Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
3163 Results
Vulnerabilities in Various Suse Products in April 2024
Suse released multiple security updates in April for various Suse products.For a complete description of the vulnerabilities and affected systems go to Suse April 2024 Archives by date.IT SecurityRead more about IT Security service offerings.
Vulnerability in the R programming Language
Security updates were released for a vulnerability in the R programming Language. An attacker could exploit this vulnerability to execute arbitrary code and could be used as part of a supply chain attack. For a complete description of the vulnerabilities and affected systems go to CVE-2024-27322 Detail.IT Security
Vulnerabilities in the Intelligent Platform Management Interface (IPMI) implementations in multiple manufacturer's Baseboard Management Controller (BMC)
Manufacturers of Baseboard Management Controllers (BMC) have created security updates to address a vulnerability in the Intelligent Platform Management Interface (IPMI) implementations in their BMCs.
Vulnerabilities in Chrome
Google has released new versions of Chrome.For a complete description of the vulnerabilities and affected systems go to Chrome Releases.IT SecurityRead more about IT Security service offerings.
Critical and Other Vulnerabilities in the WordPress Automatic Plugin
WPScan released security updates to address Critical and other vulnerabilities in the WordPress Automatic Plugin. For a complete description of the vulnerabilities and affected systems go to WordPress Automatic Plugin Updates.IT SecurityRead more about IT Security service offerings.
Vulnerabilities in the Brocade SAN Appliance
Brocade released a security update to address Critical and other Vulnerabilities in the Brocade SAN Appliance. An attacker could exploit these vulnerabilities to perform Local: Unauthorized Access to Files; Remote: Arbitrary File Modification, Denial of Service (DoS), Directory Traversal, Disclosure of Information, Disclosure of Sensitive Information, Gain Privileged Access, SQL Injection, Unauthenticated Arbitrary Code Execution, Unauthorized Access to Application Database, local memory corruption.
Vulnerabilities in Chrome
Google has released new versions of Chrome.For a complete description of the vulnerabilities and affected systems go to Chrome Releases.IT SecurityRead more about IT Security service offerings.
Actively Exploited Vulnerability in CrushFTP
The file transfer company has released a security update to address an Actively Exploited vulnerability in CrushFTP. An attacker could exploit this vulnerability to take download system files.For a complete description of the vulnerabilities and affected systems go to CrushFTP 11.0.1 been released!IT SecurityRead more about IT Security service offerings.
Critical Vulnerability in the Forminator WordPress Plugin
WPMU DEVA released a security update to address a Critical vulnerability in the Forminator WordPress Plugin. An attacker could exploit this vulnerability to perform unrestricted file uploads to the server.
Actively Exploited High and Medium Vulnerabilities in Multiple Cisco Products
Cisco has released security updates to address Actively Exploited High and Medium vulnerabilities in multiple Cisco Products. An attacker could exploit these vulnerabilities to take control of an affected system.