AppCheck Security Blog

FEATURED POST

**CRITICAL RISK** CVE-2023-33246 Apache RocketMQ < v4.9.6 / 5.1.1 – Unauthorised Remote Execution of Arbitrary Commands via Code Injection in Update Configuration Function

Appcheck - icons
AppCheck have once again been recognised by our customers and G2 as Leaders in the cyber security space. This is a huge honour for us and reflects all the hard work that goes into, not only product development, but also our commitment to achieving customer satisfaction.
Appcheck - icons
Today, as part of our broader strategy towards proactive security, we are happy to announce our public facing version of this service to allow everyone to see details of the latest threats and to see if particular threats are being actively exploited.
Appcheck - icons
This article covers recent vulnerabilities found to be actively exploited. They are categorised based not only on the category of exploitation, but their impact, and versions affected. This article also informs on any official fix and remediation guidance for the listed vulnerabilities.
Appcheck - icons
Malicious code was discovered in the upstream tarballs of XZ Utils, starting with version 5.6.0. Under the right circumstances this could potentially enable a malicious actor to gain unauthorised remote access to a system remotely via protocols including SSH, leading to potential total compromise and sequestration of the system.
Appcheck - icons
We have updated the AppCheck dashboard to include a updates and alerts panel. This update aims to help provide a better experience for our customers making it easier to highlight changes or problems that could impact scanning their estates.
Appcheck - icons
AppCheck has identified multiple Cross-Site Scripting vulnerabilities within the popular “Photo Gallery” Wordpress plugin by 10Web. Full vulnerability detail and remediation advice within.

Get in touch

Start your free trial

Your details
IP Addresses
URLs