Tag: vulnerabilities
TP-Link WLAN access points can be attacked 15 minutes after reboot
Attackers can attack the WLAN access points of TP-Link AC1350 Wireless and N300 Wireless N Ceiling Mount and, among other things, reset them to factory settings. The attacks Advertisement Security…
Cisco closes security gaps and gives tips on VPN security
Cisco closes security gaps and gives tips on VPN security The network supplier Cisco has closed dangerous security gaps in several products. In most cases, attackers can paralyze devices such…
Vulnerabilities in RDoc and StringIO
Attackers can execute their own code in the Ruby program Vulnerability in Ruby gems allows data theft Providers on the topic There are currently vulnerabilities in RDoc and StringIO gems…
Speculative Race Conditions: Specter V1 attacks return
Malicious race conditions enable an unauthorized expansion of rights in the system on AMD and Intel processors. Race conditions are constellations in which the result of an operation depends on…
GitLab does not fix PostgreSQL vulnerability: attackers can gain admin rights
Although the critical security vulnerability in PostgreSQL has been known since February 12, 2024, GitLab has still not deployed a security update based on PostgreSQL patches. The vulnerability allows attackers…
Cisco: Attackers can become the root user under Linux
Cisco AppDynamics, Duo Authentication, Secure Client, Secure Client for Linux and small business wireless access points are vulnerable. Security patches are available for download. Advertisement Root gap Secure Client for…
Teamviewer: Security gap in the client allows rights to be escalated
The developers of Teamviewer warn of a security vulnerability in the Teamviewer client. Attackers with low privileges could then connect to other users – and thus expand their privileges. An…
Identity card has vulnerabilities: Hacker uncovers security gap
“Spiegel” report Hacker uncovers security gap in online ID card The ID card is intended to open the door to digital administrative services © Karl-Josef Hildenbrand / DPA The eID…
F5 fixes 20 vulnerabilities in big IP load balancer, WAF and nginx
This time, in its quarterly security advisory, F5 listed nearly two dozen vulnerabilities hidden in updates to the Big IP product line and the nginx web server. The range of…
Samsung closes security leak in SSD tool Magician
Samsung’s software for managing internal and external SSDs, USB flash drives and memory cards called “Magician” has a security flaw that the manufacturer warns about. An updated version is available…