Category vulnerabilities

RANsacked: Discovering 100+ Security Vulnerabilities in LTE and 5G Network Deployments

A recent investigation by a group of researchers has unveiled a significant security concern, revealing over 100 vulnerabilities within LTE and 5G network implementations. These vulnerabilities pose risks that could allow an attacker to disrupt cellular services and potentially gain unauthorized access to the core network. The study, conducted by…

Read MoreRANsacked: Discovering 100+ Security Vulnerabilities in LTE and 5G Network Deployments

Meta’s Llama Framework Vulnerability Exposes AI Systems to Remote Code Execution Threats

A significant security vulnerability has been identified within Meta’s Llama large language model (LLM) framework. This flaw, if effectively exploited, may enable an attacker to execute arbitrary code on the llama-stack inference server. Known as CVE-2024-50050, this vulnerability has received a CVSS score of 6.3 out of 10 from the…

Read MoreMeta’s Llama Framework Vulnerability Exposes AI Systems to Remote Code Execution Threats

GitHub Desktop Security Risks: Potential Credential Leaks from Malicious Remote URLs

Multiple Vulnerabilities Discovered in GitHub Desktop and Related Projects Recently, a series of critical security vulnerabilities have been uncovered in GitHub Desktop and various Git-related projects, potentially allowing unauthorized access to users’ Git credentials. These vulnerabilities, collectively referred to as “Clone2Leak,” pose significant risks to developers and organizations relying on…

Read MoreGitHub Desktop Security Risks: Potential Credential Leaks from Malicious Remote URLs

Apple Addresses Actively Exploited Zero-Day Vulnerability Impacting iPhones, Macs, and Other Devices

In a recent security announcement, Apple has disclosed the availability of critical software updates designed to rectify multiple security vulnerabilities, including a zero-day flaw that has reportedly been exploited in live attacks. This vulnerability, identified as CVE-2025-24085 with a CVSS score of 7.3, manifests as a use-after-free bug within the…

Read MoreApple Addresses Actively Exploited Zero-Day Vulnerability Impacting iPhones, Macs, and Other Devices

Active Exploitation of Zyxel CPE Devices Linked to Unpatched CVE-2024-40891 Vulnerability

Critical Vulnerability in Zyxel Devices Under Active Exploitation Cybersecurity experts have issued urgent warnings regarding a severe zero-day vulnerability affecting Zyxel CPE Series devices, with reports of ongoing exploitation attempts. Dubbed CVE-2024-40891, this command injection vulnerability enables attackers to execute arbitrary commands on compromised devices, potentially resulting in full system…

Read MoreActive Exploitation of Zyxel CPE Devices Linked to Unpatched CVE-2024-40891 Vulnerability

Broadcom Raises Alarm Over Critical SQL Injection Vulnerability in VMware Avi Load Balancer

Warning Issued Over Critical Vulnerability in VMware Avi Load Balancer Broadcom has announced a significant security vulnerability in VMware’s Avi Load Balancer, classified as high severity, which could potentially be exploited by malicious actors to gain unauthorized access to sensitive database information. The vulnerability is labeled CVE-2025-22217, with a CVSS…

Read MoreBroadcom Raises Alarm Over Critical SQL Injection Vulnerability in VMware Avi Load Balancer

Critical Cacti Vulnerability (CVE-2025-22604) Allows Remote Code Execution

A serious security vulnerability has been identified in the open-source network monitoring and fault management tool, Cacti. This flaw poses a risk of remote code execution for authenticated users on affected installations. The issue has been assigned the identifier CVE-2025-22604 and has garnered a high CVSS score of 9.1 out…

Read MoreCritical Cacti Vulnerability (CVE-2025-22604) Allows Remote Code Execution

New SLAP and FLOP Attacks Reveal Vulnerabilities in Apple M-Series Chips to Speculative Execution Exploits

A recent analysis from a team at Georgia Institute of Technology and Ruhr University Bochum has unveiled two significant side-channel attacks specifically targeting Apple silicon chips, notably affecting popular web browsers such as Safari and Google Chrome. The attacks have been aptly codenamed Data Speculation Attacks via Load Address Prediction…

Read MoreNew SLAP and FLOP Attacks Reveal Vulnerabilities in Apple M-Series Chips to Speculative Execution Exploits