X

Vous n'êtes pas connecté

Maroc Maroc - THECYBERTHRONE.IN - A La Une - 31/12/2024 07:32

CVE-2024-21182: Oracle WebLogic Server Flaw Exploit Code Released

CVE-2024-21182 is a high-severity vulnerability identified in Oracle WebLogic Server. This security flaw affects specific versions of the software, namely Oracle WebLogic Server 12.2.1.4.0 and 14.1.1.0.0. The vulnerability allows remote attackers to exploit the system without requiring authentication, thereby gaining unauthorized access. Technical Details: The vulnerability is primarily associated with the T3 and IIOP (Internet […]

Articles similaires

Sorry! Image not available at this time

Critical Next.js Middleware Vulnerability Let Attackers Gain Unauthorized Access

itsecuritynews.info - 24/Mar 09:36

A critical security vulnerability (CVE-2025-29927) has been discovered in Next.js that allows attackers to completely bypass middleware-based security...

Sorry! Image not available at this time

CVE-2025-21377 NTLM Flaw Detailed out

thecyberthrone.in - 26/Mar 14:02

CVE-2025-21377 is a security vulnerability in Microsoft Windows that stems from weaknesses in the implementation of the NTLM (NT LAN Manager)...

Sorry! Image not available at this time

Splunk RCE Vulnerability Let Attackers Execute Arbitrary Code Via File Upload

itsecuritynews.info - 27/Mar 04:15

Splunk has released patches to address a high-severity Remote Code Execution (RCE) vulnerability affecting Splunk Enterprise and Splunk Cloud...

Sorry! Image not available at this time

Splunk RCE Vulnerability Let Attackers Execute Arbitrary Code Via File Upload

itsecuritynews.info - 27/Mar 04:15

Splunk has released patches to address a high-severity Remote Code Execution (RCE) vulnerability affecting Splunk Enterprise and Splunk Cloud...

Sorry! Image not available at this time

CVE-2025-24071 POC Exploit released for Microsoft Flaw

thecyberthrone.in - 21/Mar 03:32

The CVE-2025-24071 vulnerability is a high security flaw identified in Windows File Explorer that allows attackers to steal NTLM hashed credentials...

Sorry! Image not available at this time

Attackers can bypass middleware auth checks by exploiting critical Next.js flaw

securityaffairs.co - 24/Mar 11:22

A critical flaw in the Next.js React framework could be exploited to bypass authorization checks under certain conditions. Maintainers of Next.js...

Sorry! Image not available at this time

CVE-2025-23120 impacts Veeam Backup

thecyberthrone.in - 20/Mar 15:25

The CVE-2025-23120 vulnerability is a critical security flaw discovered in Veeam Backup & Replication, a widely used backup and disaster recovery...

Sorry! Image not available at this time

CVE-2025-23120 impacts Veeam Backup

thecyberthrone.in - 20/Mar 15:25

The CVE-2025-23120 vulnerability is a critical security flaw discovered in Veeam Backup & Replication, a widely used backup and disaster recovery...

Sorry! Image not available at this time

CVE-2025-2857 impacts Mozilla Firefox

thecyberthrone.in - 28/Mar 15:11

CVE-2025-2857 is a critical vulnerability affecting Mozilla Firefox on Windows systems, allowing attackers to escape the browser’s sandbox...

Sorry! Image not available at this time

CVE-2025-2857 impacts Mozilla Firefox

thecyberthrone.in - 28/Mar 15:11

CVE-2025-2857 is a critical vulnerability affecting Mozilla Firefox on Windows systems, allowing attackers to escape the browser’s sandbox...

Les derniers communiqués

  • Aucun élément