Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
1509 Results
Vulnerabilities in Various Red Hat Products
Red Hat released multiple security updates in May for various Red Hat products. For a complete description of the vulnerabilities and affected systems Red Hat May 2022 Archives by date. IT Security Read more about IT Security service offerings.
Vulnerabilities in Various Suse Products
Suse released multiple security updates in May for various Suse products. For a complete description of the vulnerabilities and affected systems Suse May 2022 Archives by date. IT Security Read more about IT Security service offerings.
Vulnerabilities in Various Ubuntu Products
Ubuntu released multiple security updates in May for various Ubuntu products. For a complete description of the vulnerabilities and affected systems Ubuntu May 2022 Archives by date. IT Security Read more about IT Security service offerings.
Multiple Vulnerabilities Affecting Zyxel Firewall, AP, and AP Controller Products
Zyxel has released a security advisory to address multiple vulnerabilities in Zyxel firewalls, AP controllers, and APs. These vulnerabilities can be used by threat actors as part of exploit chains. For a complete description of the vulnerabilities and affected systems Zyxel security advisory for multiple vulnerabilities of firewalls, AP controllers, and APs. IT Security
High Vulnerabilities in Multiple Mozilla Products
Mozilla has released security updates to address High vulnerabilities in multiple Mozilla products. An attacker could exploit these vulnerabilities to take control of an affected system. For a complete description of the vulnerabilities and affected systems Mozilla Foundation Security Advisories. IT Security
Popular Python and PHP Libraries Hijacked
Popular Python and PHP Libraries Hijacked. These vulnerabilities allow an attacker to steal the developer's environment variables. For a complete description of the vulnerabilities and affected systems Popular Python and PHP libraries hijacked to steal AWS keys. IT Security
High and Medium Vulnerabilities in Zoom
Zoom has released security updates to address High and Medium vulnerabilities in Zoom. These vulnerabilities allow an attacker to perform zero-click remote code execution (RCE). For a complete description of the vulnerabilities and affected systems Zoom Security Bulletins. IT Security
Microsoft Releases Workaround Guidance for an Actively Exploited Vulnerability in MSDT
Microsoft has released guidance to address a remote code execution (RCE) vulnerability—CVE-2022-30190, known as "Follina"—affecting the Microsoft Support Diagnostic Tool (MSDT) in Windows. There is currently no patch available, but Microsoft has released a published workaround. Microsoft has reported active exploitation of this vulnerability in the wild. A remote, unauthenticated attacker could exploit this vulnerability to take control of an affected system.
Zero-day Windows AD Authentication Vulnerabilities
Microsoft released emergency updates to fix 0-day Windows AD authentication vulnerabilities. After installing updates released May 10, 2022 on domain controllers, authentication failures may occur on the server or client for services such as Network Policy Server (NPS), Routing and Remote access Service (RRAS), Radius, Extensible Authentication Protocol (EAP), and Protected Extensible Authentication Protocol (PEAP). For a complete description of the vulnerabilities and affected systems:
Moderately Critical Vulnerability May Affect Drupal Sites
Drupal has released security updates to address a Moderately Critical vulnerability affecting some contributed projects or custom code on Drupal sites. A remote attacker could exploit this vulnerability to take control of an affected website. For a complete description of the vulnerabilities and affected systems Drupal core - Moderately critical - Third-party libraries - SA-CORE-2022-010.