Vulnerability News

Vulnerability Cyber Security News.

Vulnerability Archives – Cyber Security News Latest Hacker and Security News

  • PoC Exploit Released for HTTP File Server Remote Code Execution Vulnerability
    by Guru Baran on July 6, 2024 at 3:44 am

    A proof-of-concept (PoC) exploit has been released for a critical remote code execution vulnerability in the HTTP File Server (HFS) software, identified as CVE-2024-39943. This vulnerability affects HFS version 3 before 0.52.10 on Linux, UNIX, and macOS systems, allowing remote authenticated users with upload permissions to execute OS commands due to the use of execSync The post PoC Exploit Released for HTTP File Server Remote Code Execution Vulnerability appeared first on Cyber Security News.

  • Hackers Using ProxyLogon & ProxyShell To Attack Microsoft Exchange Servers
    by Tushar Subhra Dutta on July 5, 2024 at 11:16 am

    Hackers attack Microsoft Exchange servers because they often contain sensitive communication data that can be exploited for several illicit purposes. Besides this, the widespread use of Microsoft Exchange in enterprises makes it an attractive and high-impact target for cybercriminals. Three years later, ProxyLogon and ProxyShell vulnerabilities impacted Microsoft Exchange servers. Recently, the Hunt Research Team The post Hackers Using ProxyLogon & ProxyShell To Attack Microsoft Exchange Servers appeared first on Cyber Security News.

  • Logsign Unified SecOps RCE Vulnerabilities Let Attackers Gain Control of the System
    by Guru Baran on July 5, 2024 at 7:15 am

    Logsign, a web server built on Python for Unified Security Operations (SecOps), has successfully addressed critical vulnerabilities that could potentially enable threat actors to gain full control over the system. The vulnerabilities, identified as CVE-2024-5716 and CVE-2024-5717, can be combined to achieve remote, unauthenticated code execution via HTTP requests. Logsign gives security analysts complete visibility The post Logsign Unified SecOps RCE Vulnerabilities Let Attackers Gain Control of the System appeared first on Cyber Security News.

  • Critical OpenStack Arbitrary File Access Flaw Exposes Cloud Data to Hackers
    by Guru Baran on July 4, 2024 at 11:23 am

    A critical security vulnerability has been identified in OpenStack, a widely used open-source cloud computing platform. The flaw tracked as CVE-2024-32498, allows authenticated attackers to gain unauthorized access to arbitrary files on the host system, potentially exposing sensitive data. The vulnerability stems from improper input validation in OpenStack’s QCOW2 and VMDK image file handling. The The post Critical OpenStack Arbitrary File Access Flaw Exposes Cloud Data to Hackers appeared first on Cyber Security News.

  • MSI Installer Vulnerability Let Attackers Escalate Privileges with Windows Systems
    by Guru Baran on July 4, 2024 at 3:37 am

    A critical local privilege escalation vulnerability has been discovered in MSI Center versions 2.0.36.0 and earlier, allowing low-privileged users to escalate their privileges on Windows systems. This security flaw, tracked as CVE-2024-37726, stems from insecure file operations performed by the MSI Center application running with NT AUTHORITY\SYSTEM privileges. “Is Your System Under Attack? Try Cynet The post MSI Installer Vulnerability Let Attackers Escalate Privileges with Windows Systems appeared first on Cyber Security News.

  • Multiple Flaws In Rockwell Automation Panel Let Attackers Execute Remote Code
    by Raga Varshini on July 3, 2024 at 12:43 pm

    Two vulnerabilities in Rockwell Automation PanelView Plus have been discovered. Unauthenticated attackers could exploit them remotely to perform remote code execution (RCE) and denial-of-service attacks.  Rockwell Automation, Inc. is an American provider of industrial automation and digital transformation technology. Among the brands are FactoryTalk, Allen-Bradley, and LifecycleIQ Services. PanelView Plus devices are utilized in the The post Multiple Flaws In Rockwell Automation Panel Let Attackers Execute Remote Code appeared first on Cyber Security News.

  • Hackers Exploiting HTTP File Server Remote Code Execution Vulnerability in Wild
    by Dhivya on July 3, 2024 at 12:34 pm

    Hackers are actively exploiting a remote code execution vulnerability in the HTTP File Server (HFS) program. The vulnerability, identified as CVE-2024-23692, was disclosed in May 2024 and has since been leveraged by attackers to install malware and take control of vulnerable systems. HFS, a popular file-sharing program, is now at the center of a significant The post Hackers Exploiting HTTP File Server Remote Code Execution Vulnerability in Wild appeared first on Cyber Security News.

  • Multiple Flaws in Splunk Enterprise Let Attackers Execute Arbitrary Code
    by Guru Baran on July 3, 2024 at 6:49 am

    Splunk is a software platform designed to search, analyze, and visualize machine-generated data from various sources, including websites, applications, sensors, and devices. In 2024, Splunk was acquired by Cisco, which aims to leverage Splunk’s capabilities to enhance digital resilience across its customer base. Splunk has released security updates to address multiple critical vulnerabilities in Splunk The post Multiple Flaws in Splunk Enterprise Let Attackers Execute Arbitrary Code appeared first on Cyber Security News.

  • CocoaPods Vulnerability Exposes iOS & macOS Apps To Supply Chain Attacks
    by Guru Baran on July 2, 2024 at 1:07 pm

    Multiple vulnerabilities in the CocoaPods dependency manager have been identified, posing a significant risk of supply chain attacks. The flaw enables any malicious actor to take control of thousands of unclaimed pods and inject malicious code into numerous well-known Mac and iOS apps. An attack on the mobile app ecosystem may infect almost all Apple The post CocoaPods Vulnerability Exposes iOS & macOS Apps To Supply Chain Attacks appeared first on Cyber Security News.

  • Intel CPU Vulnerability: Indirector Injection Attack Leads to Sensitive Data Leak
    by Guru Baran on July 2, 2024 at 12:50 pm

    Researchers from the University of California have unveiled a novel high-precision Branch Target Injection (BTI) attack, dubbed “Indirector,” that exploits vulnerabilities in the Indirect Branch Predictor (IBP) and the Branch Target Buffer (BTB) of high-end Intel CPUs, specifically the Raptor Lake and Alder Lake generations. Security researchers Luyi Li, Hosein Yavarzadeh, and Dean Tullsen named The post Intel CPU Vulnerability: Indirector Injection Attack Leads to Sensitive Data Leak appeared first on Cyber Security News.

Share Websitecyber