9 months ago

SSHamble: New Open-Source Tool Exposes SSH Protocol Vulnerabilities

SSHamble, a powerful open-source tool designed to identify and exploit vulnerabilities in SSH implementations, during his presentation at DEFCON 33…

9 months ago

Xerox FreeFlow Vulnerabilities Enable SSRF and Remote Code Execution Attacks

Xerox Corporation has released a critical security bulletin addressing two high-severity vulnerabilities in its FreeFlow Core v8.0.4 software that could…

9 months ago

Critical Security Vulnerabilities Discovered in WWBN AVideo, MedDream, and Eclipse ThreadX Module

Cisco Talos’ Vulnerability Discovery & Research team has disclosed a total of twelve security vulnerabilities affecting three distinct software products.…

9 months ago

CISA Issues 10 ICS Advisories on Critical Vulnerabilities and Exploitation Risks

The Cybersecurity and Infrastructure Security Agency (CISA) on August 7, 2025, published ten new Industrial Control Systems (ICS) advisories to…

9 months ago

Rockwell Arena Simulation Vulnerabilities Enable Remote Attacks

Rockwell Automation has disclosed three high-severity vulnerabilities affecting its Arena Simulation software that could allow attackers to execute arbitrary code…

9 months ago

Millions of Dell PCs at Risk from Broadcom Chip Vulnerabilities Allowing Device Takeover

A critical vulnerabilities affecting over 100 Dell laptop models that could allow attackers to completely compromise systems and steal sensitive…

9 months ago

SharePoint Deserialization Vulnerabilities Lets Hackers Steal IIS Machine Keys

Security researchers have revealed alarming details about how attackers are exploiting recently disclosed Microsoft SharePoint vulnerabilities to steal critical IIS…

9 months ago

MediaTek Chipset Vulnerabilities Enable Unauthorized Access

MediaTek has disclosed three critical security vulnerabilities in its August 2025 Product Security Bulletin that affect a wide range of…

9 months ago

Claude AI Vulnerabilities Allow Attackers to Run Unauthorized Commands

Two critical security vulnerabilities discovered in Anthropic's Claude Code have demonstrated how artificial intelligence tools designed to enhance developer productivity…

9 months ago