Threat Roundup for April 26 to May 3

[![](https://4.bp.blogspot.com/-OZk_HZUnWw8/XNGon29pJLI/AAAAAAAAGNI/IY-WnPRAA6UTgQH2jV6_IyW_zGeZtU03wCK4BGAYYCw/s1600/recurring%2Bblog%2Bimages_threat%2Broundup.jpg)]() Today, Talos is publishing a gl ...

Continue Reading
CVE-2018-20487

An issue was discovered in the firewall3 component in Inteno IOPSYS 1.0 through 3.16. The attacker must make a JSON-RPC method call to add a firewall rule as an "include" and point the "path" argument ...

Continue Reading
Onion Omega2 Login Brute-Force

OnionOS login scanner module for Onion Omega2 devices.Read More ...

Continue Reading
Onion Omega2 Login Brute-Force

OnionOS login scanner module for Onion Omega2 devices.Read More ...

Continue Reading
Nexus Repository Manager 3 new vulnerability has been used in mining Trojan spread, users are advised to fix as soon as possible-vulnerability warning-the black bar safety net

Recently, Ali cloud security monitoring to watchbog mining Trojan use the new exposure of the Nexus Repository Manager 3 remote code execution vulnerability(CVE-2019-7238)for attack and mining the eve ...

Continue Reading
Cisco RV340 set_snmp usmUserPrivKey Command Injection Remote Code Execution Vulnerability

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Cisco RV340 routers. Authentication is required to exploit this vulnerability. The specific ...

Continue Reading
Cisco RV340 set_snmp usmUserEngineID Command Injection Remote Code Execution Vulnerability

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Cisco RV340 routers. Authentication is required to exploit this vulnerability. The specific ...

Continue Reading
Metasploit Wrap-Up

## Nagios modules ![Metasploit Wrap-Up](https://blog.rapid7.com/content/images/2021/04/metasploit-ascii-1-1.png) Community member Erik Wynter has contributed two more Nagios XI modules this week, on t ...

Continue Reading

Back to Main

Subscribe for the latest news: