CISA released its customized Log4Shell scanning solution and a list of other third-party scanners. However, all the Log4j scanners tested by Rezilion failed to detect all file formats.
Hackers could exploit ProxyToken authentication bypass vulnerability to steal victims’ emails and personally identifiable information from vulnerable Microsoft Exchange servers.
ProxyLogon vulnerabilities can cause significant issues for affected companies. Fortunately, Microsoft offered several solutions for fixing these problems, even providing one for people lacking on-site security assistance.
Security researchers discovered 33 vulnerabilities in millions of devices using four popular open-source libraries. The bugs allow attacks, including remote code execution and DDoS.