DIGITAL TRANSFORMATION Latest News
BY:WMK-IT
- CVE-2017-5638 (CVSS score: 10.0) - Apache Struts 2 remote code execution (RCE) vulnerability
- CVE-2017-9805 (CVSS score: 8.1) - Apache Struts 2 REST plugin XStream RCE vulnerability
- CVE-2018-7600 (CVSS score: 9.8) - Drupal Core RCE vulnerability
- CVE-2020-14750 (CVSS score: 9.8) - Oracle WebLogic Server RCE vulnerability
- CVE-2020-25213 (CVSS score: 10.0) - WordPress File Manager (wp-file-manager) plugin RCE vulnerability
- CVE-2020-17496 (CVSS score: 9.8) - vBulletin 'subwidgetConfig' unauthenticated RCE vulnerability
- CVE-2020-11651 (CVSS score: 9.8) - SaltStack Salt authorization weakness vulnerability
- CVE-2017-12611 (CVSS score: 9.8) - Apache Struts OGNL expression RCE vulnerability
- CVE-2017-7657 (CVSS score: 9.8) - Eclipse Jetty chunk length parsing integer overflow vulnerability
- CVE-2021-29441 (CVSS score: 9.8) - Alibaba Nacos AuthFilter authentication bypass vulnerability
- CVE-2020-14179 (CVSS score: 5.3) - Atlassian Jira information disclosure vulnerability
- CVE-2013-4547 (CVSS score: 8.0) - Nginx crafted URI string handling access restriction bypass vulnerability
- CVE-2019-0230 (CVSS score: 9.8) - Apache Struts 2 RCE vulnerability
- CVE-2018-11776 (CVSS score: 8.1) - Apache Struts OGNL expression RCE vulnerability
- CVE-2020-7961 (CVSS score: 9.8) - Liferay Portal untrusted deserialization vulnerability
Even more troublingly, the 15 most commonly used Docker images on the official Docker Hub repository has been revealed to harbor hundreds of vulnerabilities spanning across python, node, wordpress, golang, nginx, postgres, influxdb, httpd, mysql, debian, memcached, redis, mongo, centos, and rabbitmq, underscoring the need to secure containers from a wide range of potential threats at each stage of the development pipeline.
"Users and organizations should always apply security best practices, which include utilizing the security by design approach, deploying multilayered virtual patching or vulnerability shielding, employing the principle of least privilege, and adhering to the shared responsibility model," the researchers concluded.
Found this article interesting? Follow THN on Facebook, Twitter and LinkedIn to read more exclusive content we post.
Join Our Telegram Channel for More Insights
WMK-IT
Machinlearning
python
Programming
Javascript
Css
Mobile Application
Web development
Coding
Digital Marketing
Web Development
WMK-IT&TECH
Job
Blog post
WMK Tech Copyright © 2024. All rights reserved