May 7, 2024, 3:20 p.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news

Fifty-seven percent of more than 90,000 internet-exposed hosts continue to run TinyProxy instances unpatched against the critical use-after-free vulnerability, tracked as CVE-2023-49606, which could be leveraged to facilitate remote code execution attacks via an unauthenticated HTTP request, reports The Hacker News.


Article Link: Widespread RCE compromise likely with critical TinyProxy bug | SC Media


1 post - 1 participant


Read full topic

article attacks bug code code execution compromise continue critical cve exposed free hacker http internet link rce remote code remote code execution reports request run the hacker news tinyproxy unauthenticated unpatched use-after-free vulnerability

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC