The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability in the popular Notepad++ text editor to its Known...
Vous n'êtes pas connecté
Maroc - THECYBERTHRONE.IN - A La Une - 25/01/2025 01:25
Overview of PANdora’s Box PANdora’s Box is a term used to describe a series of critical vulnerabilities identified in various models of Palo Alto Networks’ firewalls. These vulnerabilities have significant security implications, potentially allowing attackers to bypass security features, execute arbitrary code, and compromise the affected systems. The discovery was made by security researchers from […]
The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability in the popular Notepad++ text editor to its Known...
CVE-2026-2441 is a high-severity use-after-free vulnerability in Google Chrome’s CSS processing component. It affects versions prior to...
CISA warns Honeywell CCTVs are affected by a critical auth bypass flaw (CVE-2026-1670) allowing unauthorized access or account hijacking. The U.S....
Researchers from ETH Zurich have uncovered 25 serious vulnerabilities in three leading cloud-based password managers: Bitwarden, LastPass, and...
Researchers from ETH Zurich have uncovered 25 serious vulnerabilities in three leading cloud-based password managers: Bitwarden, LastPass, and...
CVE-2026-21643 is a critical SQL injection vulnerability affecting Fortinet FortiClientEMS version 7.4.4, enabling unauthenticated attackers to...
A critical authentication bypass vulnerability in the better-auth API keys plugin allows unauthenticated attackers to mint privileged API keys for...
A critical authentication bypass vulnerability in the better-auth API keys plugin allows unauthenticated attackers to mint privileged API keys for...
View CSAF Summary Multiple Siemens products are affected by two local privilege escalation vulnerabilities which could allow an low privileged...
View CSAF Summary Multiple Siemens products are affected by two local privilege escalation vulnerabilities which could allow an low privileged...