Ghostscript Remote Code Execution Vulnerability
A vulnerability was identified in Ghostscript. A remote attacker could exploit this vulnerability to trigger remote code execution on the...
A vulnerability was identified in Ghostscript. A remote attacker could exploit this vulnerability to trigger remote code execution on the...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infoelra -- parkmatikImproper Neutralization of Special Elements used in an SQL Command...
Multiple vulnerabilities were identified in Apple Products. A remote attacker could exploit some of these vulnerabilities to trigger remote code...
Multiple vulnerabilities were identified in VMWare Aria Operations for Networks. A remote attacker could exploit some of these vulnerabilities to...
Microsoft has released monthly security update for their products: Vulnerable ProductRisk LevelImpactsNotesWindows High RiskElevation of Privilege Denial of Service Information Disclosure...
Multiple vulnerabilities were identified in VMWare Aria Operations for Networks. A remote attacker could exploit some of these vulnerabilities to...
Multiple vulnerabilities were identified in Android. A remote attacker could exploit some of these vulnerabilities to trigger denial of service...
Multiple vulnerabilities were identified in Samsung Products. A remote attacker could exploit some of these vulnerabilities to trigger elevation of...
Multiple vulnerabilities were identified in Citrix Products. A remote attacker could exploit some of these vulnerabilities to trigger elevation of...
A vulnerability was identified in Ghostscript. A remote attacker could exploit this vulnerability to trigger remote code execution on the...
A vulnerability was identified in Adobe ColdFusion. A remote attacker could exploit this vulnerability to trigger remote code execution on...
A vulnerability was identified in Apple Products. A remote attacker could exploit this vulnerability to trigger remote code execution on...
Description of Problem Multiple vulnerabilities have been discovered in NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway)....
A critical design flaw in the Google Cloud Build service discovered by cloud security firm Orca Security can let attackers...
CISA ordered federal agencies to mitigate remote code execution zero-days affecting Windows and Office products that were exploited by the Russian-based...
A new cybersecurity certification and labeling program called U.S. Cyber Trust Mark is being shaped to help U.S. consumers choose...
Citrix today is alerting customers of a critical-severity vulnerability (CVE-2023-3519) in NetScaler ADC and NetScaler Gateway that already has exploits...
A financially motivated cybercrime gang has been observed deploying BlackCat ransomware payloads on networks backdoored using a revamped Sardonic malware...
Cybersecurity vendor Sophos is being impersonated by a new ransomware-as-a-service called SophosEncrypt, with the threat actors using the company name...
The global cyber insurance market is expected to reach over $20 billion by 2025. However, many organizations are finding it...
A former IT security analyst has been jailed for three years and seven months after attempting to extort his employer,...
Security researchers have recorded over one million attempts to compromise a popular WordPress plugin over the past few days.Wordfence said...
A suspected scammer who used scareware to trick hundreds of thousands of global victims into handing over money has been...
Security researchers from Rapid7 have found active exploitation of multiple vulnerabilities in Adobe ColdFusion, a web development computing platform.On July...