Author Archives: CIRT Team



CIRT Team

in Security Advisories & Alerts

Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution

DESCRIPTION:Multiple vulnerabilities have been discovered in Google Chrome, the mostsevere of which could allow for arbitrary code execution. Google Chromeis a web browser used to access the Internet. Successful exploitation ofthe most severe of these vulnerabilities could allow an attacker toexecute arbitrary code in the context of the browser. Depending...

Read more

0
27 Apr 2021
in Security Advisories & Alerts

Multiple Vulnerabilities in SonicWall Email Security Could Allow for Arbitrary Code Execution

DESCRIPTION:Multiple vulnerabilities in SonicWall Email Security (ES) could allowfor arbitrary code execution. Successful exploitation of thesevulnerabilities could allow for arbitrary code execution. SonicWallEmail Security (ES) is an email security solution that providescomprehensive inbound and outbound protection, and defends againstadvanced email-borne threats such as ransomware, zero-day threats, spearphishing and business email...

Read more

0
25 Apr 2021
in Security Advisories & Alerts

Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution

DESCRIPTION:Multiple vulnerabilities have been discovered in Google Chrome, the mostsevere of which could allow for arbitrary code execution. Google Chromeis a web browser used to access the Internet. Successful exploitation ofthe most severe of these vulnerabilities could allow an attacker toexecute arbitrary code in the context of the browser. Depending...

Read more

0
25 Apr 2021
in Security Advisories & Alerts

Multiple Vulnerabilities in Mozilla Firefox and Thunderbird Could Allow for Arbitrary Code Execution

DESCRIPTION:Multiple vulnerabilities have been discovered in Mozilla Firefox/FirefoxESR/Thunderbird, the most severe of which could allow for arbitrary codeexecution. Mozilla Firefox is a web browser that is used to access theInternet. Mozilla Firefox ESR is a version of the web browser intendedto be deployed in large organizations. Mozilla Thunderbird is an...

Read more

0
21 Apr 2021
in Security Advisories & Alerts

A Vulnerability in Pulse Connect Secure VPN Could Allow for Remote Code Execution

DESCRIPTION:A vulnerability has been discovered in Pulse Connect Secure VPN thatcould allow for remote code execution. Pulse Connect Secure VPN providesTLS and mobile VPN solutions. Successful exploitation of thisvulnerability could allow for remote code execution. Depending on theprivileges associated with the application, an attacker could theninstall programs; view, change, or...

Read more

0
21 Apr 2021
in Security Advisories & Alerts

Vulnerabilities in ArubaNetworks ArubaOS and SD-WAN Could Allow for Arbitrary Code Execution

DESCRIPTION:Multiple vulnerabilities have been discovered in ArubaNetwork’s ArubaOSand SD-WAN, which could result in arbitrary code execution. Aruba (aHewlett Packard Enterprise company) is the worldwide second-largestenterprise WLAN vendor after Cisco. ArubaOS is its WLAN controllersystem for automating WLAN management, and SD-WAN (software defined WAN)is its cloud-oriented WAN orchestration system. Successful exploitationof...

Read more

0
19 Apr 2021
in Security Advisories & Alerts

A Vulnerability in Juniper Junos OS Could Allow for Remote Code Execution

DESCRIPTION:A vulnerability has been discovered in Juniper Junos OS that could allowfor remote code execution. Junos OS is a single network operating systemproviding a common language across Juniper’s routing, switching andsecurity devices. This vulnerability specifically affects the overlaydservice of Juniper Networks Junos OS. The overlayd daemon handlesOverlay OAM packets, such...

Read more

0
18 Apr 2021
in Security Advisories & Alerts

Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution

DESCRIPTION:Multiple vulnerabilities have been discovered in Google Chrome, the mostsevere of which could allow for arbitrary code execution. Google Chromeis a web browser used to access the Internet. Successful exploitation ofthe most severe of these vulnerabilities could allow an attacker toexecute arbitrary code in the context of the browser. Depending...

Read more

0
18 Apr 2021
Page 1 of 13412345...102030...Last »