News Advisories

Cyber Security News

RSS Center For Internet Security Advisories
  • Multiple vulnerabilities in VMware vRealize Log Insight Could Allow for Remote Code Execution January 25, 2023
    Multiple vulnerabilities have been discovered in VMware vRealize Log Insight, the most severe of which could allow for remote code execution. VMware vRealize Log Insight enables real-time logging for all components that build up the management capabilities of the SDDC. Successful exploitation of the most severe of these vulnerabilities could allow for remote code execution […]
  • Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution – PATCH: NOW – TLP: CLEAR January 25, 2023
    Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser used to access the internet. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on […]
  • Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution January 24, 2023
    Multiple vulnerabilities have been discovered in Apple Products, the most severe of which could allow for arbitrary code execution. Safari is a graphical web browser developed by Apple. iOS is a mobile operating system for mobile devices, including the iPhone, iPad, and iPod touch. macOS Monterey is the 18th and release of macOS. macOS Big […]
  • A Vulnerability in Sophos Firewall Could Allow for Remote Code Execution January 19, 2023
    A vulnerability has been discovered in Sophos Firewall that could allow for remote code execution. Sophos Firewall is a next generation firewall product which enables users to manage, detect and respond to threats on the network. Successful exploitation of this vulnerability could allow for remote code execution in the context of the affected service account. […]
  • Multiple Vulnerabilities in Mozilla Firefox Could Allow for Arbitrary Code Execution January 18, 2023
    Multiple vulnerabilities have been discovered in Mozilla Firefox and Firefox Extended Support Release (ESR), the most severe of which could allow for arbitrary code execution. Mozilla Firefox is a web browser used to access the Internet. Mozilla Firefox ESR is a version of the web browser intended to be deployed in large organizations. Successful exploitation […]
  • Multiple Vulnerabilities in Junos OS Could Allow for Denial of Service January 14, 2023
    Multiple vulnerabilities have been discovered in Junos OS, the most severe of which could allow for denial of service. Junos OS is an operating system that runs across all Juniper routing, switching, and security infrastructure. Successful exploitation of the most severe of these vulnerabilities could create denial of service conditions across a network.
  • Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution January 10, 2023
    Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser used to access the internet. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on […]
  • Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution January 10, 2023
    Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution. Adobe Acrobat and Reader are used to view, create, print, and manage PDF files. Adobe InDesign is a desktop publishing and page layout designing software application that can be used to create works such as posters, […]
  • Critical Patches Issued for Microsoft Products, January 10, 2023 January 10, 2023
    Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users […]
  • A Vulnerability in Brocade Fabric OS Could Allow for Arbitrary Command Injection January 4, 2023
    A vulnerability has been discovered in Brocade Fabric OS, which could allow an attacker to execute arbitrary commands on the targeted system. Brocade Fabric OS software is used by IBM b-type SAN directors and switches. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary commands on a Brocade Fabric OS switch. Depending […]
  • Multiple Vulnerabilities in Google Android OS Could Allow for Arbitrary Code Execution January 4, 2023
    Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for arbitrary code execution. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution. […]
  • A Vulnerability in KSMBD for Linux Could Allow for Remote Code Execution December 27, 2022
    A vulnerability have been discovered in KSMBD for Linux that could allow for remote code execution. KSMBD is a Linux kernel daemon which implements the SMB3 protocol in kernel space for sharing files over a network. Successful exploitation of this vulnerability could allow for arbitrary code execution in the context of a remote unauthenticated user. […]
  • Critical Patches Issued for Microsoft Products December 14, 2022
    Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users […]
  • Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution December 14, 2022
    Multiple vulnerabilities have been discovered in Apple Products, the most severe of which could allow for arbitrary code execution. iCloud for Windows allows access your photos, videos, calendar, files, and other important information on your Windows PC. Safari is a graphical web browser developed by Apple. macOS Ventura is the 19th and current major release […]
  • Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution. December 14, 2022
    Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution. Experience Manager is a comprehensive content management solution for building websites, mobile apps and forms Illustrator is a vector graphics editor and design program. Adobe Campaign is a marketing automation platform used in email automation, delivery […]
  • Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution December 14, 2022
    Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser used to access the internet. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on […]
  • A vulnerability has been discovered in Citrix Gateway and Citrix ADC which could allow for remote code execution December 14, 2022
    A vulnerability has been discovered in Citrix Gateway and Citrix ADC which could allow for remote code execution. Citrix ADC and Gateway is an Application Delivery Controller and a gateway service to products respectively. Successful exploitation of this vulnerability could allow an unauthenticated remote attacker to perform arbitrary code execution. Depending on the permission associated […]
  • Multiple Vulnerabilities in VMware vRealize Network Insight (vRNI) Could Allow for Arbitrary Code Execution December 13, 2022
    Multiple vulnerabilities have been discovered in VMware vRealize Network Insight (vRNI), the most severe of which could result in arbitrary code execution. VMware vRealize Network Insight (vRNI) is an IT management platform which enables visibility, optimization and management of an organization’s physical, virtual and cloud infrastructure. Successful exploitation of the most severe of these vulnerabilities […]
  • Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution December 13, 2022
    Multiple vulnerabilities have been discovered in Mozilla Firefox, Firefox Extended Support Release (ESR) and Mozilla Thunderbird, the most severe of which could allow for arbitrary code execution. Mozilla Firefox is a web browser used to access the Internet. Mozilla Firefox ESR is a version of the web browser intended to be deployed in large organizations. […]
  • A Vulnerability in Fortinet's FortiOS Could Allow for Arbitrary Code Execution December 13, 2022
    A vulnerability has been discovered in Fortinet's FortiOS, which could allow for arbitrary code Execution. FortiOS is the Fortinet’s proprietary Operation System which is utilized across multiple product lines. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user […]
WordPress Appliance - Powered by TurnKey Linux