SecPod Labs
Security Research
In-depth CVE write-ups, vulnerability analysis, and security intelligence from the SecPod Research team.

CVE Research
WinRM servers are the latest prey for the Wormable Windows HTTP vulnerability
Microsoft recently patched a critical remote code execution vulnerability in the HTTP Protocol Stack (http. sys). Used by the Windows built-in IIS server for processing HTTP requests. The vulnerability is assigned with an identifier CVE-2021-31166 and has a CVSS score of 9.8. This is a wormable vuln...

CVE Research
Patch Tuesday: Microsoft Security Updates for May 2021.
Microsoft has released May 2021 Patch Tuesday security updates with a total of 55 vulnerabilities in the family of Windows and Mac operating systems and related products. In the release by Microsoft, 4 vulnerabilities were rated as Critical, 50 as Important, and 1 as Moderate. Therefore, a good vuln...

CVE Research
Critical 21Nails Flaws Affect Millions of Exim Servers
A series of critical vulnerabilities were recently disclosed to reside in the popular internet mailer, Exim. The vulnerabilities, collectively termed as 21Nails, were brought to light by researchers at Qualys. The advisory includes 21 vulnerabilities, some of which can be used to gain elevated privi...

CVE Research
Google Has Released a Fix For High-Severity RCE Vulnerability in Chrome Browser
Google has released a new version 90 to fix high severity vulnerability in the V8 Javascript component of Google Chrome. Google Chrome RCE Vulnerability is tracked as CVE-2021-21227 is an insufficient data validation vulnerability. Successful exploitation of the vulnerability allows remote attackers...

CVE Research
Apple Critical Security Updates April 2021
Apple released security updates for multiple products. The exploitation of some of these security flaws will allow an attacker to bypass many core Apple security mechanisms, crash the application, potentially control affected systems, and putting Mac users at great risk. A vulnerability management s...

CVE Research
Trend Micro Antivirus Products Exploited Wildly
A threat actor is actively exploiting a bug currently in Trend Micro’s security products to do privilege escalation on Windows systems. The vulnerability is tracked as CVE-2020-24557 and is affecting two major security products of the company – Apex One and OfficeScan. A good Vulnerability managemen...

CVE Research
Pulse Connect Secure Zero-Day Vulnerability Under Active Exploitation (CVE-2021-22893)
Pulse Secure released an advisory on April 19 about a Critical Zero-day Authentication Bypass vulnerability identified as CVE-2021-22893 in Pulse Connect Secure SSL VPN appliances. The vulnerability allows a remote attacker to bypass authentication and perform remote arbitrary file execution on the ...

CVE Research
Second Zero-Day Exploit for Google Chrome in the Same Week
Google Chrome users who were relieved by patching the recent zero-day advisory are taken aback by the news of another PoC exploit posted on Twitter by a security researcher, Frust. This affects the recent version of Chrome, 89.0.4389.128, which was the fix for the first zero-day vulnerability of the...

CVE Research
Cloud Based Patch Management Solution: Five Reasons Why It Thrives Better!
Cloud based patch management software play a major role to secure your IT infrastructure. Time and again, unpatched software is exploited to breach the network, spread malware, and execute attacks. With the onset of remote work, detecting and deploying missing patches are now more difficult than eve...
