Cyber Security Advisories – MS-ISAC The latest MS-ISAC cyber security advisories. Feed provided by Center for Internet Security.
- A Vulnerability in Oracle Products Could Allow for Remote Code Executionon March 23, 2026 at 8:17 pm
A vulnerability has been discovered in Oracle Products that could allow for remote code execution. Oracle Identity Manager is an identity management product that automates user provisioning, identity administration, and password management, integrated in a comprehensive workflow engine.Oracle Web Services Manager is a comprehensive security and policy management framework within Oracle Fusion Middleware that allows enterprises to secure, manage, and monitor web services. Successful exploitation of this vulnerability could allow for remote code execution. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have less rights on the system could be less impacted than those who operate with administrative user rights.
- Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Executionon March 13, 2026 at 5:32 pm
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
- Multiple Vulnerabilities in Mozilla Firefox Could Allow for Arbitrary Code Executionon March 10, 2026 at 8:01 pm
Multiple vulnerabilities have been discovered in Mozilla Firefox, the most severe of which could allow for arbitrary code execution. Mozilla Firefox is a web browser used to access the Internet. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
- Critical Patches Issued for Microsoft Products, March 10, 2026on March 10, 2026 at 6:43 pm
Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution. Successful exploitation of the most severe of these vulnerabilities could result in an attacker gaining the same privileges as the logged-on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
- Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Executionon March 10, 2026 at 6:34 pm
Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution.Adobe Acrobat is a comprehensive software family designed to create, edit, manage, and sign PDF documents across desktop, web, and mobile devices.Adobe Commerce is a composable ecommerce solution that lets you quickly create global, multi-brand B2C and B2B experiences all from one cloud-native platform.Adobe DNG Software Development Kit (SDK) is a free set of tools and code that helps developers add support for Adobe’s Digital Negative (DNG) universal RAW file format into their own applications and cameras.Adobe Experience Manager (AEM) is a comprehensive content management solution for building websites, mobile apps, and forms.Adobe Premiere Pro is a subscription-based timeline video editing software for film, TV, and web.Adobe Substance 3D is a suite of tools for creating 3D content, including modeling, texturing, and rendering.Adobe Illustrator is a software for creating vector-based graphics, such as logos, icons, illustrations, and typography.Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.


