Remove 2022 Remove Authentication Remove Blog Remove Software Review
article thumbnail

CVE-2023-46747: Critical Authentication Bypass Vulnerability in F5 BIG-IP

Tenable

A critical authentication bypass vulnerability in F5’s BIG-IP could allow remote, unauthenticated attackers to execute system commands. At the time their initial blog post was released, no CVE identifier was provided, however, Praetorian noted that additional technical details would be released once a patch was available from F5.

article thumbnail

CVE-2023-40044, CVE-2023-42657: Progress Software Patches Multiple Vulnerabilities in WS_FTP Server

Tenable

Progress Software patches multiple flaws in its WS_FTP Server product, including a pair of critical flaws, one with a maximum CVSS rating of 10 Background On September 27, Progress Software published an advisory for WinSock File Transfer Protocol or WS_FTP Server , a secure file transfer solution, addressing eight vulnerabilities.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

August Patch Tuesday 2022

Ivanti

systems ( CVE-2022-26832 and CVE-2022-30130 ). Of the 121 new CVEs addressed this month, there is a zero day ( CVE-2022-34713 ) and a publicly disclosed CVE ( CVE-2022-30134 ). Of the 121 new CVEs addressed this month, there is a zero day ( CVE-2022-34713 ) and a publicly disclosed CVE ( CVE-2022-30134 ).

Windows 94
article thumbnail

AA23-215A: 2022's Top Routinely Exploited Vulnerabilities

Tenable

AA23-215A: 2022's Top Routinely Exploited Vulnerabilities A joint Cybersecurity Advisory collaborated on by multiple international agencies highlights the top routinely exploited vulnerabilities of 2022 Background On August 3, a joint Cybersecurity Advisory (CSA) AA23-215A coauthored by multiple U.S.

article thumbnail

CVE-2023-48788: Critical Fortinet FortiClientEMS SQL Injection Vulnerability

Tenable

Fortinet warns of a critical SQL Injection vulnerability that could allow an unauthenticated attacker to execute arbitrary code on vulnerable FortiClientEMS software. Critical At the time this blog was published, Fortinet’s advisory assigned a CVSSv3 score of 9.3 and also links to an advisory that is not currently available.

article thumbnail

Microsoft’s May 2024 Patch Tuesday Addresses 59 CVEs (CVE-2024-30051, CVE-2024-30040)

Tenable

Once exploited, an attacker could execute code on the target system. This is due to the fact that an attacker would need to “invest time in repeated exploitation attempts” through the sending of “constant or intermittent data” to a targeted system. Discovery of this flaw is unattributed. It was assigned a CVSSv3 score of 5.9

Windows 118
article thumbnail

CVE-2023-20887: VMware Aria Operations for Networks Command Injection

Tenable

CVE-2023-20888 Aria Operations for Networks Authenticated Deserialization Vulnerability 9.1 This blog post was published on June 14 and reflects VPR at that time. A blog post on Summoning Team’s website was released which details the exploitation process of CVE-2023-20887. Great article!

Network 53