News Advisories

Cyber Security News

RSS Center For Internet Security Advisories
  • Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution December 1, 2023
    Multiple vulnerabilities have been discovered in Apple products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install […]
  • Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution November 24, 2023
    Multiple vulnerabilities have been discovered in Mozilla products, the most severe of which could allow for arbitrary code execution. Mozilla Firefox is a web browser used to access the Internet. Mozilla Firefox ESR is a version of the web browser intended to be deployed in large organizations. Mozilla Thunderbird is an email client. Successful exploitation […]
  • A Vulnerability in Fortinet FortiSIEM Could Allow for Remote Code Execution November 17, 2023
    A vulnerability has been discovered in Fortinet FortiSIEM, which could allow for remote code execution. Successful exploitation of this vulnerability could allow for remote code execution in the context of the affected service account. Depending on the privileges associated with the service account an attacker could then install programs; view, change, or delete data; or […]
  • Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution November 14, 2023
    Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution. Adobe ColdFusion is a commercial rapid web-application development computing platform. Adobe RoboHelp Server is a server based help solution. Adobe Acrobat and Reader is a PDF reader app lets you view, comment, fill out, and sign […]
  • Critical Patches Issued for Microsoft Products, November 14, 2023 November 14, 2023
    Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users […]
  • A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution November 13, 2023
    A vulnerability has been discovered in Google Chrome, which could allow for arbitrary code execution. Successful exploitation of this vulnerability could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create […]
  • Multiple Vulnerabilities in Google Android OS Could Allow for Privilege Escalation November 7, 2023
    Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for privilege escalation. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of the most severe of these vulnerabilities could allow for privilege escalation. Depending on […]
  • A Vulnerability in Atlassian Confluence Server and Data Center Could Allow for Data Destruction November 3, 2023
    A vulnerability has been discovered in Atlassian Confluence Server and Data Center which could allow for data destruction. Confluence is a collaboration tool that brings people, knowledge, and ideas together in a shared workspace. Successful exploitation of this vulnerability could allow an attacker to destroy instance data.
  • Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution November 2, 2023
    Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or […]
  • Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution October 25, 2023
    Multiple vulnerabilities have been discovered in Apple products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install […]
  • A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution October 25, 2023
    A vulnerability has been discovered in Google Chrome which could allow for arbitrary code execution. ChromeOS is a Linux-based operating system developed and designed by Google. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose […]
  • Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution October 24, 2023
    Multiple vulnerabilities have been discovered in Mozilla products, the most severe of which could allow for arbitrary code execution. Mozilla Firefox is a web browser used to access the Internet. Mozilla Firefox ESR is a version of the web browser intended to be deployed in large organizations. Mozilla Thunderbird is an email client. Successful exploitation […]
  • Multiple Vulnerabilities in ChromeOS Could Allow for Arbitrary Code Execution October 18, 2023
    Multiple vulnerabilities have been discovered in ChromeOS, the most severe of which could allow for arbitrary code execution. ChromeOS is a Linux-based operating system developed and designed by Google. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user […]
  • Oracle Quarterly Critical Patches Issued October 17, 2023 October 17, 2023
    Multiple vulnerabilities have been discovered in Oracle products, which could allow for remote code execution.
  • A Vulnerability in Cisco IOS XE Software Web UI Could Allow for Privilege Escalation October 16, 2023
    A vulnerability in Cisco IOS XE Software Web UI that could allow for privilege escalation. Successful exploitation could allow an unauthenticated remote attacker to create an account on an affected system with privilege level 15 access, allowing them to use that account to gain control of the affected system. The Cisco IOS XE Software web […]
  • Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution October 10, 2023
    Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser used to access the internet. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full […]
  • Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution October 10, 2023
    Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution. Adobe Bridge is a free digital asset management app. Adobe Commerce is an ecommerce platform. Adobe Photoshop is a raster graphics editor. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code […]
  • Critical Patches Issued for Microsoft Products, October 10, 2023 October 10, 2023
    Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users […]
  • A Vulnerability in Apple Products Could Allow for Privilege Escalation October 6, 2023
    A vulnerability has been discovered in Apple products, which could allow for privilege escalation. Successful exploitation of this vulnerability could allow for privilege escalation in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts […]
  • Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution October 5, 2023
    Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for remote code execution. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of the most severe of these vulnerabilities could allow for remote code execution. […]
WordPress Appliance - Powered by TurnKey Linux