Learn Search

Search across all Learn content

SecPod Labs

Security Research

In-depth CVE write-ups, vulnerability analysis, and security intelligence from the SecPod Research team.

WinRM servers are the latest prey for the Wormable Windows HTTP vulnerability

CVE Research

WinRM servers are the latest prey for the Wormable Windows HTTP vulnerability

Microsoft recently patched a critical remote code execution vulnerability in the HTTP Protocol Stack (http. sys). Used by the Windows built-in IIS server for processing HTTP requests. The vulnerability is assigned with an identifier CVE-2021-31166 and has a CVSS score of 9.8. This is a wormable vuln...

May 23, 2021 • 4 min read

Patch Tuesday: Microsoft Security Updates for May 2021.

CVE Research

Patch Tuesday: Microsoft Security Updates for May 2021.

Microsoft has released May 2021 Patch Tuesday security updates with a total of 55 vulnerabilities in the family of Windows and Mac operating systems and related products. In the release by Microsoft, 4 vulnerabilities were rated as Critical, 50 as Important, and 1 as Moderate. Therefore, a good vuln...

May 11, 2021 • 4 min read

Critical 21Nails Flaws Affect Millions of Exim Servers

CVE Research

Critical 21Nails Flaws Affect Millions of Exim Servers

A series of critical vulnerabilities were recently disclosed to reside in the popular internet mailer, Exim. The vulnerabilities, collectively termed as 21Nails, were brought to light by researchers at Qualys. The advisory includes 21 vulnerabilities, some of which can be used to gain elevated privi...

May 05, 2021 • 2 min read

Google Has Released a Fix For High-Severity RCE Vulnerability in Chrome Browser

CVE Research

Google Has Released a Fix For High-Severity RCE Vulnerability in Chrome Browser

Google has released a new version 90 to fix high severity vulnerability in the V8 Javascript component of Google Chrome. Google Chrome RCE Vulnerability is tracked as CVE-2021-21227 is an insufficient data validation vulnerability. Successful exploitation of the vulnerability allows remote attackers...

Apr 29, 2021 • 2 min read

Apple Critical Security Updates April 2021

CVE Research

Apple Critical Security Updates April 2021

Apple released security updates for multiple products. The exploitation of some of these security flaws will allow an attacker to bypass many core Apple security mechanisms, crash the application, potentially control affected systems, and putting Mac users at great risk. A vulnerability management s...

Apr 27, 2021 • 4 min read

Trend Micro Antivirus Products Exploited Wildly

CVE Research

Trend Micro Antivirus Products Exploited Wildly

A threat actor is actively exploiting a bug currently in Trend Micro’s security products to do privilege escalation on Windows systems. The vulnerability is tracked as CVE-2020-24557 and is affecting two major security products of the company – Apex One and OfficeScan. A good Vulnerability managemen...

Apr 22, 2021 • 2 min read

Pulse Connect Secure Zero-Day Vulnerability Under Active Exploitation (CVE-2021-22893)

CVE Research

Pulse Connect Secure Zero-Day Vulnerability Under Active Exploitation (CVE-2021-22893)

Pulse Secure released an advisory on April 19 about a Critical Zero-day Authentication Bypass vulnerability identified as CVE-2021-22893 in Pulse Connect Secure SSL VPN appliances. The vulnerability allows a remote attacker to bypass authentication and perform remote arbitrary file execution on the ...

Apr 21, 2021 • 3 min read

Second Zero-Day Exploit for Google Chrome in the Same Week

CVE Research

Second Zero-Day Exploit for Google Chrome in the Same Week

Google Chrome users who were relieved by patching the recent zero-day advisory are taken aback by the news of another PoC exploit posted on Twitter by a security researcher, Frust. This affects the recent version of Chrome, 89.0.4389.128, which was the fix for the first zero-day vulnerability of the...

Apr 15, 2021 • 3 min read

Cloud Based Patch Management Solution: Five Reasons Why It Thrives Better!

CVE Research

Cloud Based Patch Management Solution: Five Reasons Why It Thrives Better!

Cloud based patch management software play a major role to secure your IT infrastructure. Time and again, unpatched software is exploited to breach the network, spread malware, and execute attacks. With the onset of remote work, detecting and deploying missing patches are now more difficult than eve...

Apr 15, 2021 • 3 min read