Explore

vulnerability ×
  • screenshot

    LXer: High Priority PuTTY Vulnerability Threatens Server Access Security

    Published at LXer: PuTTY's security flaw (CVE2024-31497) in ECDSA P521 keys risks private data exposure. Urgent...

  • screenshot

    Critical Rust flaw enables Windows command injection attacks

    Link URL: https://www.bleepingcomputer.com/news/security/critical-rust-flaw-enables-windows-command-injection-attacks/ Comments URL: https://tildes.net/~comp/1fjh/critical_vulnerability_in_rusts_command_library_allows_for_command_injection_when_using_its_api_to Votes: 15 Comments: 4

  • screenshot

    LXer: After a Recent SSH Vulnerability, Systemd Reduces Dependencies

    Published at LXer: Recent sshd/xz backdoor (CVE-2024-3094 ) reveals risks in systemd's libsystemd, sparking debate on...

  • screenshot

    Russian Military Used Hacked Cameras in Missile Strike on Capital

    Russia hacked video surveillance cameras as part of a massive air attack on Kyiv, according to...

  • screenshot

    Hackers exploit Aiohttp bug to find vulnerable networks

    The ransomware actor 'ShadowSyndicate' was observed scanning for servers vulnerable to CVE-2024-23334, a directory traversal vulnerability...

  • screenshot

    Google paid $10M in bug bounty rewards last year

    Google awarded $10 million to 632 researchers from 68 countries in 2023 for finding and responsibly...

  • screenshot

    QNAP warns of critical auth bypass flaw in its NAS devices

    QNAP warns of vulnerabilities in its NAS software products, including QTS, QuTS hero, QuTScloud, and myQNAPcloud,...

  • screenshot

    White House urges devs to switch to memory-safe programming languages

    The White House Office of the National Cyber Director (ONCD) urged tech companies today to switch...

  • screenshot

    LXer: Shim vulnerability exposes most Linux systems to attack

    Published at LXer: This low-level software is the glue that enables Linux to run on Secure...

  • screenshot

    Leaky Vessels flaws allow hackers to escape Docker, runc containers

    Four vulnerabilities collectively called "Leaky Vessels" allow hackers to escape containers and access data on the...

  • screenshot

    iPhone Triangulation attack abused undocumented hardware feature

    The Operation Triangulation spyware attacks targeting iPhone devices since 2019 leveraged undocumented features in Apple chips...