Center for Internet Security

Cyber Security Advisories – MS-ISAC The latest MS-ISAC cyber security advisories. Feed provided by Center for Internet Security.

  • A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution
    on May 9, 2024 at 10:13 pm

    A vulnerability has been discovered in Google Chrome, which could allow for arbitrary code execution. Successful exploitation of this vulnerability could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

  • A Vulnerability in Apache OFBiz Could Allow for Remote Code Execution
    on May 9, 2024 at 4:51 pm

    A vulnerability has been discovered in the Apache OFBiz, which could allow for remote code execution. Apache OFBiz is an open-source product for the automation of enterprise processes. It includes framework components and business applications for ERP, CRM, E-Business/E-Commerce, Supply Chain Management and Manufacturing Resource Planning. Successful exploitation of this vulnerability could allow for remote code execution in the context of the affected service account. Depending on the privileges associated with the service account, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Services whose accounts are configured to have less rights on the system could be less impacted than those who operate with administrative user rights.

  • A Vulnerability in F5 BIG-IP Next Central Manager Could Allow for Remote Code Execution
    on May 9, 2024 at 4:46 pm

    A vulnerability has been discovered in F5 BIG-IP Next Central Manager that could allow for remote code execution. BIG-IP Next Central Manager is the management and application orchestration platform used to control BIG-IP Next instances. It can be installed on dedicated hardware or virtualized through VMware ESXi. Successful exploitation of this vulnerability could allow for Remote Code Execution in the context of the affected service account. Depending on the privileges associated with the service account, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Services accounts that are configured to have less rights on the system could be less impacted than those who operate with administrative user rights.

  • Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
    on May 7, 2024 at 8:53 pm

    Multiple vulnerabilities have been discovered in Google Chrome, which could allow for arbitrary code execution. Successful exploitation of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

  • A Vulnerability in Mozilla PDF.js Could Allow for Arbitrary Code Execution
    on May 7, 2024 at 6:24 pm

    A vulnerability has been discovered in Mozilla PDF.js could allow for arbitrary code execution. Mozilla PDF.js is a PDF viewer that is built into Mozilla Firefox and can be used by other web browsers. Exploitation of this vulnerability could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have less rights on the system could be less impacted than those who operate with administrative user rights.

  • Multiple Vulnerabilities in Google Android OS Could Allow for Privilege Escalation
    on May 6, 2024 at 11:47 pm

    Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for privilege escalation. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of the most severe of these vulnerabilities could allow for privilege escalation. Depending on the privileges associated with the exploited component, an attacker could then install programs; view, change, or delete data; or create new accounts with full rights.

  • Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
    on April 30, 2024 at 9:42 pm

    Multiple vulnerabilities have been discovered in Google Chrome, which could allow for arbitrary code execution. Successful exploitation of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

  • Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
    on April 24, 2024 at 6:47 pm

    Multiple vulnerabilities have been discovered in Google Chrome, which could allow for arbitrary code execution. Successful exploitation of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

  • Oracle Quarterly Critical Patches Issued April 16, 2024
    on April 17, 2024 at 7:51 pm

    Multiple vulnerabilities have been discovered in Oracle products, the most severe of which could allow for remote code execution.

  • Multiple Vulnerabilities in Ivanti Avalanche Could Allow for Remote Code Execution
    on April 17, 2024 at 4:29 pm

    Multiple vulnerabilities have been discovered in Ivanti Avalanche, the most severe of which could allow for remote code execution. Ivanti Avalanche is a mobile device management system. Network security features allow one to manage wireless settings (including encryption and authentication), and apply those settings on a schedule throughout the network. Successful exploitation could allow for remote code execution in the context of the system. Depending on the privileges associated with the system, an attacker could then install programs; view, change, or delete data.

Websitecyber related posts:

Zero Day Initiative Upcoming Advisories

Zero Day Initiative Upcoming Advisories.

Debian Linux Security

Debian Linux Security LinuxSecurity Advisories is the community's central source for information on Linux and open source security.

Health Care Cyberscoop

The latest health care news and information from Cyberscoop

New Hampshire Lottery Cyberattack

New Hampshire Lottery officials warned of a cyberattack on its website on Friday.

IT Security News

IT Security news and articles about information security, vulnerabilities, exploits, patches, releases, software, hacks, spam, viruses, malware, breaches.

Kaspersky Official Blog

The Official Blog from Kaspersky covers information to help protect you against viruses, spyware, hackers, spam & other forms of malware.

McAfee Labs – McAfee Blogs

McAfee Labs McAfee Blogs Securing Tomorrow. Today, Internet Security News.

Black Hat Announcements

Black Hat Announcements Black Hat Digital Self Defense. Black Hat provides cutting edge content in the information and computer security field.

Hacking Optus A Beginner’s Guide

The cyber attack on Optus was apparently so unsophisticated, some analysts say a primary school student could have pulled it off.

Hackers Online Club

Hackers Online Club All the tools are related to find security network and framework vulnerability.

Gentoo Linux Security Advisories

New Gentoo Linux Security Advisories.

openSUSE Security

openSUSE Security is the community's central source for information on Linux and open source security. We follow the open source trends as they affect the commu...
Share Websitecyber