PHP Command injection Vulnerabilities
Multiple critical vulnerabilities have been identified in PHP, posing significant risks to the security and stability of web applications and servers. These...
Multiple critical vulnerabilities have been identified in PHP, posing significant risks to the security and stability of web applications and servers. These...
Cisco has issued a global warning concerning a significant uptick in brute-force attacks aimed at various devices, notably targeting Virtual Private Network...
New research in cybersecurity reveals a vulnerability named LeakyCLI, indicating that certain command-line interface (CLI) tools in Amazon...
A critical vulnerability in PuTTY has prompted developers to release an urgent update to address the potential recovery of secret keys. PuTTY, a widely...
Cybersecurity researchers have unveiled a pervasive exploitation of a severe vulnerability within TP-Link Archer routers, identified as CVE-2023-1389...
Ivanti has swiftly addressed 27 vulnerabilities within its Avalanche mobile device management (MDM) solution, with two critical heap overflows...
Emerging from the shadows of the cyber landscape, a previously undocumented backdoor named Kapeka has surfaced in cyber attacks primarily...
Firefox 125, the latest release from Mozilla, addresses 15 vulnerabilities, nine of which are classified as high-severity bugs posing significant...
Google has released Chrome 124 in its stable channel, addressing a total of 22 security vulnerabilities. This latest update includes fixes for 13 bugs...
Kaspersky researchers have uncovered a concerning trend in the cyber landscape: hackers are customizing LockBit 3.0 ransomware to launch...
© 2025 | CyberMaterial | All rights reserved