A critical security vulnerability (CVE-2025-29927) has been discovered in Next.js that allows attackers to completely bypass middleware-based security...
Vous n'êtes pas connecté
CVE-2024-21182 is a high-severity vulnerability identified in Oracle WebLogic Server. This security flaw affects specific versions of the software, namely Oracle WebLogic Server 12.2.1.4.0 and 14.1.1.0.0. The vulnerability allows remote attackers to exploit the system without requiring authentication, thereby gaining unauthorized access. Technical Details: The vulnerability is primarily associated with the T3 and IIOP (Internet […]
A critical security vulnerability (CVE-2025-29927) has been discovered in Next.js that allows attackers to completely bypass middleware-based security...
CVE-2025-21377 is a security vulnerability in Microsoft Windows that stems from weaknesses in the implementation of the NTLM (NT LAN Manager)...
Splunk has released patches to address a high-severity Remote Code Execution (RCE) vulnerability affecting Splunk Enterprise and Splunk Cloud...
Splunk has released patches to address a high-severity Remote Code Execution (RCE) vulnerability affecting Splunk Enterprise and Splunk Cloud...
A critical flaw in the Next.js React framework could be exploited to bypass authorization checks under certain conditions. Maintainers of Next.js...
CVE-2025-2857 is a critical vulnerability affecting Mozilla Firefox on Windows systems, allowing attackers to escape the browser’s sandbox...
CVE-2025-2857 is a critical vulnerability affecting Mozilla Firefox on Windows systems, allowing attackers to escape the browser’s sandbox...
Broadcom addressed a high-severity authentication bypass vulnerability, tracked as CVE-2025-22230, in VMware Tools for Windows. Broadcom released...
A critical severity vulnerability has been discovered in the Next.js open-source web development framework, potentially allowing attackers to bypass...
A critical severity vulnerability has been discovered in the Next.js open-source web development framework, potentially allowing attackers to bypass...