Category: Vulnerability

WebOS vulnerabilities

LG Smart TVs at Risk: Vulnerabilities Exposed

Researchers from Bitdefender have identified four vulnerabilities in several versions of WebOS, the operating system utilized in LG smart TVs. These flaws enable cybercriminals to gain unauthorized access and control over the devices at...

IPStorm Botnet

HTTP/2 Flaw Opens Door to DoS Attacks

A new vulnerability in the HTTP/2 protocol could be exploited to execute Denial of Service (DoS) attacks. This discovery, dubbed “HTTP/2 CONTINUATION Flood,” was made by cybersecurity researcher Bartek Nowotarski, who reported the issue...

Hidden Chrome Features

Urgent Chrome Fix: Patch Addresses Pwn2Own Exploit

Google has remedied a critical vulnerability in the Chrome browser, identified during the Pwn2Own 2024 competition in Vancouver. The vulnerability, CVE-2024-3159, stems from an out-of-bounds read error in the JavaScript V8 engine, potentially allowing...

CVE-2023-4911

Microsoft SharePoint Under Attack: CISA Issues Alert

The Cybersecurity and Infrastructure Security Agency (CISA) has expressed concern over the active exploitation of a vulnerability within the Microsoft SharePoint system, which allows malefactors to launch attacks via remote code execution (RCE). The...

UNC5174

UNC5174 Exploits Zero-Days: F5, Connectwise Hit

Mandiant specialists report that Chinese hackers, identified as UNC5174, are exploiting vulnerabilities in widely-used products to disseminate malicious software capable of installing additional backdoors on compromised Linux hosts. The attacks orchestrated by UNC5174 have...

CVE-2023-48788 PoC

Fortinet Vulnerability Exploited: Patch Now! PoC Published

Security researchers at Horizon3 have disclosed a Proof-of-Concept (PoC) exploit for a critical vulnerability in Fortinet’s FortiClient EMS, which is currently being actively exploited by hackers. The SQL injection vulnerability, CVE-2023-48788 (with a CVSS...