Check out the latest Global Security Blogs

June 22, 2022

High-Severity RCE Vulnerability Reported in Popular Fastjson Library

Cybersecurity scientists have actually described a lately covered high-severity protection susceptability in the preferred Fastjson collection that might be possibly made use of to attain remote […]
May 19, 2022

High-Severity Bug Reported in Google’s OAuth Client Library for Java

Google last month attended to a high-severity problem in its OAuth customer collection for Java that might be abused by a harmful star with a jeopardized […]
May 11, 2022

Critical Gems Takeover Bug Reported in RubyGems Package Manager

The maintainers of the RubyGems plan supervisor have actually attended to an important safety imperfection that can have been abused to get rid of treasures and […]
May 10, 2022

Critical RCE Bug Reported in dotCMS Content Management Software

A pre-authenticated remote code implementation susceptability has actually been revealed in dotCMS, an open-source material monitoring system composed in Java as well as “used by over […]
April 22, 2022

Hackers Exploiting Recently Reported Windows Print Spooler Vulnerability in the Wild

A safety and security imperfection in the Windows Publish Spooler element that was covered by Microsoft in February is being proactively manipulated in the wild, the […]
April 18, 2022

Critical RCE Flaw Reported in WordPress Elementor Website Builder Plugin

Elementor, a WordPress site building contractor plugin with over 5 million energetic installments, has actually been located to be susceptible to a confirmed remote code implementation […]
April 16, 2022

Critical Auth Bypass Bug Reported in Cisco Wireless LAN Controller Software

Cisco has actually launched spots to consist of an essential protection susceptability influencing the Wireless LAN Controller (WLC) that can be abused by an unauthenticated, remote […]
April 16, 2022

Critical LFI Vulnerability Reported in Hashnode Blogging Platform

Scientists have actually divulged a formerly undocumented regional documents addition (LFI) susceptability in Hashnode, a developer-oriented blog writing system, that can be abused to gain access […]