BGP BooFuzzer: New tool to find vulnerabilities in BGP implementation

The most important routing protocol for the internet is called BGP. It makes it possible for autonomous systems (ASes), which are groups of IP addresses that are leased to an organization for a certain period of time by a registrar, to share routing and reachability information with one another. When BGP stops working, an autonomous […]

Alert: Active Exploitation of TP-Link, Apache, and Oracle Vulnerabilities Detected

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added three flaws to the Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The security vulnerabilities are as follows – CVE-2023-1389 (CVSS score: 8.8) – TP-Link Archer AX-21 Command Injection Vulnerability CVE-2021-45046 (CVSS score: 9.0) – Apache Log4j2 Deserialization of Untrusted Data Vulnerability […]

Critical VMware Vulnerabilities Let Attackers Execute Arbitrary Code

VMware Workstation, Workstation Pro, and Fusion have been subjected to several privately reported and fixed flaws. VMware has published a security advisory on the critical bugs discovered and their workarounds. CVE(s): CVE-2023-20869 – Stack-based buffer-overflow vulnerability in Bluetooth device-sharing functionality CVE-2023-20870 – Information disclosure vulnerability in Bluetooth device-sharing functionality CVE-2023-20871 – VMware Fusion Raw Disk […]

New research proves that code generated by ChatGPT is full of vulnerabilities

“How Secure is Code Generated by ChatGPT?” is the title of a pre-press paper. Computer scientists Baba Mamadou Camara, Anderson Avila, Jacob Brunelle, and Raphael Khoury provide a research response that may be summed up as “not very.” The scientists write in their study that the findings were concerning. “We discovered that the code produced […]

Anyone can hack into VMware Aria Log Operations servers using these vulnerabilities

On Thursday, the firm issued urgent fixes to resolve serious security flaws in the VMware Aria Operations for Logs product line (which was originally known as vRealize Log Insight). Additionally, the business issued a warning about the potential for pre-authentication remote root attacks.VMware has issued a critical-level warning that details two different vulnerabilities in the […]

Severe Android and Novi Survey Vulnerabilities Under Active Exploitation

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The two flaws are listed below – CVE-2023-20963 (CVSS score: 7.8) – Android Framework Privilege Escalation Vulnerability CVE-2023-29492 (CVSS score: TBD) – Novi Survey Insecure Deserialization Vulnerability “Android Framework contains […]

Very critical vulnerabilities in SAP with CVSS score of 10

During its April 2023 Security Patch Day, the German corporate software manufacturer SAP announced a total of 19 new security notes, five of which were categorized as “hot news” and dealt with significant vulnerabilities (2 new flaws: CVE-2023-27497 & CVE-2023-28765, and 3 updates). The vulnerability in the SAP Diagnostics Agent known as CVE-2023-27497, which has […]

Cacti, Realtek, and IBM Aspera Faspex Vulnerabilities Under Active Exploitation

Critical security flaws in Cacti, Realtek, and IBM Aspera Faspex are being exploited by various threat actors in hacks targeting unpatched systems. This entails the abuse of CVE-2022-46169 (CVSS score: 9.8) and CVE-2021-35394 (CVSS score: 9.8) to deliver MooBot and ShellBot (aka PerlBot), Fortinet FortiGuard Labs said in a report published this week. CVE-2022-46169 relates […]

Critical Samba vulnerabilities easily allow hacking of servers

Samba is a free software project that runs on operating systems that are similar to UNIX and supports the Windows file sharing protocol. This protocol once went by the name SMB, but it was renamed CIFS a little while later. Computers running GNU/Linux, Mac OS X, or Unix in general may be perceived as servers […]

Critical vulnerabilities in SAP with CVSS score > 9.5

On its March 2023 Security Patch Day, the German corporate software manufacturer SAP announced a total of 19 new security notes, five of which were designated as ‘critical’ . Security vulnerabilities in SAP products are great targets for threat actors since these products are widely utilized by huge enterprises all over the globe and may […]

U.S. Cybersecurity Agency CISA Adds Three New Vulnerabilities in KEV Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added three security flaws to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The list of shortcomings is as follows – CVE-2022-47986 (CVSS score: 9.8) – IBM Aspera Faspex Code Execution Vulnerability CVE-2022-41223 (CVSS score: 6.8) – Mitel MiVoice Connect Code […]

Critical vulnerabilities in FortiNAC and FortiWeb products

Fortinet, a company that specialises in cybersecurity, has patched two serious flaws that were present in the FortiNAC and FortiWeb products it manufactures. The customers have been encouraged by Fortinet to quickly upgrade to the most recent versions that are available. The remote code execution vulnerability, which is being tracked as CVE-2022-39952 and has a […]

Hackers Exploit Vulnerabilities in Sunlogin to Deploy Sliver C2 Framework

Threat actors are leveraging known flaws in Sunlogin software to deploy the Sliver command-and-control (C2) framework for carrying out post-exploitation activities. The findings come from AhnLab Security Emergency response Center (ASEC), which discovered that security vulnerabilities in Sunlogin, a remote desktop program developed in China, are being abused to deploy a wide range of payloads. […]

Additional Supply Chain Vulnerabilities Uncovered in AMI MegaRAC BMC Software

Two more supply chain security flaws have been disclosed in AMI MegaRAC Baseboard Management Controller (BMC) software, nearly two months after three security vulnerabilities were brought to light in the same product. Firmware security firm Eclypsium said the two shortcomings were held back until now to provide AMI additional time to engineer appropriate mitigations. The […]