X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 08/07/2024 10:07

Gogs Vulnerabilities May Put Your Source Code at Risk

Exploiting these flaws could allow attackers to execute arbitrary commands, read source code, and gain unauthorized access. The vulnerabilities require authentication, with one flaw specifically requiring the built-in SSH server to be enabled. This article has been indexed from Cyware…

Articles similaires

Sorry! Image not available at this time

Cisco fixed critical and high-severity flaws

itsecuritynews.info - 02/Apr 18:20

Cisco fixed critical flaws that could allow attackers to bypass authentication, run code, and gain access to sensitive data. Cisco released patches...

Sorry! Image not available at this time

Cisco fixed critical and high-severity flaws

itsecuritynews.info - 02/Apr 18:20

Cisco fixed critical flaws that could allow attackers to bypass authentication, run code, and gain access to sensitive data. Cisco released patches...

Sorry! Image not available at this time

Cisco fixed critical and high-severity flaws

securityaffairs.co - 02/Apr 17:04

Cisco fixed critical flaws that could allow attackers to bypass authentication, run code, and gain access to sensitive data. Cisco released patches...

Sorry! Image not available at this time

PHP Composer flaws enable remote command execution via Perforce VCS

securityaffairs.co - 08:19

Two high-severity flaws in PHP Composer could let attackers run arbitrary commands via malicious repository configs and crafted inputs affecting...

Sorry! Image not available at this time

PHP Composer flaws enable remote command execution via Perforce VCS

securityaffairs.co - 08:19

Two high-severity flaws in PHP Composer could let attackers run arbitrary commands via malicious repository configs and crafted inputs affecting...

Sorry! Image not available at this time

Critical ShareFile Flaws Lead to Unauthenticated RCE

itsecuritynews.info - 03/Apr 12:36

The vulnerabilities can be chained together to bypass authentication and upload arbitrary files to the server. The post Critical ShareFile Flaws Lead...

Sorry! Image not available at this time

Cisco IMC auth bypass vulnerability allows attackers to alter user passwords (CVE-2026-20093)

itsecuritynews.info - 03/Apr 13:13

Cisco has fixed ten vulnerabilities affecting its Integrated Management Controller (IMC), the most critical of which (CVE-2026-20093) could allow an...

Sorry! Image not available at this time

Cisco IMC auth bypass vulnerability allows attackers to alter user passwords (CVE-2026-20093)

itsecuritynews.info - 03/Apr 13:13

Cisco has fixed ten vulnerabilities affecting its Integrated Management Controller (IMC), the most critical of which (CVE-2026-20093) could allow an...

Sorry! Image not available at this time

Vim Modeline Bypass Vulnerability Let Attackers Execute Arbitrary OS Commands

itsecuritynews.info - 02/Apr 04:09

A newly discovered high-severity vulnerability in the popular Vim text editor exposes users to arbitrary command execution on the operating system....

Sorry! Image not available at this time

Vim Modeline Bypass Vulnerability Let Attackers Execute Arbitrary OS Commands

itsecuritynews.info - 02/Apr 04:09

A newly discovered high-severity vulnerability in the popular Vim text editor exposes users to arbitrary command execution on the operating system....