Tag: Vulnerability

New Zero-Day Flaw in Apache OFBiz ERP Allows Remote Code Execution

A new zero-day pre-authentication remote code execution vulnerability has been disclosed in the Apache OFBiz open-source enterprise resource planning (ERP) system that could...

Researchers Uncover Flaws in Windows Smart App Control and SmartScreen

Cybersecurity researchers have uncovered design weaknesses in Microsoft's Windows Smart App Control and SmartScreen that could enable threat actors to gain initial access to...

Critical Flaw in Rockwell Automation Devices Allows Unauthorized Access

A high-severity security bypass vulnerability has been disclosed in Rockwell Automation ControlLogix 1756 devices that could be exploited to execute common industrial protocol (CIP)...

Critical Flaw in Acronis Cyber Infrastructure Exploited in the Wild

Cybersecurity company Acronis is warning that a now-patched critical security flaw impacting its Cyber Infrastructure (ACI) product has been exploited in the wild. The vulnerability,...

VMware ESXi Flaw Exploited by Ransomware Groups for Admin Access

A recently patched security flaw impacting VMware ESXi hypervisors has been actively exploited by "several" ransomware groups to gain elevated permissions and deploy file-encrypting...

Hackers Exploit Fortinet Flaw, Deploy ScreenConnect, Metasploit in New Marketing campaign

Cybersecurity researchers have found a brand new marketing campaign that is exploiting a just lately disclosed safety flaw in Fortinet FortiClient EMS units to...

Important Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware

Menace actors are exploiting unpatched Atlassian servers to deploy a Linux variant of Cerber (aka C3RB3R) ransomware. The assaults leverage CVE-2023-22518 (CVSS rating: 9.1), a...

Cisco Warns of International Surge in Brute-Power Assaults Focusing on VPN...

Cisco is warning a couple of international surge in brute-force assaults focusing on numerous units, together with Digital Non-public Community (VPN) companies, net utility...

AWS, Google, and Azure CLI Instruments May Leak Credentials in Construct...

New cybersecurity analysis has discovered that command-line interface (CLI) instruments from Amazon Internet Providers (AWS) and Google Cloud can expose delicate credentials in construct...

Extensively-Used PuTTY SSH Shopper Discovered Weak to Key Restoration Assault

The maintainers of the PuTTY Safe Shell (SSH) and Telnet consumer are alerting customers of a important vulnerability impacting variations from 0.68 by 0.80...

Most popular