News Advisories

Cyber Security News

RSS Center For Internet Security Advisories
  • Multiple Vulnerabilities in Microsoft Exchange Server Could Allow for Remote Code Execution September 30, 2022
    Multiple vulnerabilities have been discovered in Microsoft Exchange Server, the most severe of which could allow for remote code execution. Microsoft Exchange Server is a mail server used to run and manage an organizations email services. Successful exploitation of the most severe of these vulnerabilities could allow for remote code execution in the context of […]
  • Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution September 30, 2022
    Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser used to access the Internet. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on […]
  • Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution September 28, 2022
    Multiple vulnerabilities have been discovered in Mozilla Firefox and Mozilla Thunderbird, the most severe of which could allow for arbitrary code execution. Mozilla Firefox is a web browser used to access the Internet. Mozilla Firefox ESR is a version of the web browser intended to be deployed in large organizations. Mozilla Thunderbird is a free […]
  • MS-ISAC CYBERSECURITY ADVISORY - Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution September 13, 2022
    Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution. Experience Manager is a comprehensive content management solution for building websites, mobile apps and forms Bridge is a digital asset management application InDesign is an industry-leading layout and page design software for print and digital media […]
  • Critical Patches Issued for Microsoft Products, September 13, 2022 September 13, 2022
    Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users […]
  • Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution September 13, 2022
    Multiple vulnerabilities have been discovered in Apple Products, the most severe of which could allow for arbitrary code execution. Safari is a graphical web browser developed by Apple. macOS Monterey is the 18th and current major release of macOS. macOS Big Sur is the 17th release of macOS. iOS is a mobile operating system for […]
  • Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution September 7, 2022
    Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for remote code execution. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of the most severe of these vulnerabilities could allow for remote code execution. […]
  • A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution September 7, 2022
    A vulnerability has been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser used to access the internet. Successful exploitation of the vulnerability could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with […]
  • A Vulnerability in iOS Could Allow For Arbitrary Code Execution (CVE-2022-32893) September 7, 2022
    A vulnerability has been discovered in Apple Products which could allow for arbitrary code execution. iOS is a mobile operating system created and developed by Apple Inc. exclusively for its hardware. Successful exploitation could allow the attacker to execute arbitrary code in context of the application. Depending on the permission associated with the application running […]
  • Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution. September 6, 2022
    Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution. Adobe Commerce is an offering that provides companies with a flexible and scalable end-to-end plate form to manage commerce experiences of their customers. Adobe Acrobat and Reader are used to view, create, print, and mange PDF […]
  • Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution August 31, 2022
    Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser used to access the internet. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on […]
  • A Vulnerability in Atlassian Bitbucket Server and Data Center Could Allow For Remote Code Execution August 27, 2022
    A Vulnerability has been discovered in Atlassian Bitbucket Server and Data Center which could allow for remote code execution. Bitbucket is a Git-based source code repository hosting service owned by Atlassian. Successful exploitation could allow the attacker to execute remote code in context of the application. Depending on the permission associated with the application running […]
  • Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution August 24, 2022
    Multiple vulnerabilities have been discovered in Mozilla Firefox and Mozilla Thunderbird, the most severe of which could allow for arbitrary code execution. Mozilla Firefox is a web browser used to access the Internet. Mozilla Firefox ESR is a version of the web browser intended to be deployed in large organizations. Mozilla Thunderbird is a free […]
  • Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution August 18, 2022
    Multiple vulnerabilities have been discovered in Apple Products, the most severe of which could allow for arbitrary code execution. macOS Monterey is the 18th and current major release of macOS. iOS is a mobile operating system for mobile devices, including the iPhone, iPad, and iPod touch. iPadOS is the successor to iOS 12 and is […]
  • Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution August 17, 2022
    Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser used to access the Internet. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on […]
  • Critical Patches Issued for Microsoft Products, August 09, 2022 August 10, 2022
    Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users […]
  • Multiple Vulnerabilities in VMware vRealize Operations Could Allow for Remote Code Execution August 10, 2022
    Multiple vulnerabilities have been discovered in VMware vRealize Operations, the most severe of which could result in Remote Code Execution. VMware vRealize Operations is an IT management platform which enables visibility, optimization and management of an organization’s physical, virtual and cloud infrastructure. This software comes within an API which enables developers to build vRealize Operations […]
  • Multiple Vulnerabilities in Exim Could Allow for Remote Code Execution August 9, 2022
    Multiple vulnerabilities have been discovered in Exim, the most severe of which could allow for remote code execution. Exim is a mail transfer agent used to deploy mail servers on Unix-like systems. Successful exploitation of the most severe of these vulnerabilities will enable the attacker to perform command execution as root in the context of […]
  • Oracle Quarterly Critical Patches Issued July 19, 2022 August 5, 2022
    Multiple vulnerabilities have been discovered in Oracle products, which could allow for remote code execution.
  • Multiple Vulnerabilities in Cisco Small Business RV Series Routers Could Allow for Remote Code Execution August 4, 2022
    Multiple vulnerabilities have been discovered in Cisco Small Business RV Series Routers, the most severe of which could allow for remote code execution. Cisco Small Business RV Series Routers is a series of routers released by Cisco. Successful exploitation of this vulnerability, could allow a user to execute code in the context of the router.
WordPress Appliance - Powered by TurnKey Linux