DESCRIPTION:Multiple vulnerabilities have been discovered in Apple iOS that couldallow for arbitrary code execution. iOS is a mobile operating system formobile devices, including the iPhone, iPad, and iPod touch. Successfulexploitation of these vulnerabilities could result in arbitrary codeexecution within the context of the application, an attacker gaining thesame privileges as the logged-on user, or the bypassing of securityrestrictions. Depending on the permission associated with theapplication...
Read More
DESCRIPTION:Multiple vulnerabilities have been discovered in Google Chrome, the mostsevere of which could allow for arbitrary code execution. Google Chromeis a web browser used to access the Internet. Successful exploitation ofthe most severe of these vulnerabilities could allow an attacker toexecute arbitrary code in the context of the browser. Depending on theprivileges associated with the application, an attacker could view,change, or delete data. If this...
Read More
DESCRIPTION:Multiple vulnerabilities have been discovered in Adobe Products, themost severe of which could allow for arbitrary code execution. * Connect is a suite of software for remote training, web conferencing,presentation, and desktop sharing.* Acrobat and Reader is a family of application software and Webservices mainly used to create, view, and edit PDF documents.* Experience Manager is a content management solution for buildingwebsites, mobile apps, and...
Read More
DESCRIPTION:Multiple vulnerabilities have been discovered in Google Chrome, the mostsevere of which could allow for arbitrary code execution. Google Chromeis a web browser used to access the Internet. Successful exploitation ofthe most severe of these vulnerabilities could allow an attacker toexecute arbitrary code in the context of the browser. Depending on theprivileges associated with the application, an attacker could view,change, or delete data. If this...
Read More
DESCRIPTION:There are six zero-day vulnerabilities that Microsoft has tracked asbeing actively exploited which include CVE-2021-33742, CVE-2021-33739,CVE-2021-31199, CVE-2021-31201, CVE-2021-31955 and CVE-2021-31956. IMPACT:Multiple vulnerabilities have been discovered in Microsoft products, themost severe of which could allow for arbitrary code execution. A full list of all vulnerabilities can be found at the link below:https://msrc.microsoft.com/update-guide/en-us Successful exploitation of the most severe of these vulnerabilitiescould result in an attacker gaining...
Read More