Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?
Progress Software Patches Critical LoadMaster Vulnerability: Are You Safe?
Progress Software issues an emergency fix for a 10/10 severity vulnerability in LoadMaster and LoadMaster MT Hypervisor products. The flaw, CVE-2024-7591, allows remote attackers to execute commands. An add-on package is available to address the risk for most versions, except the free one, so patch…

Hot Take:
Progress Software’s latest fix is like duct tape on a sinking ship—necessary, but you might still need a lifeboat! CVE-2024-7591 is the latest reminder that even vital systems can have glaring vulnerabilities. At least Progress is quick with the patch, but let’s not forget to hold our breaths for the free version users left in the dark.
Key Points:
- Progress Software issues a critical fix for LoadMaster and LoadMaster Multi-Tenant Hypervisor.
- CVE-2024-7591 allows remote command execution via a specially crafted HTTP request.
- The flaw affects LoadMaster version 7.2.60.0 and earlier, and MT Hypervisor version 7.1.35.11 and earlier.
- Patches released for all vulnerable versions, except the free version of LoadMaster.
- No active exploitation reported, but users urged to apply patches and security measures.