Adobe Flash Vulnerability Can Lead to Code Execution and Asset Takeover (CVE-2018-15982)

Adobe has issued an out-of-band advisory for CVE-2018-15982. Through the use of a maliciously crafted RAR file, an attacker exploiting this vulnerability can take over the machine of users that run it. Background Adobe has released an out-of-band security bulletin. that includes patches for CVE-2018-15982, a critical arbitrary code execution vulnerability in Adobe Flash which has been used to … [Read more...]

Popular WordPress ‘AMP for WP’ Plugin Vulnerable to Privilege Escalation Attacks

The ‘AMP for WP – Accelerated Mobile Pages’ plugin for WordPress is vulnerable to a privilege escalation attack. Updating the plugin to version ‘’ fixes the flaw. Background Following the discovery of a critical vulnerability in the WP GDPR Compliance Plugin, another critical WordPress plugin vulnerability was discovered this week in the popular AMP for WP plugin by researchers at WebARX … [Read more...]

New WordPress Privilege Escalation Flaw In WP GDPR Compliance Plugin

<p>A privilege escalation flaw in WordPress’ popular WP GDPR Compliance plugin has led to exploitation of numerous WordPress sites. Site owners and administrators are encouraged to upgrade to the latest version of the affected plugin.</p> <h2>Background</h2> <p>WordPress plugin "<a href="https://wordpress.org/plugins/wp-gdpr-compliance/">WP GDPR … [Read more...]

APT Malware Activity Detected Exploiting a Patched ColdFusion Vulnerability (CVE-2018-15961)

<p>Researchers at Volexity have identified multiple groups exploiting CVE-2018-15961 in unpatched, web-facing Adobe ColdFusion servers. Users are urged to upgrade to the latest version of ColdFusion.</p> <h2>Background</h2> <p>On November 8, <a href="https://www.volexity.com/blog/2018/11/08/active-exploitation-of-newly-pa... reported Advanced Persistent Threat … [Read more...]

jQuery File Upload Plugin Leaves Web Servers Vulnerable to Unauthenticated File Upload Attacks

Akamai disclosed that the popular jQuery File Upload plugin has been vulnerable to an unauthenticated file upload flaw since November 2010. Background Akamai’s Security Intelligence Response Team (SIRT) recently disclosed that the popular jQuery File Upload plugin -- the second most-starred plugin on Github in the jQuery project -- has been vulnerable to an unauthenticated file upload flaw … [Read more...]

Public Exploit Modules Available for Cisco Prime Infrastructure Vulnerability

Users of Cisco Prime Infrastructure Software are urged to update to the latest version to address one of two vulnerabilities that, when chained, could lead to remote code execution with system-level permissions. Background Cisco released an advisory for CVE-2018-15379, an arbitrary file upload and command execution vulnerability for its Cisco Prime Infrastructure (CPI) software. The CPI management … [Read more...]

Tenable Research Advisory: Multiple HPE iMC Vulnerabilities Could Lead to Remote Code Execution or Denial of Service

Tenable Research discovered multiple vulnerabilities in the HPE Intelligent Management Center. HPE is currently working to fix the issues and plans to release patches on Nov. 30. What you need to know: Multiple vulnerabilities were found in HPE iMC, ranging from denial-of-service (DoS) to remote code execution. What’s the attack vector? Multiple listening ports related to HPE iMC. What’s the … [Read more...]

Tenable Research Advisory: Rockwell Automation RSLinx Classic Lite RCE and DoS Vulnerability Discovered by Tenable

Tenable Research has discovered multiple memory corruption issues in Rockwell Automation RSLinx Classic Lite 4.00.01 that may allow for remote code execution or denial of service. Customers are encouraged to update their software. What do you need to know? Rockwell Automation RSLinx Classic could allow for memory corruption and remote code execution or denial of service. What’s the attack vector? … [Read more...]

New Apache PHP XSS Bug Displays Modified HTTP Request Text to Users

A researcher has discovered a cross-site scripting vulnerability caused by mishandling of a PHP header in Apache version 2.x. Upgrade PHP and review privileges for applications and services using it. Background Researcher Varma Prashanth posted PHP Bug #76582 for Apache version 2.x that details a cross-site scripting (XSS) bug which could allow an unauthenticated attacker to send a malicious POST … [Read more...]

Tenable Research Advisory: Advantech WebAccess Remote Command Execution Still Exploitable

Tenable Researcher Chris Lyne discovered that Advantech WebAccess versions 8.3, 8.3.1 and 8.3.2 are still vulnerable to remote command execution CVE-2017-16720, which was originally disclosed by ZDI in January 2018 and has a public exploit. Background Tenable Research’s Chris Lyne has discovered that Advantech WebAccess remains unprotected against a public exploit several months after a patch … [Read more...]