Microsoft Products Multiple Vulnerabilities
Multiple vulnerabilities were identified in Microsoft Products. A remote attacker could exploit some of these vulnerabilities to trigger elevation of...
Multiple vulnerabilities were identified in Microsoft Products. A remote attacker could exploit some of these vulnerabilities to trigger elevation of...
Multiple vulnerabilities were identified in Palo Alto PAN-OS . A remote attacker could exploit some of these vulnerabilities to trigger...
A vulnerability was identified in F5 Products. A remote attacker could exploit this vulnerability to trigger remote code execution on...
Multiple vulnerabilities were identified in Fortinet Products. A remote attacker could exploit some of these vulnerabilities to trigger elevation of privilege,...
Exploit in the wild has been detected for CVE-2024-21410, affecting Microsoft Exchange Server. The vulnerability could be exploited by sending...
Microsoft has released monthly security update for their products: CVE-2024-29059 vulnerability is being actively exploited. An attacker can use the exposed ObjRef...
Multiple vulnerabilities were identified in Apple Products. A remote attacker could exploit some of these vulnerabilities to trigger denial of...
Multiple vulnerabilities were identified in Fortinet Products. A remote attacker could exploit some of these vulnerabilities to trigger elevation of privilege,...
Multiple vulnerabilities were identified in Fortinet Products. A remote attacker could exploit some of these vulnerabilities to trigger remote code...
Multiple vulnerabilities have been identified in Ivanti Products. A remote attacker could exploit these vulnerabilities to trigger remote code execution...
Multiple vulnerabilities were identified in Aruba Products. A remote attacker could exploit this vulnerability to trigger remote code execution on the...
Updated Risk, Description, Source and Related Links.CVE-2024-30088 is being exploited in the wild. This is a Windows Kernel Time-of-check Time-of-use (TOCTOU)...
Updated Risk, Description, Impact, Source and Related Links.CVE-2024-20767 is being exploited in the wild. An attacker who successfully exploited this...
Multiple vulnerabilities were identified in Apple Products. A remote attacker could exploit some of these vulnerabilities to trigger remote code...
Multiple vulnerabilities were identified in VMware products. A remote attacker could exploit some of these vulnerabilities to trigger elevation of...
Multiple vulnerabilities were identified in Android. A remote attacker could exploit some of these vulnerabilities to trigger sensitive information disclosure, denial...
Multiple vulnerabilities were identified in Cisco products. A remote attacker could exploit some of these vulnerabilities to trigger denial of...
A vulnerability was identified in Fortinet FortiManager. A remote attacker could exploit this vulnerability to trigger remote code execution on...
Updated Risk, Description, Source and Related Links.CVE-2024-30088 is being exploited in the wild. This is a Windows Kernel Time-of-check Time-of-use (TOCTOU)...
A vulnerability was identified in Mozilla Products. A remote attacker could exploit this vulnerability to trigger remote code execution on...
A vulnerability was identified in Mozilla Firefox. A remote attacker could exploit this vulnerability to trigger remote code execution on...
Multiple vulnerabilities were identified in Fortinet Products. A remote attacker could exploit some of these vulnerabilities to trigger denial of...
Multiple vulnerabilities were identified in Mozilla Products. A remote attacker could exploit these vulnerabilities to trigger denial of service condition...
Multiple vulnerabilities were identified in Zimbra. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution...