DESCRIPTION:Multiple vulnerabilities have been discovered in Adobe Media Encoder,Adobe Bridge, Adobe Photoshop, Adobe XMP Toolkit SDK, and AdobeCaptivate, the most severe of which could allow for arbitrary codeexecution. * Adobe Media Encoder is software that provides media content over theinternet* Adobe Bridge is a digital asset management application* Adobe Photoshop is a graphics editor* Adobe XMP Toolkit SDK is a development kit for Adobe’s ExtensibleMetadata...
Read More
DESCRIPTION:Multiple vulnerabilities have been discovered in Google Chrome, the mostsevere of which could allow for arbitrary code execution. Google Chromeis a web browser used to access the Internet. Successful exploitation ofthe most severe of these vulnerabilities could allow an attacker toexecute arbitrary code in the context of the browser. Depending on theprivileges associated with the application, an attacker could view,change, or delete data. If this...
Read More
DESCRIPTION:Multiple vulnerabilities have been discovered in Google Chrome, the mostsevere of which could allow for arbitrary code execution. Google Chromeis a web browser used to access the Internet. Successful exploitation ofthe most severe of these vulnerabilities could allow an attacker toexecute arbitrary code in the context of the browser. Depending on theprivileges associated with the application, an attacker could view,change, or delete data. If this...
Read More
DESCRIPTION:Multiple vulnerabilities have been discovered in the Google Androidoperating system (OS), the most severe of which could allow for remotecode execution. Android is an operating system developed by Google formobile devices, including, but not limited to, smartphones, tablets, andwatches. Successful exploitation of the most severe of thesevulnerabilities could allow for remote code execution within the contextof a privileged process. Depending on the privileges associated withthis...
Read More
DESCRIPTION:Multiple vulnerabilities have been discovered in Rockwell AutomationISaGRAF5 Runtime, the most severe of which could allow for remote codeexecution. These affected Industrial Control System (ICS) products areused across several sectors, including chemical, critical manufacturing,food and agriculture, water and wastewater systems and others.Successful exploitation of the most severe of these vulnerabilitiescould allow an attacker to perform remote code execution on the affecteddevice. IMPACT:Multiple vulnerabilities have been...
Read More