DESCRIPTION:Multiple vulnerabilities have been discovered in Google Chrome, the mostsevere of which could allow for arbitrary code execution. Google Chromeis a web browser used to access the Internet. Successful exploitation ofthe most severe of these vulnerabilities could allow an attacker toexecute arbitrary code in the context of the browser. Depending on theprivileges associated with the application, an attacker could view,change, or delete data. If this...
Read More
DESCRIPTION:There are six zero-day vulnerabilities that Microsoft has tracked asbeing actively exploited which include CVE-2021-33742, CVE-2021-33739,CVE-2021-31199, CVE-2021-31201, CVE-2021-31955 and CVE-2021-31956. IMPACT:Multiple vulnerabilities have been discovered in Microsoft products, themost severe of which could allow for arbitrary code execution. A full list of all vulnerabilities can be found at the link below:https://msrc.microsoft.com/update-guide/en-us Successful exploitation of the most severe of these vulnerabilitiescould result in an attacker gaining...
Read More
DESCRIPTION:Multiple vulnerabilities have been discovered in SAP products, the mostsevere of which could allow for remote code execution. SAP is a softwarecompany which creates software to manage business operations andcustomer relations. Successful exploitation of the most severe of thesevulnerabilities could allow an unauthenticated, remote attacker toexecute code on the affected systems. Depending on the privilegesassociated with the application, an attacker could then installprograms; view, change,...
Read More
DESCRIPTION:Threat intelligence firm Bad Packets has reported that hackers areactively scanning the Internet for VMware vCenter servers vulnerableagainst a critical RCE flaw recently fixed by VMware. IMPACT:Multiple vulnerabilities have been discovered in VMware vCenter Server,which could result in remote code execution. Details of thesevulnerabilities are as follows: * A remote code execution vulnerability in vCenter Server which enablesa malicious actor to execute commands with unrestricted...
Read More
DESCRIPTION:Multiple vulnerabilities have been discovered in Microsoft products, themost severe of which could allow for arbitrary code execution in thecontext of the logged on user. Depending on the privileges associatedwith the user, an attacker could then install programs; view, change, ordelete data; or create new accounts with full user rights. Users whoseaccounts are configured to have fewer user rights on the system could beless impacted...
Read More