DESCRIPTION:Multiple vulnerabilities have been identified in Mozilla Thunderbird,the most severe of which could allow for arbitrary code execution.Mozilla Thunderbird is an email client. Successful exploitation of themost severe of these vulnerabilities could allow for arbitrary codeexecution. Depending on the privileges associated with the user, anattacker could then install programs; view,...
Read more
DESCRIPTION:A vulnerability has been discovered in SonicWall SMA100 Series thatcould allow for arbitrary file deletion. The SonicWall SMA 100 Series isa unified secure access gateway that enables organizations to provideaccess to any application, anytime, from anywhere, and any devices,including managed and unmanaged. Successful exploitation of thisvulnerability could result in arbitrary...
Read more
Description: Apache Log4j2 <=2.14.1 JNDI features used in the configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is...
Read more
DESCRIPTION:A vulnerability has been discovered in Confluence Server and DataCenter, which could allow for arbitrary code execution. Confluence is awiki tool used to help teams collaborate and share knowledgeefficiently. Successful exploitation of this vulnerability could allowan unauthenticated user to execute arbitrary code on a Confluence Serveror Data Center instance. Depending...
Read more
DESCRIPTION:Multiple vulnerabilities have been discovered in the Google Androidoperating system (OS), the most severe of which could allow for remotecode execution. Android is an operating system developed by Google formobile devices, including, but not limited to, smartphones, tablets, andwatches. Successful exploitation of the most severe of thesevulnerabilities could allow for...
Read more
২০০৮ সালে OIC (অরগানাইজেশন অফ ইসলামিক কো-অপারেশন) এর- ৩৫তম অধিবেশনে Organisation of the Islamic Cooperation -Computer Emergency Response Team (OIC-CERT) প্রতিষ্ঠিত হয়। আজ ২৮ সেপ্টেম্বর, ২০২১ মঙ্গলবার স্বাগতিক দেশ ওমানে ‘Enhance Cyber Security Readiness’ বিষয়ে OIC-CERT -এর বাৎসরিক সাইবার ড্রিল ‘9th Arab Regional and OIC-CERT Cyber Drill 2021’ অনুষ্ঠিত হল।...
Read more
Apple has released security updates to address vulnerabilities—CVE-2021-30858 and CVE-2021-30860—in multiple products. An attacker could exploit these vulnerabilities to take control of an affected device. CISA is aware of public reporting that these vulnerabilities may have been exploited in the wild. CISA encourages users and administrators to review the security...
Read more
DESCRIPTION:A vulnerability has been discovered in Confluence Server and DataCenter, which could allow for arbitrary code execution. Confluence is awiki tool used to help teams collaborate and share knowledgeefficiently. Successful exploitation of this vulnerability could allowan unauthenticated user to execute arbitrary code on a Confluence Serveror Data Center instance. Depending...
Read more
DESCRIPTION:Multiple vulnerabilities have been discovered in Google Chrome, the mostsevere of which could allow for arbitrary code execution. Google Chromeis a web browser used to access the Internet. Successful exploitation ofthe most severe of these vulnerabilities could allow an attacker toexecute arbitrary code in the context of the browser. Depending...
Read more
অদ্য ০৬ই সেপ্টেম্বর, ২০২১ তারিখে তথ্য প্রযুক্তি ও যোগাযোগ বিভাগের আওতাধীন বিজিডি ই-গভ সিআইআরটি এর সক্ষমতা বৃদ্ধি শীর্ষক প্রকল্প -এর সার্বিক কার্যক্রম বিষয়ক একটি সেমিনার বাংলাদেশ কম্পিউটার কাউন্সিল ভবনের অডিটোরিয়ামে অনুষ্ঠিত হয়। দিনব্যাপী এই সেমিনার ও কর্মশালায় মূল প্রবন্ধ উপস্থাপন করেন জনাব তারেক এম বরকতউল্লাহ, প্রকল্প পরিচালক, বিজিডি ই-গভ সিআইআরটি,...
Read more