Vulnerability

Cacti Command Injection Flaw Enables Remote Execution Of Malicious Code

A serious command injection vulnerability in Cacti, a popular open-source network monitoring tool, allows authenticated attackers to execute arbitrary commands…

4 months ago

Prompt Injection Vulnerability In GitHub Actions Affects Multiple Fortune 500 Companies

Security firm Aikido Security uncovered PromptPwnd, a flaw in GitHub Actions and GitLab CI/CD pipelines linked to AI agents. This…

5 months ago

Novel SVG-Based Clickjacking Method Allows Interactive User Manipulation

Security researcher Lyra Rebane has uncovered a powerful new clickjacking technique using SVG filters. This method, dubbed "SVG clickjacking," overlays…

5 months ago

CISA Reports Active Exploitation Of OpenPLC and ScadaBR File Upload Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2021-26828 to its Known Exploited Vulnerabilities (KEV) catalog on December 3,…

5 months ago

Chaining Synology BeeStation Flaws To Gain Root Access via Exploited Task Scheduler

Security researchers chained three vulnerabilities in Synology BeeStation devices to enable unauthenticated attackers to remotely gain root access. Demonstrated initially…

5 months ago

Zero-Day Vulnerabilities In PickleScan Allow Arbitrary Code Execution Through Malicious PyTorch Models

Security researchers at JFrog uncovered three critical zero-day flaws in PickleScan, a key tool for detecting malware in Python pickle-based…

5 months ago

Kohler’s Encrypted Smart Toilet Camera Lacks True End-to-End Encryption

Kohler Health launched Dekoda in October 2025, a $600 device (plus a monthly subscription) that clips onto your toilet rim.…

5 months ago

K7 Antivirus Vulnerability Lets Attackers Gain SYSTEM-level Privileges

Security researcher Lucas Laise from Quarkslab discovered a serious privilege escalation vulnerability in K7 Ultimate Security, an antivirus software from…

5 months ago

Critical Vulnerability In React and Next.js Allows Remote Attackers To Execute Malicious Code

A critical remote code execution flaw, tracked as CVE-2025-55182 and dubbed React2Shell, affects React Server Components in the React 19…

5 months ago

Hackers Exploit Microsoft Windows LNK Vulnerability In The Wild As A 0-Day Attack

Attackers have abused CVE-2025-9491, a flaw in how Windows displays shortcut file properties, since 2017, to hide malicious commands in…

5 months ago