Articles by Tag #vulnerability

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

Server side (vulnerability scanning)

Ethical Hacking Visit the github project: https://github.com/samglish/ServerSide ...

Learn More 6 1Jul 5 '24

Next.js Middleware Bypass Vulnerability (CVE-2025-29927) Affecting Popular AI Applications

This exploit disclosure was originally published by Chaitin Security Emergency Response Center. ...

Learn More 6 0Mar 25

Patch your servers! It's time of regreSSHion

OpenSSH CVE-2024-6387 vulnerability allows to perform an unauthenticated RCE that grants root access...

Learn More 2 0Jul 3 '24

Beware of Spring Boot Actuator Endpoint env: A Security Alert

As a developer, securing your applications should be a top priority. One area that often goes...

Learn More 1 0Oct 30 '24

The top 11 web application vulnerability scanners with self-hosting and automation

Top 11 open source vulnerability security scanners that provide automation with self-hosting choices.

Learn More 1 2May 25

CVE-2025-43200: Apple Multiple Products Unspecified Vulnerability

CVE ID: CVE-2025-43200 Vulnerability Name Apple Multiple Products Unspecified...

Learn More 0 0Jun 18

CVE-2020-0796: Microsoft SMBv3 Remote Code Execution Vulnerability

A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target server or client.

Learn More 0 0Jun 24

CVE-2021-34523: Microsoft Exchange Server Privilege Escalation Vulnerability

Microsoft Exchange Server contains an unspecified vulnerability that allows for privilege escalation.

Learn More 0 0Jun 24

CVE-2024-0769: D-Link DIR-859 Router Path Traversal Vulnerability

D-Link DIR-859 routers contain a path traversal vulnerability in the file /hedwig.cgi of the component HTTP POST Request Handler. Manipulation of the argument service with the input ../../../../htdocs/webinc/getcfg/DHCPS6.BRIDGE-1.xml allows for the leakage of session data potentially enabling privilege escalation and unauthorized control of the device. This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions.

Learn More 0 0Jun 25

CVE-2021-27104: Accellion FTA OS Command Injection Vulnerability

CVE ID: CVE-2021-27104 Vulnerability Name Accellion FTA OS Command Injection...

Learn More 0 1Jun 16

CVE-2020-12641: Roundcube Webmail Remote Code Execution Vulnerability

Roundcube Webmail contains an remote code execution vulnerability that allows attackers to execute code via shell metacharacters in a configuration setting for im_convert_path or im_identify_path.

Learn More 0 0Jun 24

Ultimate Guide to Apache Security: Hide Server Details, Restrict Access & Harden Your Setup

Ultimate Guide to Apache Security: Hide Server Details, Restrict Access & Harden Your...

Learn More 0 0May 23

CVE-2021-27065: Microsoft Exchange Server Remote Code Execution Vulnerability

Microsoft Exchange Server contains an unspecified vulnerability that allows for remote code execution. This vulnerability is part of the ProxyLogon exploit chain.

Learn More 0 0Jun 24

CVE-2021-31207: Microsoft Exchange Server Security Feature Bypass Vulnerability

Microsoft Exchange Server contains an unspecified vulnerability that allows for security feature bypass.

Learn More 0 0Jun 24

CVE-2023-20273: Cisco IOS XE Web UI Command Injection Vulnerability

Cisco IOS XE contains a command injection vulnerability in the web user interface. When chained with CVE-2023-20198, the attacker can leverage the new local user to elevate privilege to root and write the implant to the file system. Cisco identified CVE-2023-20273 as the vulnerability exploited to deploy the implant. CVE-2021-1435, previously associated with the exploitation events, is no longer believed to be related to this activity.

Learn More 0 0Jun 24

CVE-2021-26858: Microsoft Exchange Server Remote Code Execution Vulnerability

Microsoft Exchange Server contains an unspecified vulnerability that allows for remote code execution. This vulnerability is part of the ProxyLogon exploit chain.

Learn More 0 0Jun 24

CVE-2021-26857: Microsoft Exchange Server Remote Code Execution Vulnerability

Microsoft Exchange Server contains an unspecified vulnerability that allows for remote code execution. This vulnerability is part of the ProxyLogon exploit chain.

Learn More 0 0Jun 24

OWASP Broken Access Control Vulnerabilities

When it comes to web application security, Broken Access Control stands out as one of the most...

Learn More 0 0Oct 17 '24

CVE-2023-20198: Cisco IOS XE Web UI Privilege Escalation Vulnerability

Cisco IOS XE Web UI contains a privilege escalation vulnerability in the web user interface that could allow a remote, unauthenticated attacker to create an account with privilege level 15 access. The attacker can then use that account to gain control of the affected device.

Learn More 0 0Jun 23

CVE-2020-35730: Roundcube Webmail Cross-Site Scripting (XSS) Vulnerability

Roundcube Webmail contains a cross-site scripting (XSS) vulnerability that allows an attacker to send a plain text e-mail message with Javascript in a link reference element that is mishandled by linkref_addinindex in rcube_string_replacer.php.

Learn More 0 0Jun 24

CVE-2019-6693: Fortinet FortiOS Use of Hard-Coded Credentials Vulnerability

Fortinet FortiOS contains a use of hard-coded credentials vulnerability that could allow an attacker to cipher sensitive data in FortiOS configuration backup file via knowledge of the hard-coded key.

Learn More 0 0Jun 25

CVE-2021-44026: Roundcube Webmail SQL Injection Vulnerability

Roundcube Webmail is vulnerable to SQL injection via search or search_params.

Learn More 0 0Jun 24

CVE-2023-34362: Progress MOVEit Transfer SQL Injection Vulnerability

Progress MOVEit Transfer contains a SQL injection vulnerability that could allow an unauthenticated attacker to gain unauthorized access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database in addition to executing SQL statements that alter or delete database elements.

Learn More 0 0Jun 27

CVE-2023-33538: TP-Link Multiple Routers Command Injection Vulnerability

CVE ID: CVE-2023-33538 Vulnerability Name TP-Link Multiple Routers Command...

Learn More 0 0Jun 18

CVE-2021-26855: Microsoft Exchange Server Remote Code Execution Vulnerability

Microsoft Exchange Server contains an unspecified vulnerability that allows for remote code execution. This vulnerability is part of the ProxyLogon exploit chain.

Learn More 0 0Jun 24

CVE-2024-54085: AMI MegaRAC SPx Authentication Bypass by Spoofing Vulnerability

AMI MegaRAC SPx contains an authentication bypass by spoofing vulnerability in the Redfish Host Interface. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability.

Learn More 0 0Jun 25

10 Free Vulnerability Scanners Every Developer Should Know in 2025

Security is no longer just for security teams. If you're building web apps, deploying APIs, or...

Learn More 0 0Apr 8

CVE-2021-34473: Microsoft Exchange Server Remote Code Execution Vulnerability

Microsoft Exchange Server contains an unspecified vulnerability that allows for remote code execution.

Learn More 0 0Jun 24

CVE-2023-0386: Linux Kernel Improper Ownership Management Vulnerability

Linux Kernel contains an improper ownership management vulnerability, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.

Learn More 0 0Jun 18