A critical security vulnerability (CVE-2025-29927) has been discovered in Next.js that allows attackers to completely bypass middleware-based security...
Vous n'êtes pas connecté
CVE-2024-21182 is a high-severity vulnerability identified in Oracle WebLogic Server. This security flaw affects specific versions of the software, namely Oracle WebLogic Server 12.2.1.4.0 and 14.1.1.0.0. The vulnerability allows remote attackers to exploit the system without requiring authentication, thereby gaining unauthorized access. Technical Details: The vulnerability is primarily associated with the T3 and IIOP (Internet […]
A critical security vulnerability (CVE-2025-29927) has been discovered in Next.js that allows attackers to completely bypass middleware-based security...
CVE-2025-21377 is a security vulnerability in Microsoft Windows that stems from weaknesses in the implementation of the NTLM (NT LAN Manager)...
Splunk has released patches to address a high-severity Remote Code Execution (RCE) vulnerability affecting Splunk Enterprise and Splunk Cloud...
Splunk has released patches to address a high-severity Remote Code Execution (RCE) vulnerability affecting Splunk Enterprise and Splunk Cloud...
The CVE-2025-24071 vulnerability is a high security flaw identified in Windows File Explorer that allows attackers to steal NTLM hashed credentials...
A critical flaw in the Next.js React framework could be exploited to bypass authorization checks under certain conditions. Maintainers of Next.js...
The CVE-2025-23120 vulnerability is a critical security flaw discovered in Veeam Backup & Replication, a widely used backup and disaster recovery...
The CVE-2025-23120 vulnerability is a critical security flaw discovered in Veeam Backup & Replication, a widely used backup and disaster recovery...
CVE-2025-2857 is a critical vulnerability affecting Mozilla Firefox on Windows systems, allowing attackers to escape the browser’s sandbox...
CVE-2025-2857 is a critical vulnerability affecting Mozilla Firefox on Windows systems, allowing attackers to escape the browser’s sandbox...