Tag: sql
-
Halo ITSM Vulnerability Lets Attackers Inject Malicious SQL Code
by
in SecurityNewsA critical security flaw has been discovered inHalo ITSM, an IT support management software widely deployed across cloud and on-premise environments. The vulnerability, which allows attackers to inject malicious SQL code, poses a significant threat to organizations relying on the software to manage IT support tickets containing sensitive data such as credentials and internal documentation.…
-
Halo ITSM Vulnerability Exposed Organizations to Remote Hacking
by
in SecurityNewsAn unauthenticated SQL injection vulnerability in Halo ITSM could have been exploited to read, modify, or insert data. The post Halo ITSM Vulnerability Exposed Organizations to Remote Hacking appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/halo-itsm-vulnerability-exposed-organizations-to-remote-hacking/
-
Halo ITSM Vulnerability Exposed Organizations to Remote Hacking
by
in SecurityNewsAn unauthenticated SQL injection vulnerability in Halo ITSM could have been exploited to read, modify, or insert data. The post Halo ITSM Vulnerability Exposed Organizations to Remote Hacking appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/halo-itsm-vulnerability-exposed-organizations-to-remote-hacking/
-
WordPress Plugin Vulnerability Opens Door to SQL Injection Exploits
by
in SecurityNewsA critical vulnerability in the popular WordPress plugin GamiPress has been uncovered, leaving users exposed to unauthenticated SQL injection attacks. The issue, assigned the identifier CVE-2024-13496, carries a high CVSS 3.1 score of 7.5, indicating significant potential for exploitation. CVE-2024-13496 was discovered during a security assessment of GamiPress version 7.2.1. The vulnerability affects all versions…
-
WordPress Plugin Vulnerability Opens Door to SQL Injection Exploits
by
in SecurityNewsA critical vulnerability in the popular WordPress plugin GamiPress has been uncovered, leaving users exposed to unauthenticated SQL injection attacks. The issue, assigned the identifier CVE-2024-13496, carries a high CVSS 3.1 score of 7.5, indicating significant potential for exploitation. CVE-2024-13496 was discovered during a security assessment of GamiPress version 7.2.1. The vulnerability affects all versions…
-
Pre-authentication SQL Injection to RCE in GLPI (CVE-2025-24799 / CVE-2025-24801)
by
in SecurityNewsSummary A significant vulnerability has been identified in GLPI, a popular open-source IT asset management tool. This vulnerability, tracked as CVE-2025-24799 and CVE-2025-24801, allows an First seen on research.kudelskisecurity.com Jump to article: research.kudelskisecurity.com/2025/03/14/pre-authentication-sql-injection-to-rce-in-glpi-cve-2025-24799-cve-2025-24801/
-
Exim Mail Transfer Vulnerability Allows Attackers to Inject Malicious SQL
by
in SecurityNewsA newly disclosed vulnerability in the Exim mail transfer agent (CVE-2025-26794) has sent shockwaves through the cybersecurity community, revealing a critical SQL injection flaw that enables attackers to compromise email systems and manipulate underlying databases. The vulnerability, confirmed in Exim Version 4.98 installations using SQLite for hints databases, represents one of the most severe email…
-
China-Linked Threat Group Targets Japanese Orgs’ Servers
by
in SecurityNewsWinnti once used a variety of malware but is now focused on SQL vulnerabilities and obfuscation, updated encryption, and new evasion methods to gain access. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/china-linked-threat-group-japanese-orgs-servers
-
Sicherheitslücke: Attacken auf PostgreSQL-Clients möglich
Ein Patch schließt eine Schadcode-Lücke, die unter bestimmten Voraussetzungen für Clients mit Zugriff auf Postgre-SQL-Datenbanken gefährlich werden kann. First seen on heise.de Jump to article: www.heise.de/news/Sicherheitsluecke-Angreifer-koennen-PostgreSQL-Datenbanken-attackieren-10282360.html
-
Experts discovered PostgreSQL flaw chained with BeyondTrust zeroday in targeted attacks
by
in SecurityNewsThreat actors are exploiting a zero-day SQL injection vulnerability in PostgreSQL, according to researchers from cybersecurity firm Rapid7. Rapid7 researchers discovered a high-severity SQL injection flaw, tracked as CVE-2025-1094, in PostgreSQL’s psql tool. The experts discovered the flaw while investigating the exploitation of the vulnerability CVE-2024-12356 for remote code execution. BeyondTrust patched CVE-2024-12356 in December…
-
Apache Fineract SQL Injection Vulnerability Allows Malicious Data Injection
by
in SecurityNewsThe Apache Software Foundation has disclosed a critical SQL injection vulnerability in its widely utilized financial platform, Apache Fineract. The flaw, tracked as CVE-2024-32838, affects multiple API endpoints and poses a significant risk to applications built on this platform. This vulnerability allows authenticated attackers to inject malicious SQL data, potentially compromising sensitive information and the overall…
-
What is anomaly detection? Behavior-based analysis for cyber threats
by
in SecurityNewsa priori the bad thing that you’re looking for,” Bruce Potter, CEO and founder of Turngate, tells CSO. “It’ll just show up because it doesn’t look like anything else or doesn’t look like it’s supposed to. People have been tilting at that windmill for a long time, since the 1980s, trying to figure out what…
-
PostgreSQL Vulnerability Exploited Alongside BeyondTrust Zero-Day in Targeted Attacks
by
in SecurityNewsThreat actors who were behind the exploitation of a zero-day vulnerability in BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) products in December 2024 likely also exploited a previously unknown SQL injection flaw in PostgreSQL, according to findings from Rapid7.The vulnerability, tracked as CVE-2025-1094 (CVSS score: 8.1), affects the PostgreSQL interactive tool psql.”An First…
-
Die besten DAST- & SAST-Tools
by
in SecurityNews
Tags: access, ai, api, application-security, authentication, awareness, cloud, cyberattack, cybersecurity, docker, framework, HIPAA, injection, PCI, rat, risk, risk-management, service, software, sql, supply-chain, tool, vulnerability, vulnerability-managementTools für Dynamic und Static Application Security Testing helfen Entwicklern, ihren Quellcode zu härten. Wir zeigen Ihnen die besten Tools zu diesem Zweck.Die Softwarelieferkette respektive ihre Schwachstellen haben in den vergangenen Jahren für viel Wirbel gesorgt. Ein besonders schlagzeilenträchtiges Beispiel ist der Angriff auf den IT-Dienstleister SolarWinds, bei dem mehr als 18.000 Kundenunternehmen betroffen waren.…
-
Security Researchers Warn of New Risks in DeepSeek AI App
by
in SecurityNewsWeak Encryption, Data Transfers to China, Hidden ByteDance Links Found. Security researchers found DeepSeek AI has weak encryption, SQL injection flaws and sends user data to Chinese state-linked entities. Its AI model failed jailbreak tests, making it prone to manipulation. Regulators in Europe, South Korea, and Australia are investigating, with bans and warnings issued over…
-
Zimbra Releases Security Updates for SQL Injection, Stored XSS, and SSRF Vulnerabilities
by
in SecurityNewsZimbra has released software updates to address critical security flaws in its Collaboration software that, if successfully exploited, could result in information disclosure under certain conditions.The vulnerability, tracked as CVE-2025-25064, carries a CVSS score of 9.8 out of a maximum of 10.0. It has been described as an SQL injection bug in the ZimbraSync Service…
-
What Is SQL Injection? Examples Prevention Tips
by
in SecurityNewsLearn how SQL Injection works and how this dangerous vulnerability lets attackers manipulate databases, steal data, and cause major security breaches. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/what-is-sql-injection-and-how-can-it-hurt-you/
-
Hochriskante SQLLücke gefährdet Avi Load Balancer
by
in SecurityNewsBroadcom warnt vor einer SQL-Injection-Lücke in VMware Avi Load Balancer. Angreifer können unbefugt auf die Datenbank zugreifen. First seen on heise.de Jump to article: www.heise.de/news/VMware-Hochriskante-SQL-Injection-Luecke-gefaehrdet-Avi-Load-Balancer-10260568.html
-
Broadcom Warns of High-Severity SQL Injection Flaw in VMware Avi Load Balancer
by
in SecurityNewsBroadcom has alerted of a high-severity security flaw in VMware Avi Load Balancer that could be weaponized by malicious actors to gain entrenched database access.The vulnerability, tracked as CVE-2025-22217 (CVSS score: 8.6), has been described as an unauthenticated blind SQL injection.”A malicious user with network access may be able to use specially crafted SQL queries…
-
VMware fixed a flaw in Avi Load Balancer
by
in SecurityNewsVMware fixed a high-risk blind SQL injection vulnerability in Avi Load Balancer, allowing attackers to exploit databases via crafted queries. VMware warns of a high-risk blind SQL injection vulnerability, tracked as CVE-2025-22217 (CVSS score of 8.6), in Avi Load Balancer, allowing attackers with network access to exploit databases via crafted queries. >>VMware AVI Load Balancer…
-
VMware Warns of High-Risk Blind SQL Injection Bug in Avi Load Balancer
VMware warns that a malicious user with network access may be able to use specially crafted SQL queries to gain database access. The post VMware Warns of High-Risk Blind SQL Injection Bug in Avi Load Balancer appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/vmware-warns-of-high-risk-blind-sql-injection-bug-in-avi-load-balancer/
-
SQL Injection Vulnerability in Microsoft’s DevBlogs Lets Hackers Injecting Malicious SQL
by
in SecurityNewsIn a recent discovery, a security researcher uncovered a critical SQL injection vulnerability on Microsoft’s DevBlogs website (accessible at https://devblogs.microsoft.com). This vulnerability could allow attackers to manipulate the site’s underlying database by injecting malicious SQL queries, posing a significant risk to the platform and its data integrity. Identifying the Vulnerability The vulnerability was found in the…