-
Multiple Vulnerabilities in Palo Alto PAN-OS Could Allow for Authentication Bypass
Multiple vulnerabilities have been discovered in Palo Alto PAN-OS, the most severe of which could allow for authentication bypass. PAN-OS is the software that runs all Palo Alto Networks next-generation firewalls. Successful exploitation could allow for authentication bypass with administrator privileges. An attacker could then install programs; view, change, or delete data. Go to Source
-
Multiple Vulnerabilities in Ivanti Endpoint Manager Could Allow for Remote Code Execution
Multiple vulnerabilities have been discovered in Ivanti Endpoint Manager, the most severe of which could allow for remote code execution. Ivanti Endpoint Manager is a client-based unified endpoint management software. Successful exploitation could allow for remote code execution in the context of the system. Depending on the privileges associated with the system, an attacker could…
-
Multiple Vulnerabilities in Citrix Products Could Allow for Remote Code Execution
Multiple vulnerabilities have been discovered in Citrix products, the most severe of which could allow for remote code execution. Citrix ADC performs application-specific traffic analysis to intelligently distribute, optimize, and secure Layer 4 – Layer 7 network traffic for web applications. Successful exploitation of the most severe of these vulnerabilities could allow for remote code…
-
Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install…
-
Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install…
-
Critical Patches Issued for Microsoft Products, November 12, 2024
Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users…
-
A Vulnerability in Android OS Could Allow for Remote Code Execution
A vulnerability has been discovered in Android OS that could allow for remote code execution. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of this vulnerability could allow for remote code execution in the context of the logged-on user. Depending on the privileges…
-
A Vulnerability in Cisco Unified Industrial Wireless Software for Ultra-Reliable Wireless Backhaul Access Point Could Allow for Remote Code Execution
A vulnerability has been discovered in Cisco Unified Industrial Wireless Software for Ultra-Reliable Wireless Backhaul Access Point that could allow for remote code execution. Cisco Unified Industrial Wireless Software for Ultra-Reliable Wireless Backhaul Access Point is Cisco’s solution to address wireless and mobile use case issues facing enterprises. Successful exploitation could allow the attacker to…
-
Multiple Vulnerabilities in Siemens InterMesh Subscriber Devices Could Allow for Remote Code Execution
Multiple vulnerabilities have been discovered in Siemens InterMesh Subscriber Devices, the most severe of which could allow for remote code execution. InterMesh leverages mesh radio technology and hardened alarm monitoring panels to create a private, self-healing network that delivers alarm signals. Successful exploitation of the most severe of these vulnerabilities could allow for remote code…
-
Threat Level – GUARDED
On December 18, the Cyber Threat Alert Level was evaluated and is remaining at Blue (Guarded) due to a vulnerability affecting multiple Cleo products. On December 12, the MS-ISAC released an advisory for a vulnerability in Cleo products that could allow for remote code execution. Organizations and users are advised to update and apply all…