Everything there is to find on tag: vulnerabilities.

Outdated WordPress versions and plugins abused for large-scale malware attack
Hackers are currently abusing outdated WordPress versions and plugins to trick visitors to thousands of websi...
Everything there is to find on tag: vulnerabilities.
Hackers are currently abusing outdated WordPress versions and plugins to trick visitors to thousands of websi...
The ChatGPT crawler vulnerability in the ChatGPT API enables DDoS attacks on websites. German security resear...
On the first Patch Tuesday of 2025, Microsoft addressed three under-attack privilege escalation vulnerabiliti...
At least thirteen vulnerabilities have been exposed by MediaTek in its components. One of them is described a...
A recent QNAP firmware update for NAS systems has prevented users from accessing their devices. The NAS vendo...
PAN-OS Firewalls from Palo Alto Networks have been hit by two zero-day vulnerabilities. They are now being ac...
Google's Vertex AI platform had two serious vulnerabilities. These allowed it to access customers' LLMs and r...
The open-source CUPS printing system in Linux is vulnerable to remote code execution (RCE), which allows hack...
A critical authentication vulnerability allows hackers to remotely invade and completely abuse the SAP Busine...