The CVE-2024-45622 vulnerability affects ASIS (also known as Aplikasi Sistem Sekolah using CodeIgniter 3) in versions 3.0.0 to 3.2.0. This vulnerability allows attackers to inject
Category: Vulnerabilities
Posts related with Vulnerabilities
CVE-2024-32896 is a privilege escalation vulnerability affecting Android devices, specifically Pixel devices. This vulnerability is due to a logical error in the code, which allows
CVE-2024-4610 is a “Use After Free” vulnerability in the GPU kernel drivers of Arm Ltd. Through this vulnerability, an unprivileged local user can perform incorrect
CVE-2024-4577 is a critical argument injection vulnerability in PHP that can be exploited to achieve remote code execution (RCE). According to researchers from DEVCORE, this
CVE-2017-3506 is a vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (specifically, the Web Services subcomponent). The affected versions include 10.3.6.0, 12.1.3.0, 12.2.1.0, 12.2.1.1, and 12.2.1.2. This vulnerability is difficult to exploit and allows
CVE-2024-1086 is a critical vulnerability affecting Linux operating systems. It allows local users to execute code with elevated privileges, potentially granting them control over the
Check Point is warning of a zero-day vulnerability (CVE-2024-24919) in its Network Security gateway products that threat actors have exploited in the wild. CVE-2024-24919 CVE-2024-24919
Recently, a critical vulnerability, CVE-2023-45590, has emerged, impacting Fortinet FortiClientLinux. Let’s delve into the details and explore how to mitigate this threat effectively. CVE-2023-45590 –
CVE-2024-2201 is a vulnerability that affects computer systems and has drawn attention from security authorities. Security experts have revealed what they claim to be the inaugural
Attackers are actively scanning and exploiting a pair of security flaws (CVE-2024-3272 and CVE-2024-3273) that are said to affect as many as 92,000 internet-exposed D-Link network-attached storage