Security Advisories & Alerts


Multiple Vulnerabilities in HP Intelligent Management Center (iMC) Could Allow for Arbitrary Code Execution.

DESCRIPTIONMultiple vulnerabilities have been discovered in HP Intelligent Management Center (iMC), the most severe of which could allow for arbitrary code execution. HP Intelligent Management Center (iMC) is software platform used to manage enterprise network environments. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code...

Read more


Oracle Quarterly Critical Patches Issued October 20, 2020

DESCRIPTIONMultiple vulnerabilities have been discovered in Oracle products, which could allow for remote code execution. SYSTEM AFFECTED    • Application Performance Management (APM), versions 13.3.0.0, 13.4.0.0    • Big Data Spatial and Graph, versions prior to 3.0    • Enterprise Manager Base Platform, versions 13.2.1.0, 13.3.0.0, 13.4.0.0    • Enterprise Manager for Peoplesoft, version...

Read more


A Vulnerability in Juniper Junos OS Could Allow for Denial of Service

DESCRIPTIONA vulnerability has been discovered in Juniper Junos OS, which could allow for denial of service. Junos OS is a FreeBSD-based operating system used in Juniper Networks routers. This vulnerability specifically affects MX Series routers and EX9200 series switches with Trio-based PFEs configured with IPv6 Distributed Denial of Service (DDoS)...

Read more


CVE-2020-15504: Sophos XG Firewall Admin Web Interface sql injection

DESCRIPTIONA SQL injection vulnerability in the user and admin web interfaces of Sophos XG Firewall v18.0 MR1 and older potentially allows an attacker to run arbitrary code remotely. The fix is built into the re-release of XG Firewall v18 MR-1 (named MR-1-Build396) and the v17.5 MR13 release. All other versions...

Read more


Critical Patches Issued for Microsoft Products, October 13, 2020

DESCRIPTIONMultiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution. Successful exploitation of the most severe of these vulnerabilities could result in an attacker gaining the same privileges as the logged-on user. Depending on the privileges associated with the user, an...

Read more


Page 3 of 4612345...102030...Last »