X

Vous n'êtes pas connecté

Maroc Maroc - BLEEPINGCOMPUTER.COM - A La Une - 04/Jan 22:59

Nuclei flaw lets malicious templates bypass signature verification

A now-fixed vulnerability in the open-source vulnerability scanner Nuclei could potentially allow attackers to bypass signature verification while sneaking malicious code into templates that execute on local systems. [...]

Articles similaires

Sorry! Image not available at this time

Critical flaw in Next.js lets hackers bypass authorization

bleepingcomputer.com - 24/Mar 16:15

A critical severity vulnerability has been discovered in the Next.js open-source web development framework, potentially allowing attackers to bypass...

Sorry! Image not available at this time

Critical flaw in Next.js lets hackers bypass authorization

bleepingcomputer.com - 24/Mar 16:15

A critical severity vulnerability has been discovered in the Next.js open-source web development framework, potentially allowing attackers to bypass...

Sorry! Image not available at this time

Splunk RCE Vulnerability Let Attackers Execute Arbitrary Code Via File Upload

itsecuritynews.info - 27/Mar 04:15

Splunk has released patches to address a high-severity Remote Code Execution (RCE) vulnerability affecting Splunk Enterprise and Splunk Cloud...

Sorry! Image not available at this time

Splunk RCE Vulnerability Let Attackers Execute Arbitrary Code Via File Upload

itsecuritynews.info - 27/Mar 04:15

Splunk has released patches to address a high-severity Remote Code Execution (RCE) vulnerability affecting Splunk Enterprise and Splunk Cloud...

Sorry! Image not available at this time

Google Chrome was affected by CVE-2025-2783

thecyberthrone.in - 27/Mar 03:24

CVE-2025-2783 is a zero-day vulnerability affecting Google Chrome, uncovered in a targeted cyber-espionage campaign known as Operation ForumTroll....

Sorry! Image not available at this time

Google Chrome was affected by CVE-2025-2783

thecyberthrone.in - 27/Mar 03:24

CVE-2025-2783 is a zero-day vulnerability affecting Google Chrome, uncovered in a targeted cyber-espionage campaign known as Operation ForumTroll....

Sorry! Image not available at this time

CVE-2025-2857 impacts Mozilla Firefox

thecyberthrone.in - 28/Mar 15:11

CVE-2025-2857 is a critical vulnerability affecting Mozilla Firefox on Windows systems, allowing attackers to escape the browser’s sandbox...

Sorry! Image not available at this time

CVE-2025-2857 impacts Mozilla Firefox

thecyberthrone.in - 28/Mar 15:11

CVE-2025-2857 is a critical vulnerability affecting Mozilla Firefox on Windows systems, allowing attackers to escape the browser’s sandbox...

Sorry! Image not available at this time

Veeam fixed critical Backup & Replication flaw CVE-2025-23120

securityaffairs.co - 20/Mar 19:26

Veeam released security patches for a critical Backup & Replication vulnerability that could let attackers remotely execute code. Veeam addressed...

Sorry! Image not available at this time

WordPress security plugin WP Ghost vulnerable to remote code execution bug

bleepingcomputer.com - 20/Mar 14:58

Popular WordPress security plugin WP Ghost is vulnerable to a critical severity flaw that could allow unauthenticated attackers to remotely execute...