Articles tagged "Patch"

Found 124 articles

Atlassian has addressed a significant security vulnerability in Apache Tika, which affects several of its products including Bamboo, Bitbucket, Confluence, Crowd, Fisheye/Crucible, and Jira. This flaw poses a risk as it could potentially allow attackers to exploit the software, putting user data at risk. The company has released software updates to patch the vulnerability, urging users to apply these updates promptly to ensure their systems remain secure. This incident underscores the importance of regularly updating software to protect against known vulnerabilities. Users of the affected products should prioritize these updates to safeguard their environments from potential exploitation.

Impact: Bamboo, Bitbucket, Confluence, Crowd, Fisheye/Crucible, Jira
Remediation: Software updates released by Atlassian for affected products.
Read Original

Apple has issued updates for macOS and iOS to address two zero-day vulnerabilities in WebKit that were found to be exploited in a highly sophisticated attack. These vulnerabilities could allow attackers to execute malicious code on affected devices, potentially compromising user data and privacy. The updates are crucial for users of Apple's platforms, as they help protect against active threats that exploit these flaws. Users are encouraged to install the latest updates to ensure their devices are secure. This incident also raises concerns about the interconnectedness of browser vulnerabilities, as these flaws are linked to a Chrome exploit, indicating that security issues can cross platform boundaries.

Impact: macOS, iOS, WebKit
Remediation: Install the latest macOS and iOS updates that patch the vulnerabilities.
Read Original

Apple has released emergency updates to address two zero-day vulnerabilities that were actively exploited in highly sophisticated attacks targeting specific individuals. These flaws could allow attackers to gain unauthorized access to devices, putting sensitive information at risk. Users of affected devices are urged to update their systems immediately to protect against potential exploitation. The vulnerabilities were significant enough to prompt Apple to act quickly, indicating the serious nature of these threats. This situation emphasizes the ongoing risk that zero-day vulnerabilities pose, particularly for individuals in sensitive positions.

Impact: Apple devices including iPhones, iPads, and Macs running specific versions of iOS and macOS.
Remediation: Users should update their devices to the latest versions of iOS and macOS as per the emergency patches released by Apple.
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent directive for U.S. federal agencies to patch a serious vulnerability found in GeoServer. This flaw is being exploited in XML External Entity (XXE) injection attacks, which can allow attackers to access sensitive data. The exploitation of this vulnerability poses a significant risk to the integrity and confidentiality of systems using GeoServer. Agencies are advised to take immediate action to defend against potential breaches and secure their data. Given that this vulnerability is actively being exploited, it is crucial for affected organizations to prioritize the necessary updates to protect their networks from compromise.

Impact: GeoServer versions affected by the vulnerability; U.S. federal agencies using GeoServer.
Remediation: CISA has ordered federal agencies to apply the latest patches for GeoServer to mitigate the risk associated with the vulnerability. Specific patch numbers or version updates were not mentioned in the article.
Read Original

Researchers at Wiz have discovered a serious vulnerability in Gogs, a self-hosted Git service. This flaw allows attackers to bypass a previously reported remote code execution (RCE) vulnerability that was disclosed last year. Although the specifics of the exploitation have not been detailed, the revelation indicates that the vulnerability has been exploited for months without a patch available to fix it. This situation poses significant risks for organizations that rely on Gogs for their version control, as it could lead to unauthorized access and potentially severe security breaches. Users of Gogs need to stay vigilant and consider alternative security measures while waiting for a fix.

Impact: Gogs (self-hosted Git service)
Remediation: N/A
Read Original

A serious security vulnerability in Gogs, a self-hosted Git service, is currently being exploited, affecting over 700 instances worldwide. This flaw, identified as CVE-2025-8110, has a CVSS score of 8.7 and allows attackers to overwrite files via the file update API. The lack of a patch means that many users are at risk, and researchers from Wiz have highlighted the urgency of addressing this issue. Companies using Gogs should take immediate action to secure their installations and monitor for any signs of compromise. The situation underscores the need for timely updates and vigilance in managing self-hosted services.

Impact: Gogs (self-hosted Git service), CVE-2025-8110
Remediation: A fix for the vulnerability is reportedly in development. Users should monitor for updates and apply patches as soon as they become available. In the meantime, users are advised to review their configurations and limit access to the Gogs instances to mitigate potential exploitation.
Read Original

Researchers have identified a significant surge in attacks linked to a vulnerability in React2Shell, with more than 50 confirmed victims to date. This issue stems from a critical defect that has left many systems exposed, as reports indicate that about half of these vulnerable instances remain unpatched. The rapid exploitation of this flaw underscores the urgency for affected organizations to take immediate action to secure their systems. Companies using React2Shell need to prioritize updates and patch deployments to mitigate these risks. Failure to address this vulnerability could lead to more widespread damage and data breaches as attackers continue to exploit the flaw in the wild.

Impact: React2Shell
Remediation: Organizations should apply the latest patches and updates for React2Shell as soon as possible to protect against exploitation.
Read Original

Siemens, Rockwell Automation, and Schneider Electric have recently patched multiple vulnerabilities across their industrial control systems (ICS). These vulnerabilities could potentially allow attackers to gain unauthorized access or disrupt operations. The updates affect a variety of products, including Siemens' SCADA systems and Rockwell's automation software. Users of these systems are strongly advised to apply the patches to protect against possible exploitation. As cyber threats to critical infrastructure continue to evolve, timely updates are essential to maintain system integrity and security.

Impact: Siemens SCADA systems, Rockwell Automation products, Schneider Electric systems
Remediation: Users should apply the latest patches provided by Siemens, Rockwell, and Schneider Electric to mitigate vulnerabilities.
Read Original

Ivanti has issued a warning to customers regarding a serious vulnerability in its Endpoint Manager (EPM) software that could allow remote code execution by attackers. This flaw could potentially enable unauthorized access to systems managed by EPM, posing a significant risk to organizations using the software. Users are urged to apply patches as soon as possible to protect their systems from potential exploitation. The vulnerability affects various versions of Ivanti's Endpoint Manager, making it crucial for affected organizations to act quickly. Failure to address this issue could lead to severe security breaches, including data theft and system compromise.

Impact: Ivanti Endpoint Manager (EPM) versions affected, specific versions not specified.
Remediation: Customers are advised to patch their Endpoint Manager software immediately; specific patch details not provided.
Read Original

On December 2025 Patch Tuesday, a total of 57 Common Vulnerabilities and Exposures (CVEs) were reported, including one critical zero-day vulnerability and two others that have been publicly disclosed. The zero-day is particularly concerning as it is actively exploited, meaning attackers may already be using it to compromise systems. Users and organizations running affected software should prioritize applying the latest patches to mitigate these risks. The vulnerabilities impact various products and systems, highlighting the ongoing need for vigilance in cybersecurity practices. Keeping software updated is essential to defend against potential exploitation.

Impact: Various software products from multiple vendors (specific products not detailed)
Remediation: Apply the latest patches released during December 2025 Patch Tuesday
Read Original

A critical security vulnerability, CVE-2025-66516, has been identified in Apache Tika, posing a risk of XML external entity (XXE) injection attacks. With a CVSS score of 10.0, this flaw affects multiple modules and requires urgent attention from users to prevent exploitation.

Impact: Affected products include Apache Tika tika-core (versions 1.13-3.2.1), tika-pdf-module (versions 2.0.0-3.2.1), and tika-parsers (versions 1.13-1.28.5) across all platforms.
Remediation: Users are advised to apply the latest patches for the affected modules: tika-core (1.13-3.2.1), tika-pdf-module (2.0.0-3.2.1), and tika-parsers (1.13-1.28.5) to mitigate the vulnerability.
Read Original

A critical vulnerability in the React JavaScript library is currently being targeted by threat actors linked to China, highlighting the urgency for developers to implement patches. The situation underscores the importance of immediate action to secure applications using this library from potential exploitation.

Impact: React JavaScript library
Remediation: Patch the React library to the latest version as soon as possible.
Read Original

Cloudflare has reported an outage due to the emergency patching of a critical React remote code execution vulnerability that is currently being exploited in attacks. This incident highlights the urgency and severity of addressing such vulnerabilities to maintain security and service continuity.

Impact: React framework versions vulnerable to remote code execution, impacting applications built using React.
Remediation: Apply the emergency patch provided by the React development team to mitigate the vulnerability. Ensure all applications using React are updated to the latest secure version as soon as possible.
Read Original

Chrome 143 has been released with patches addressing 13 vulnerabilities, including a critical flaw in the V8 JavaScript engine. This update is crucial for maintaining the security of users against potential exploits targeting these vulnerabilities.

Impact: Google Chrome, V8 JavaScript engine
Remediation: Update to Chrome 143 or later to apply the patches.
Read Original

ASUS has issued a firmware update to address nine security vulnerabilities, including a critical authentication bypass flaw in routers with AiCloud functionality. This flaw poses a significant risk as it could allow unauthorized access to the routers, potentially compromising user data and network security.

Impact: ASUS routers with AiCloud enabled
Remediation: Firmware update provided by ASUS; specific patch version not mentioned.
Read Original
PreviousPage 8 of 9Next