Security Advisories & Alerts

Multiple Vulnerabilities in Cisco Webex Network Recording Player

Description: Multiple vulnerabilities in the Cisco Webex Network Recording Player and Cisco Webex Player could allow an unauthenticated, remote attacker to execute arbitrary code on the system of a targeted user. An attacker could exploit these vulnerabilities by sending a user a link or email attachment containing a malicious ARF (Advanced Recording Format) or WRF (Webex Recording Format) file via a link or an email...

Read More


Google Releases Security Updates for Chrome

Description : Multiple vulnerabilities were identified in Google Chrome, a remote attacker could exploit some of these vulnerabilities to trigger remote code execution and security restriction bypass on the targeted system. Impact: Remote Code Execution     Security Restriction Bypass System / Technologies Affected :    Google Chrome (Desktop version) prior to 80.0.3987.132 Mitigation: Before installation of the software, please visit the vendor’s web-site for more details....

Read More


A Vulnerability in WordPress Duplicator Plugin Could Allow for Arbitrary File Downloads

Description: A vulnerability has been discovered in the WordPress Duplicator Plugin that could allow for Arbitrary File Downloads. This vulnerability exists due to the way Duplicator handles certain requests from unauthenticated users. When an attacker sends a specially crafted request to Duplicator, an unauthenticated user can download arbitrary files from the target WordPress site. This includes the ‘wp-config.php’ file, which contains various site configurations, and...

Read More


Critical Alert: A Vulnerability in Apache Tomcat Could Allow for Arbitrary File Reading (CVE-2020-1938)

Subject: A Vulnerability in Apache Tomcat Could Allow for Arbitrary File Reading (CVE-2020-1938)   Description: A vulnerability has been discovered in Apache Tomcat, which could allow for reading of arbitrary files on the affected system. The vulnerability exists in the AJP protocol, which is by default exposed over TCP port 8009 and enabled. The vulnerability can be exploited by an attacker who can communicate with...

Read More


Common Vulnerabilities and Exposures (CVE) Report February 2020

The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures. The National Cybersecurity FFRDC, operated by the Mitre Corporation, maintains the system, with funding from the National Cyber Security Division of the United States Department of Homeland Security. Report : Following is the CVE report from BGD e-GOV CIRT for the month of February 2020.


Page 61 of 130« First...102030...5960616263...708090...Last »