Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
1509 Results
Weaponized Vulnerability in Linux
H-ISAC reported a Weaponized Vulnerability in Linux. An attacker could exploit this vulnerability to escalate privileges. For a complete description of the vulnerabilities and affected systems go to CVE-2022-25636 Detail. IT Security Read more about IT Security service offerings.
Critical Vulnerabilities in Drupal Core
Drupal has released Critical security updates to address vulnerabilities in Twig impacting Drupal core. A remote attacker could exploit these vulnerabilities to perform unauthorized read access to private files, the contents of other files on the server, or database credentials.
Vulnerability in Wayland
Wayland has released security updates to address a vulnerability in Wayland. An attacker could exploit this vulnerability to cause Wayland to crash, resulting in a denial of service, or possibly execute arbitrary code. For a complete description of the vulnerabilities and affected systems go to USN-5614-1: Wayland vulnerability. IT Security
Google Released Chrome 106.0.5249.61 for Mac/Linux and 106.0.5249.61/62 for Windows
Google released Chrome 106.0.5249.61 for Mac/Linux and 106.0.5249.61/62 for Windows. A remote attacker could exploit this vulnerability to take control of an affected system. For a complete description of the vulnerabilities and affected systems go to Chrome Release Note. IT Security
Critical and High Vulnerabilities in Dell Products
Dell has released security updates to address Critical and High vulnerabilities in Dell Products. An attacker could exploit the Dell SmartFabric Storage Software vulnerability to execute arbitrary commands. An attacker could exploit the Dell CloudLink vulnerability to gain unauthorized access to the system. For a complete description of the vulnerabilities and affected systems go to
Vulnerabilities in ISC BIND
The Internet Systems Consortium (ISC) has released security updates to address vulnerabilities affecting ISC Berkeley Internet Name Domain (BIND). A remote attacker could exploit these vulnerabilities to potentially cause denial-of-service conditions. For a complete description of the vulnerabilities and affected systems go to BIND 9 Security Vulnerability Matrix. IT Security
Vulnerability in Microsoft Endpoint Configuration Manager
Microsoft released an out-of-band security update to address a vulnerability in Microsoft Endpoint Configuration Manager. An attacker could exploit this vulnerability to obtain sensitive information.. For a complete description of the vulnerabilities and affected systems go to Microsoft Endpoint Configuration Manager Spoofing Vulnerability CVE-2022-37972.
Vulnerabilities in Multiple Mozilla Products
Mozilla has released a security update to address vulnerabilities in multiple Mozilla Products. An attacker could exploit this vulnerability to take control of an affected system. For a complete description of the vulnerabilities and affected systems go to Mozilla Foundation Security Advisories. IT Security
Vulnerability in Golang Go 1.19.0
Go has released a security update to address a vulnerability in Golang Go 1.19.0. A path traversal vulnerability exists within Golang Go 1.19.0. For a complete description of the vulnerabilities and affected systems go to CVE-2022-32190.. IT Security
Apple Patches Zero-Day Vulnerability That is Being Actively Exploited in the Wild
Apple releases security updates to address multiple vulnerabilities in iOS and macOS, including a zero-day flaw that is being actively exploited in the wild. An attacker could exploit some of these vulnerabilities to take control of an affected device. For a complete description of the vulnerabilities and affected systems go to Apple Security Updates. IT Security