X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 08/07/2024 10:07

Gogs Vulnerabilities May Put Your Source Code at Risk

Exploiting these flaws could allow attackers to execute arbitrary commands, read source code, and gain unauthorized access. The vulnerabilities require authentication, with one flaw specifically requiring the built-in SSH server to be enabled. This article has been indexed from Cyware…

Articles similaires

Sorry! Image not available at this time

Critical bug in CrowdStrike LogScale let attackers access files

securityaffairs.co - 26/Apr 16:07

CrowdStrike fixed CVE-2026-40050 in LogScale self-hosted, a critical flaw allowing unauthenticated file access via path traversal. CrowdStrike...

Sorry! Image not available at this time

Over 400,000 sites at risk as hackers exploit Breeze Cache plugin flaw (CVE-2026-3844)

securityaffairs.co - 25/Apr 14:22

Attackers exploit a Breeze Cache flaw (CVE-2026-3844) to upload files without login. Wordfence researchers detected over 170 attacks. Threat actors...

Sorry! Image not available at this time

OpenSSH Flaw Allowing Full Root Shell Access Lurked for 15 Years

itsecuritynews.info - 27/Apr 12:35

A code reuse issue enabled comma characters in certificate principals to be interpreted as list separators. The post OpenSSH Flaw Allowing Full Root...

Sorry! Image not available at this time

OpenSSH Flaw Allowing Full Root Shell Access Lurked for 15 Years

itsecuritynews.info - 27/Apr 12:35

A code reuse issue enabled comma characters in certificate principals to be interpreted as list separators. The post OpenSSH Flaw Allowing Full Root...

Sorry! Image not available at this time

Hackers Exploiting Cisco Firepower Devices’ Using n-day Vulnerabilities to Gain Unauthorized Access

itsecuritynews.info - 25/Apr 03:02

State-sponsored threat actors are actively targeting Cisco Firepower devices by chaining known vulnerabilities to deploy a highly customized backdoor....

Sorry! Image not available at this time

Hackers Exploiting Cisco Firepower Devices’ Using n-day Vulnerabilities to Gain Unauthorized Access

itsecuritynews.info - 25/Apr 03:02

State-sponsored threat actors are actively targeting Cisco Firepower devices by chaining known vulnerabilities to deploy a highly customized backdoor....

Sorry! Image not available at this time

Hackers exploit file upload bug in Breeze Cache WordPress plugin

bleepingcomputer.com - 23/Apr 21:33

Hackers are actively exploiting a critical vulnerability in the Breeze Cache plugin for WordPress that allows uploading arbitrary files on the server...

Sorry! Image not available at this time

Critical bug in CrowdStrike LogScale let attackers access files

itsecuritynews.info - 26/Apr 17:06

CrowdStrike fixed CVE-2026-40050 in LogScale self-hosted, a critical flaw allowing unauthenticated file access via path traversal. CrowdStrike...

Sorry! Image not available at this time

Critical bug in CrowdStrike LogScale let attackers access files

itsecuritynews.info - 26/Apr 17:06

CrowdStrike fixed CVE-2026-40050 in LogScale self-hosted, a critical flaw allowing unauthenticated file access via path traversal. CrowdStrike...

Sorry! Image not available at this time

New ‘Pack2TheRoot’ flaw gives hackers root Linux access

bleepingcomputer.com - 24/Apr 17:28

A new vulnerability dubbed Pack2TheRoot could be exploited in the PackageKit daemon to allow local Linux users to install or remove system packages...