Patching

Blog Archive Category

the exploit blog logo
The Exploit: Penetration Testing Insights From The Frontlines

The Exploit articles categorized as Patching

  • Critical Buffer Overflow Vulnerability in Palo Alto Networks PAN-OS Software

    Critical Buffer Overflow Vulnerability in Palo Alto Networks PAN-OS Software

    By Andrew Trexler CVE-2026-0300 is a critical buffer overflow vulnerability in Palo Alto’s PAN-OS software. Discover if you are affected and what to do now. May 13, 2026
  • Copy Fail - Local Linux Privilege Escalation in 4 lines

    Copy Fail – Local Linux Privilege Escalation in 4 lines

    By Jason Taylor CVE-2026-31431, dubbed Copy Fail, allows privilege escalation to root on Linux distros missing the latest kernel patches. Learn what to do in this blog. May 8, 2026
  • Smart Slider 3 Pro WordPress/Joomla Plugin Supply Chain Compromise

    Smart Slider 3 Pro WordPress/Joomla Plugin Supply Chain Compromise

    By Jason Taylor Last week’s supply chain attack caused many users of the WordPress and Joomla plugin Smart Slider 3 Pro to inadvertently patch to a malicious version. April 15, 2026
  • BeyondTrust RCE Vulnerability Exploited: Critical 9.9 CVSS Flaw Under Active Attack

    BeyondTrust RCE Vulnerability Exploited: Critical 9.9 CVSS Flaw Under Active Attack

    By Ryan Chaplin While BeyondTrust patched cloud-hosted Remote Support customers earlier this month, on-premises deployments of BeyondTrust must manually patch to remediate. February 17, 2026
  • CVE-2025-59886 Eaton Exploit Code Published

    CVE-2025-59886 Eaton Exploit Code Published

    By Jason Taylor With exploit code available for the vulnerabilities in Eaton’s xComfort Ethernet Communication Interface, Jason Taylor recommends replacing or isolating. February 5, 2026
  • CVE‑2020‑12812 and Why It’s Still an Issue Five Years Later

    CVE‑2020‑12812 and Why It’s Still an Issue Five Years Later

    By Scottie Cole Principal Penetration Tester Scottie Cole explains why Fortinet released a new security advisory about CVE‑2020‑12812 and what your organization should check. January 16, 2026