X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 08/07/2024 10:07

Gogs Vulnerabilities May Put Your Source Code at Risk

Exploiting these flaws could allow attackers to execute arbitrary commands, read source code, and gain unauthorized access. The vulnerabilities require authentication, with one flaw specifically requiring the built-in SSH server to be enabled. This article has been indexed from Cyware…

Articles similaires

Sorry! Image not available at this time

FortiClient Hit by Severe SQL Injection Vulnerability Enabling Database Intrusion

itsecuritynews.info - 18/Mar 06:09

Cybersecurity researchers have a detailed a critical security flaw in Fortinet’s FortiClient Enterprise Management Server (EMS). Tracked as...

Sorry! Image not available at this time

FortiClient Hit by Severe SQL Injection Vulnerability Enabling Database Intrusion

itsecuritynews.info - 18/Mar 06:09

Cybersecurity researchers have a detailed a critical security flaw in Fortinet’s FortiClient Enterprise Management Server (EMS). Tracked as...

Sorry! Image not available at this time

Veeam Patches Multiple Critical RCE Vulnerabilities on Backup Server

itsecuritynews.info - 13/Mar 10:32

A critical security update has been released for Backup & Replication software to fix severe vulnerabilities that could allow attackers to execute...

Sorry! Image not available at this time

TP-Link warns users to patch critical router auth bypass flaw

bleepingcomputer.com - 11:11

TP-Link has patched several vulnerabilities in its Archer NX router series, including a critical-severity flaw that may allow attackers to bypass...

Sorry! Image not available at this time

Multiple Vulnerabilities in TP-Link Devices Enable Arbitrary Command Execution

itsecuritynews.info - 11:12

TP-Link recently published a critical security advisory addressing four high-severity vulnerabilities in its Archer series routers. The flaws impact...

Sorry! Image not available at this time

Cisco Firewall 0-day Vulnerability Exploited in the Wild to Deploy Interlock Ransomware

itsecuritynews.info - 18/Mar 18:09

An active campaign by the Interlock ransomware group is exploiting a critical zero-day vulnerability (CVE-2026-20131) in Cisco Secure Firewall...

Sorry! Image not available at this time

Cisco Firewall 0-day Vulnerability Exploited in the Wild to Deploy Interlock Ransomware

itsecuritynews.info - 18/Mar 18:09

An active campaign by the Interlock ransomware group is exploiting a critical zero-day vulnerability (CVE-2026-20131) in Cisco Secure Firewall...

Sorry! Image not available at this time

Claude Vulnerabilities Allow Data Exfiltration and User Redirection to Malicious Sites

itsecuritynews.info - 19/Mar 14:07

Three chained vulnerabilities in Claude.ai, Anthropic’s widely used AI assistant, that together allow attackers to silently exfiltrate sensitive...

Sorry! Image not available at this time

Claude Vulnerabilities Allow Data Exfiltration and User Redirection to Malicious Sites

itsecuritynews.info - 19/Mar 14:07

Three chained vulnerabilities in Claude.ai, Anthropic’s widely used AI assistant, that together allow attackers to silently exfiltrate sensitive...

Sorry! Image not available at this time

F5 NGINX Plus and Open Source Vulnerability Allow Attackers to Execute Code Using MP4 file

itsecuritynews.info - 14:09

A high-severity vulnerability has been disclosed affecting both NGINX Open Source and NGINX Plus. Tracked formally as CVE-2026-32647, this security...