DESCRIPTION:A vulnerability has been discovered in Schneider Electric Modicon PLCs,which could result in remote code execution. A Programmable LogicController, or PLC, is a ruggedized computer used for industrialautomation. These controllers can automate a specific process, machinefunction, or even an entire production line. Successful exploitation ofthis vulnerability could allow for remote code execution within thecontext of a privileged process. Depending on the privileges associatedwith this application,...
Read More
DESCRIPTION:Multiple vulnerabilities have been discovered in Microsoft products, themost severe of which could allow for arbitrary code execution in thecontext of the logged on user. Depending on the privileges associatedwith the user, an attacker could then install programs; view, change, ordelete data; or create new accounts with full user rights. Users whoseaccounts are configured to have fewer user rights on the system could beless impacted...
Read More
DESCRIPTION:Multiple vulnerabilities have been discovered in Adobe Products, themost severe of which could allow for arbitrary code execution. * Dimension is a 3D rendering and design software.* Illustrator is a vector graphics editor and design program.* Adobe Framemaker is a document processing software used to write andedit large or complex documents.* Acrobat and Reader is a family of application software and Webservices mainly used to...
Read More
DESCRIPTION:Multiple vulnerabilities have been discovered in Mozilla Firefox andFirefox Extended Support Release (ESR), the most severe of which couldallow for arbitrary code execution. Mozilla Firefox is a web browserused to access the Internet. Mozilla Firefox ESR is a version of the webbrowser intended to be deployed in large organizations. Successfulexploitation of these vulnerabilities could allow for arbitrary codeexecution. Depending on the privileges associated with the...
Read More
Description:A new NTLM relay attack called PetitPotam has been discovered that allows threat actors to take over a domain controller, and thus an entire Windows domain.Many organizations utilize Microsoft Active Directory Certificate Services, which is a public key infrastructure (PKI) server that can be used to authenticate users, services, and machines on a Windows domain.PetitPotam’ that performs an NTLM relay attack that does not rely...
Read More