Author Archives: CIRT Team



CIRT Team

in Security Advisories & Alerts

Multiple Vulnerabilities in Rockwell Automation ISaGRAF5 Runtime Could Allow for Remote Code Execution

DESCRIPTION:Multiple vulnerabilities have been discovered in Rockwell AutomationISaGRAF5 Runtime, the most severe of which could allow for remote codeexecution. These affected Industrial Control System (ICS) products areused across several sectors, including chemical, critical manufacturing,food and agriculture, water and wastewater systems and others.Successful exploitation of the most severe of these vulnerabilitiescould allow an attacker to perform remote code execution on the affecteddevice. IMPACT:Multiple vulnerabilities have been...

Read More

0
16 Aug 2021
in Security Advisories & Alerts

A Vulnerability in macOS Big Sur, iOS and iPadOS Could Allow for Arbitrary Code Execution

DESCRIPTION:A vulnerability has been discovered in macOS Big Sur, iOS and iPadOS,which could allow for arbitrary code execution. * iOS is a mobile operating system for mobile devices, including theiPhone, iPad, and iPod touch.* iPadOS is the successor to iOS 12 and is a mobile operating system foriPads.* macOS Big Sur is the 17th and current major release of macOS. Successful exploitation of this vulnerability...

Read More

0
16 Aug 2021
in Security Advisories & Alerts

Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution

DESCRIPTION:Multiple vulnerabilities have been discovered in Google Chrome, the mostsevere of which could allow for arbitrary code execution. Google Chromeis a web browser used to access the Internet. Successful exploitation ofthe most severe of these vulnerabilities could allow an attacker toexecute arbitrary code in the context of the browser. Depending on theprivileges associated with the application, an attacker could view,change, or delete data. If this...

Read More

0
09 Aug 2021
in Security Advisories & Alerts

Oracle Quarterly Critical Patches Issued July 20, 2021

DESCRIPTION:Multiple vulnerabilities have been discovered in Oracle products, whichcould allow for remote code execution. SYSTEM AFFECTED:* Oracle Database Server, versions 12.1.0.2, 19c* Big Data Spatial and Graph, versions prior to 2.0, prior to 23.1* Essbase, version 21.2* Essbase Analytic Provider Services, versions 11.1.2.4, 21.2* Hyperion Essbase Administration Services, versions 11.1.2.4, 21.2* Oracle Commerce Guided Search / Oracle Commerce Experience Manager,version 11.3.1.5* Oracle Communications Billing and...

Read More

0
09 Aug 2021
in Security Advisories & Alerts

A Vulnerability in HP, Xerox, and Samsung Printer Drivers Could Allow Attackers to Gain Administrator Rights on a System

DESCRIPTION:A vulnerability has been discovered HP, Xerox, and Samsung printerdrivers, which could result in local privilege escalation. A printerdriver is a piece of system software that allows your computer tointeract with your printer. This vulnerability specifically deals withan old printer driver from 2005 called SSPORT.SYS which affects hundredsof millions of devices and millions of users worldwide. Successfullyexploitation of this vulnerability might allow attackers to potentiallyinstall...

Read More

0
09 Aug 2021
in Security Advisories & Alerts

Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution

DESCRIPTION:Multiple vulnerabilities have been discovered in Google Chrome, the mostsevere of which could allow for arbitrary code execution. Google Chromeis a web browser used to access the Internet. Successful exploitation ofthe most severe of these vulnerabilities could allow an attacker toexecute arbitrary code in the context of the browser. Depending on theprivileges associated with the application, an attacker could view,change, or delete data. If this...

Read More

0
09 Aug 2021
in Security Advisories & Alerts

A Vulnerability in Schneider Electric Modicon PLCs Could Allow for Remote Code Execution

DESCRIPTION:A vulnerability has been discovered in Schneider Electric Modicon PLCs,which could result in remote code execution. A Programmable LogicController, or PLC, is a ruggedized computer used for industrialautomation. These controllers can automate a specific process, machinefunction, or even an entire production line. Successful exploitation ofthis vulnerability could allow for remote code execution within thecontext of a privileged process. Depending on the privileges associatedwith this application,...

Read More

0
09 Aug 2021
in Security Advisories & Alerts

Critical Patches Issued for Microsoft Products, July 13, 2021

DESCRIPTION:Multiple vulnerabilities have been discovered in Microsoft products, themost severe of which could allow for arbitrary code execution in thecontext of the logged on user. Depending on the privileges associatedwith the user, an attacker could then install programs; view, change, ordelete data; or create new accounts with full user rights. Users whoseaccounts are configured to have fewer user rights on the system could beless impacted...

Read More

0
09 Aug 2021
in Security Advisories & Alerts

Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution

DESCRIPTION:Multiple vulnerabilities have been discovered in Adobe Products, themost severe of which could allow for arbitrary code execution. * Dimension is a 3D rendering and design software.* Illustrator is a vector graphics editor and design program.* Adobe Framemaker is a document processing software used to write andedit large or complex documents.* Acrobat and Reader is a family of application software and Webservices mainly used to...

Read More

0
01 Aug 2021
in Security Advisories & Alerts

Multiple Vulnerabilities in Mozilla Firefox Could Allow for Arbitrary Code Execution

DESCRIPTION:Multiple vulnerabilities have been discovered in Mozilla Firefox andFirefox Extended Support Release (ESR), the most severe of which couldallow for arbitrary code execution. Mozilla Firefox is a web browserused to access the Internet. Mozilla Firefox ESR is a version of the webbrowser intended to be deployed in large organizations. Successfulexploitation of these vulnerabilities could allow for arbitrary codeexecution. Depending on the privileges associated with the...

Read More

0
01 Aug 2021
Page 6 of 11« First...45678...Last »