12 links tagged with all of: vulnerabilities + remote-code-execution
Click any tag below to further narrow down your results
Links
OpenSSL has released updates to address 12 vulnerabilities, including a critical remote code execution flaw. Discovered by Aisle, the issues mainly involve memory safety and parsing errors that could lead to denial of service or exploitation. The most severe flaws affect versions 3.0 to 3.6, particularly in CMS and PKCS#12 handling.
Two critical 0-day vulnerabilities in NetSupport Manager allow attackers to execute code remotely without authentication. This exploit can compromise industrial control systems, enabling lateral movement within networks. Organizations are urged to upgrade to the latest version to mitigate risks.
SAP addressed 19 security vulnerabilities, including a critical flaw in SQL Anywhere Monitor that allowed remote code execution through hardcoded credentials. Experts recommend discontinuing the use of SQL Anywhere Monitor and deleting existing database instances as a temporary fix. Other vulnerabilities in SAP Solution Manager and SAP NetWeaver AS Java were also patched.
A recent investigation revealed over thirty vulnerabilities in major AI-integrated IDEs, exposing them to data theft and remote code execution. The flaws stem from how AI agents interact with existing IDE features, creating new attack vectors that attackers can exploit. Immediate mitigations are possible, but a fundamental redesign of IDEs is necessary for long-term security.
Two vulnerabilities, named LookOut, discovered in Google Looker can lead to remote code execution and data exfiltration. Attackers with developer permissions can exploit these flaws to fully compromise Looker instances.
Multiple critical flaws in the n8n open-source workflow platform allow authenticated users to execute arbitrary code on the server. Despite a fix being released, researchers found a bypass that could lead to complete control over n8n instances, exposing sensitive data and connected accounts. Users are urged to update to the latest version and review their workflows for security.
Two critical vulnerabilities in Cisco's Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) have been identified, allowing remote code execution without authentication. Cisco has released patches for these vulnerabilities, tracked as CVE-2025-20281 and CVE-2025-20282, and users are urged to apply them promptly.
Trend Micro has released critical security updates to address multiple vulnerabilities in its Apex Central and Endpoint Encryption PolicyServer products, including remote code execution and authentication bypass flaws. Although there is no evidence of active exploitation, users are urged to apply the updates promptly to mitigate risks. The issues affect all versions leading up to the latest release, with no mitigations available.
Researchers have discovered multiple zero-day vulnerabilities in HashiCorp Vault and CyberArk Conjur, critical secret management platforms used by many enterprises. These vulnerabilities could allow attackers to bypass authentication, gain root access, and execute remote code, posing significant security risks to organizations.
CISA reported that hackers breached a U.S. federal agency by exploiting a critical unpatched vulnerability in GeoServer, leading to lateral movement within the agency's network and the installation of web shells. The attackers remained undetected for three weeks until their activities triggered alerts, prompting an investigation and response measures. CISA emphasizes the importance of timely patching and monitoring for security vulnerabilities.
Cisco has announced that three critical remote code execution vulnerabilities in its Identity Services Engine (ISE) are being actively exploited, requiring urgent updates from users. The flaws, which allow attackers to execute commands and upload malicious files without authentication, have been assigned a maximum severity rating and must be addressed through specific software patches. Users of ISE 3.3 and 3.4 are advised to upgrade immediately to mitigate risks.
Team82 has revealed four vulnerabilities in Axis Communications' video surveillance products, which could allow attackers to execute remote code on both the Axis Device Manager and Axis Camera Station. The exploit chain targets the proprietary Axis.Remoting protocol, potentially exposing thousands of organizations to significant security risks. Axis Communications has responded promptly with patches to address these vulnerabilities.