Surge in Cyberattacks on Cisco’s VPN System

Cisco has confirmed that a cross-site scripting (XSS) vulnerability in its Adaptive Security Appliance (ASA) software is actively being exploited in the wild. This vulnerability, registered as CVE-2014-2120, was first discovered in 2014 but remains a significant threat. Exploiting this…

Critical Vulnerabilities Discovered in IBM Security Verify Access

IBM (International Business Machines Corporation) is one of the world’s largest technology companies, founded in 1911 in the United States. The company provides advanced solutions in various fields, including IT infrastructure, artificial intelligence, cybersecurity, data analytics, and cloud technologies. IBM…

SQL Injection in Zabbix Allows Complete System Takeover

Zabbix, a widely used open-source monitoring tool for networks and systems, has recently been found to contain a critical security vulnerability. This flaw could enable attackers to gain complete control over affected systems. The vulnerability, identified as CVE-2024-42327, affects multiple…

WordPress Plugin Vulnerability Puts 200,000 Sites at Risk

On October 30, 2024, a critical vulnerability was discovered in the Anti-Spam by CleanTalk WordPress plugin, potentially affecting more than 200,000 active installations. This vulnerability allows attackers to install, activate, or delete plugins without authorization, which can lead to remote…

Critical Vulnerability in Drupal Core

Among content management systems (CMS) widely used around the world, a dangerous vulnerability has been identified in Drupal Core. Exploiting this vulnerability allows attackers to execute malicious code through users’ browsers. This vulnerability is mainly related to the Overlay module…

Critical Vulnerability Found in Oracle’s “Agile PLM” Framework

Oracle has issued an urgent security alert regarding a critical vulnerability in its Agile Product Lifecycle Management (PLM) framework, which is currently being actively exploited in real-world attacks. The vulnerability, identified as CVE-2024-21287, allows unauthenticated attackers to gain access to…

Skip to content