Learn Search

Search across all Learn content

SecPod Labs

Security Research

In-depth CVE write-ups, vulnerability analysis, and security intelligence from the SecPod Research team.

WordPress Plugin Contact Form 7 Critical File Upload Vulnerability (CVE-2020-35489)

CVE Research

WordPress Plugin Contact Form 7 Critical File Upload Vulnerability (CVE-2020-35489)

Contact Form 7 is a popular WordPress plugin that is used to create, customize, and manage multiple contact forms on WordPress sites. A critical file upload vulnerability (CVE-2020-35489) has an identity in the WordPress Contact Form 7 plugin, allowing an attacker to execute arbitrary code on affect...

Dec 17, 2020 • 2 min read

Critical Zero-Day in HPE Systems Insight Manager Revealed

CVE Research

Critical Zero-Day in HPE Systems Insight Manager Revealed

Hewlett Packard Enterprise recently revealed a security flaw in its Systems Insight Manager software (Vulnerability in HPE Systems). This zero-day bug resides in the recent versions of the server software and is reportedly unpatched. Servers running the affected software are liable to Remote Code Ex...

Dec 16, 2020 • 2 min read

SolarWinds SUNBURST Backdoor Compromises Multiple Global Victims

CVE Research

SolarWinds SUNBURST Backdoor Compromises Multiple Global Victims

Highly evasive hackers breached Orion IT monitoring and management software of SolarWinds and deployed malware updates to it. It is known as solarwinds sunburst. As a result, attackers have gained access to government, consulting, technology, telecom, and extractive entities in North America, Europe...

Dec 14, 2020 • 3 min read

Apple Critical Security Updates December 2020

CVE Research

Apple Critical Security Updates December 2020

Apple released security updates for multiple products. The exploitation of some of these security flaws will allow an attacker to crash the application or potentially control affected systems. However, a patch management solution can stop the exploitation.

Dec 14, 2020 • 3 min read

Critical Command Injection Vulnerabilities in D-Link DSR VPN Routers

CVE Research

Critical Command Injection Vulnerabilities in D-Link DSR VPN Routers

Multiple critical command injection vulnerabilities have identified in the D-Link DSR VPN router family products. These vulnerabilities are identified with CVE-2020-25757, CVE-2020-25759, CVE-2020-25758 and can allow an attacker to gain complete root access to the affected device. Vulnerability mana...

Dec 09, 2020 • 3 min read

VMware Products Under Active Attack Through a Critical Zero-Day Vulnerability

CVE Research

VMware Products Under Active Attack Through a Critical Zero-Day Vulnerability

VMware has released security updates to fix a critical vulnerability that is being exploited in the wild. According to the advisory, CVE-2020-4006 is a command injection bug, and attackers can take control of the system once exploited. This fix supersedes an initial workaround released by VMware in ...

Dec 07, 2020 • 2 min read

Closing the Ever-Widening Gap Between Vulnerability Scanning and Patch Management

CVE Research

Closing the Ever-Widening Gap Between Vulnerability Scanning and Patch Management

Security risk management is a complicated and time-consuming affair. Organizations spend many resources to ensure all their business operations and data are running and stored by risk-free assets. Patch management tools are the most common tools to manage and mitigate risks. You scan, detect and reg...

Dec 07, 2020 • 4 min read

DarkIRC Botnet: Infecting Thousands of Unpatched Oracle WebLogic Servers

CVE Research

DarkIRC Botnet: Infecting Thousands of Unpatched Oracle WebLogic Servers

DarkIRC is a multi-featured botnet. The bot comes with a variety of capabilities like keylogging, the ability to download files and execute commands on the infected server, steal credentials, spread to other devices via MSSQL and RDP (brute force), SMB, or USB, as well as perform several versions of...

Dec 02, 2020 • 3 min read

Open-Source Vulnerability Scanners: How a Free Tool Carries Hidden Challenges

CVE Research

Open-Source Vulnerability Scanners: How a Free Tool Carries Hidden Challenges

Over the past 15 years, vulnerability management has evolved from a simple process to a complex business practice. The increasing number of vulnerabilities, rising cyber-attacks, and software vulnerabilities as the leading cause of breaches have highlighted the limitations of open source vulnerabili...

Nov 23, 2020 • 6 min read