Geek-Guy.com

Category: vulnerabilities

Auto Added by WPeMatico

Tarbomb Denial of Service via Path Traversal

As software applications are built and developed over the years, engineering teams continuously shift perspective on what features to prioritize or de-prioritize. A feature developed five years ago may have no significance today. However, features deemed low priority may still be kept operational for legacy, compatibility, or business requirement reasons. Praetorian discovered such a legacy…

Microsoft fixes 159 vulnerabilities in first Patch Tuesday of 2025

In its latest security update, Microsoft has addressed a total of 159 vulnerabilities, covering a broad spectrum of the tech giant’s products, including .NET, Visual Studio, Microsoft Excel, Windows components, and Azure services.  The update covers several critical and high-severity flaws across various systems, impacting Windows Telephony Services, Active Directory Domain Services, Microsoft Excel and…

CISA report touts cyber hygiene enrollment surge for critical infrastructure orgs

The Cybersecurity and Infrastructure Security Agency has seen a surge in its Cyber Hygiene (CyHy) service enrollment from critical infrastructure organizations over a two-year period, with the communications sector representing the biggest jump. In a report released Friday, CISA said an analysis of the 7,791 critical infrastructure organizations enrolled in the agency’s vulnerability scanning service…

New zero-day exploit targets Ivanti VPN product

A year after a series of vulnerabilities impacting a pair of Ivanti VPN products prompted an emergency directive from the Cybersecurity and Infrastructure Security Agency to federal agencies, the Utah-based software firm is again experiencing issues with one of its signature systems. The company on Wednesday disclosed two vulnerabilities — CVE-2025-0282 and CVE-2025-0283 — that…

Android patches several vulnerabilities in first security update of 2025

Android has released its first security update of the year, disclosing several critical and high-severity vulnerabilities that affect a wide range of Android devices.  The bulletin identifies five critical remote code execution (RCE) vulnerabilities affecting what Android categorizes as the “system,” which encompasses Android’s core components and underlying architecture. These vulnerabilities could allow attackers to…

Industrial networking manufacturer Moxa reports ‘critical’ router bugs

Firmware in cellular routers, secure routers and network security appliances made by Moxa are vulnerable to a pair of high severity bugs that can escalate privileges for an attacker, give root-level access or allow for unauthorized execution of commands. In a pair of CVEs published Jan. 3, Moxa called the flaws “critical” and warned they…

Top CVEs & Vulnerabilities of December 2024

When it comes to cybersecurity, it’s not just the technology that evolves, it’s the threats too. Every month brings its own set of challenges, and December 2024 has been no… The post Top CVEs & Vulnerabilities of December 2024 appeared first on Strobes Security. The post Top CVEs & Vulnerabilities of December 2024 appeared first…

Thousands of industrial routers vulnerable to command injection flaw 

Thousands of industrial routers from a Chinese telecommunications equipment manufacturer are vulnerable to a post-authentication vulnerability, with indications it is already being exploited in the wild to infect devices with Mirai malware. On Dec. 27, VulnCheck detailed the vulnerability, tracked as CVE-2024-12856, wherein an attacker can leverage default credentials in Four-Faith F3x24 and F3x36 routers…

Best of 2024: CVE-2024-38063: An In-Depth Look at the Critical Remote Code Execution Vulnerability

In a recent security advisory, Microsoft disclosed a high-severity vulnerability identified as CVE-2024-38063. This critical Remote Code Execution (RCE) flaw, rated with a CVSS score of 9.8, poses a significant… The post CVE-2024-38063: An In-Depth Look at the Critical Remote Code Execution Vulnerability appeared first on Strobes Security. The post Best of 2024: CVE-2024-38063: An…

Log4Shell Vulnerability | Why it Still Exists and How to Protect Yourself | Contrast Security

Three years ago, Log4Shell was the worst holiday gift ever for security teams, particularly given that it was wrapped in a CISA order to patch by Christmas Eve.  The post Log4Shell Vulnerability | Why it Still Exists and How to Protect Yourself | Contrast Security appeared first on Security Boulevard.

Cybersecurity Insights with Contrast CISO David Lindner | 12/13/24

Insight No. 1: Stop patching the CVE dumpster fire with Vulnrichment It’s time to integrate the crucial data — Common Vulnerability Scoring System (CVSS) scores and other crucial information  — from CISA’s Vulnrichment program directly into the NVD. Centralize, streamline, and then focus on what really matters: runtime analysis of your applications. Insight No. 2: Zero days don’t give…

Cybersecurity Insights with Contrast CISO David Lindner | 12/13/24

Insight No. 1: Stop patching the CVE dumpster fire with Vulnrichment It’s time to integrate the crucial data — Common Vulnerability Scoring System (CVSS) scores and other crucial information  — from CISA’s Vulnrichment program directly into the NVD. Centralize, streamline, and then focus on what really matters: runtime analysis of your applications. Insight No. 2: Zero days don’t give…

Cybersecurity Insights with Contrast CISO David Lindner | 12/13/24

Insight No. 1: Stop patching the CVE dumpster fire with Vulnrichment It’s time to integrate the crucial data — Common Vulnerability Scoring System (CVSS) scores and other crucial information  — from CISA’s Vulnrichment program directly into the NVD. Centralize, streamline, and then focus on what really matters: runtime analysis of your applications. Insight No. 2: Zero days don’t give…

WordPress Appliance - Powered by TurnKey Linux