News Advisories

Cyber Security News

RSS Center For Internet Security Advisories
  • A Vulnerability in Apache OFBiz Could Allow for Remote Code Execution February 23, 2024
    A vulnerability has been discovered in the Apache OFBiz, which could allow for remote code execution. Apache OFBiz is an open source product for the automation of enterprise processes. It includes framework components and business applications for ERP, CRM, E-Business/E-Commerce, Supply Chain Management and Manufacturing Resource Planning. Successful exploitation could allow for remote code execution […]
  • A Vulnerability in Junos OS Could Allow for Remote Code Execution February 22, 2024
    A vulnerability has been discovered in the Junos OS, which could allow for remote code execution. Junos OS is a FreeBSD-based network operating system used in Juniper Networks routing, switching and security devices. Successful exploitation could allow for remote code execution in the context of the system. Depending on the privileges associated with the logged […]
  • Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution February 22, 2024
    Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for remote code execution. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of the most severe of these vulnerabilities could allow for remote code execution. […]
  • Multiple Vulnerabilities in ConnectWise ScreenConnect Could Allow for Remote Code Execution February 22, 2024
    Multiple vulnerabilities have been discovered in ConnectWise ScreenConnect, the most severe of which could allow for remote code execution. ConnectWise ScreenConnect is ConnectWise's remote desktop and mobile support solutions to allow technicians to perform remote support, gain remote access and run remote meetings. Successful exploitation of the most severe of these vulnerabilities could allow for […]
  • Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution February 21, 2024
    Multiple vulnerabilities have been discovered in Mozilla products, the most severe of which could allow for arbitrary code execution. Mozilla Firefox is a web browser used to access the Internet. Mozilla Firefox ESR is a version of the web browser intended to be deployed in large organizations. Mozilla Thunderbird is an email client. Successful exploitation […]
  • Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution February 13, 2024
    Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution for the following: Adobe Commerce is an offering that provides companies with a flexible and scalable end-to-end plate form to manage commerce experiences of their customers. Adobe Acrobat is used to view, create, print, and manage […]
  • Critical Patches Issued for Microsoft Products, February 13, 2024 February 13, 2024
    Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users […]
  • Multiple Vulnerabilities in FortiOS Could Allow for Remote Code Execution February 9, 2024
    Multiple vulnerabilities have been discovered in FortiOS, the most severe of which could allow for remote code execution. FortiOS is Fortinet's operating system used across many Fortinet devices. Successful exploitation of the most severe of these vulnerabilities could allow for remote code execution in the context of the system. Depending on the privileges associated with […]
  • Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution February 6, 2024
    Multiple vulnerabilities have been discovered in Google Chrome, which could allow for arbitrary code execution. Google Chrome is a web browser used to access the internet. Successful exploitation of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker […]
  • Multiple Vulnerabilities in Ivanti Products Could Allow for Remote Code Execution January 31, 2024
    Multiple Vulnerabilities have been discovered in Ivanti Products, the most severe of which could allow for remote code execution. Ivanti Connect Secure is a SSL VPN solution for remote and mobile users. Ivanti Policy Secure (IPS) is a network access control (NAC) solution which provides network access only to authorized and secured users and devices. […]
  • Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution January 30, 2024
    Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or […]
  • A Vulnerability in Trend Micro uiAirSupport Could Allow for Arbitrary Code Execution January 30, 2024
    A vulnerability has been discovered in Trend Micro uiAirSupport, that could allow for arbitrary code execution. Trend Micro uiAirSupport is a support tool product made by Trend Micro. Successful exploitation of this vulnerability could allow for arbitrary code execution in the context of the affected service account. Depending on the privileges associated with the service […]
  • Multiple Vulnerabilities in Jenkins Could Allow for Remote Code Execution January 29, 2024
    Multiple vulnerabilities have been discovered in Jenkins, the most severe of which could allow for remote code execution. Jenkins (Core) is an open source automation server which is used for building, testing, and deploying software. Git Server Plugin provides fundamental git operations for Jenkins projects. GitLab Branch Source Plugin provides branch source and folder organization […]
  • Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution January 23, 2024
    Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or […]
  • Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution January 23, 2024
    Multiple vulnerabilities have been discovered in Mozilla products, the most severe of which could allow for arbitrary code execution. Mozilla Firefox is a web browser used to access the Internet. Mozilla Firefox ESR is a version of the web browser intended to be deployed in large organizations. Mozilla Thunderbird is an email client. Successful exploitation […]
  • Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution January 23, 2024
    Multiple vulnerabilities have been discovered in Apple products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install […]
  • Multiple Vulnerabilities in VMware Products Could Allow for Remote Code Execution January 22, 2024
    Multiple vulnerabilities have been discovered in VMware vCenter Server and Cloud Foundation, the most severe of which could allow for remote code execution. VMware vCenter Server is the centralized management utility for VMware. VMware Cloud Foundation is a multi-cloud platform that provides a full-stack hyperconverged infrastructure (HCI) that is made for modernizing data centers and […]
  • Oracle Quarterly Critical Patches Issued January 16, 2024 January 18, 2024
    Multiple vulnerabilities have been discovered in Oracle products, the most severe of which could allow for remote code execution.
  • A Vulnerability in Atlassian Confluence Data Center and Server Could Allow for Remote Code Execution January 17, 2024
    A vulnerability has been discovered in Atlassian Confluence Server and Data Center which could allow for remote code execution. Confluence is a collaboration tool that brings people, knowledge, and ideas together in a shared workspace. Successful exploitation of this vulnerability could allow an attacker to create unauthorized Confluence administrator accounts to access the instance. An […]
  • Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution January 17, 2024
    Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or […]
WordPress Appliance - Powered by TurnKey Linux