X

Vous n'êtes pas connecté

Maroc Maroc - BLEEPINGCOMPUTER.COM - A La Une - 30/12/2024 18:03

Hackers exploit Four-Faith router flaw to open reverse shells

Threat actors are exploiting a post-authentication remote command injection vulnerability in Four-Faith routers tracked as CVE-2024-12856 to open reverse shells back to the attackers. [...]

Articles similaires

Sorry! Image not available at this time

Google Chrome Zero-day Vulnerability Exploited by Hackers in the Wild

itsecuritynews.info - 26/Mar 07:04

Google has released an urgent security update for its Chrome browser after cybersecurity researchers at Kaspersky discovered a zero-day vulnerability...

Sorry! Image not available at this time

Google Chrome Zero-day Vulnerability Exploited by Hackers in the Wild

itsecuritynews.info - 26/Mar 07:04

Google has released an urgent security update for its Chrome browser after cybersecurity researchers at Kaspersky discovered a zero-day vulnerability...

Sorry! Image not available at this time

Attackers can bypass middleware auth checks by exploiting critical Next.js flaw

securityaffairs.co - 24/Mar 11:22

A critical flaw in the Next.js React framework could be exploited to bypass authorization checks under certain conditions. Maintainers of Next.js...

Sorry! Image not available at this time

Veeam fixed critical Backup & Replication flaw CVE-2025-23120

securityaffairs.co - 20/Mar 19:26

Veeam released security patches for a critical Backup & Replication vulnerability that could let attackers remotely execute code. Veeam addressed...

Sorry! Image not available at this time

Critical Next.js Middleware Vulnerability Let Attackers Gain Unauthorized Access

itsecuritynews.info - 24/Mar 09:36

A critical security vulnerability (CVE-2025-29927) has been discovered in Next.js that allows attackers to completely bypass middleware-based security...

Sorry! Image not available at this time

Critical flaw in Next.js lets hackers bypass authorization

bleepingcomputer.com - 24/Mar 16:15

A critical severity vulnerability has been discovered in the Next.js open-source web development framework, potentially allowing attackers to bypass...

Sorry! Image not available at this time

Critical flaw in Next.js lets hackers bypass authorization

bleepingcomputer.com - 24/Mar 16:15

A critical severity vulnerability has been discovered in the Next.js open-source web development framework, potentially allowing attackers to bypass...

Sorry! Image not available at this time

CVE-2025-24071 POC Exploit released for Microsoft Flaw

thecyberthrone.in - 21/Mar 03:32

The CVE-2025-24071 vulnerability is a high security flaw identified in Windows File Explorer that allows attackers to steal NTLM hashed credentials...

Sorry! Image not available at this time

CVE-2025-21377 NTLM Flaw Detailed out

thecyberthrone.in - 26/Mar 14:02

CVE-2025-21377 is a security vulnerability in Microsoft Windows that stems from weaknesses in the implementation of the NTLM (NT LAN Manager)...

Sorry! Image not available at this time

CVE-2025-56325 impacts Apache Pinot

thecyberthrone.in - 28/Mar 10:58

CVE-2025-56325 is a critical vulnerability affecting Apache Pinot, a real-time distributed OLAP datastore designed for low-latency analytics. This...