DESCRIPTION:Threat intelligence firm Bad Packets has reported that hackers areactively scanning the Internet for VMware vCenter servers vulnerableagainst a critical RCE flaw recently fixed by VMware. IMPACT:Multiple vulnerabilities have been discovered in VMware vCenter Server,which could result in remote code execution. Details of thesevulnerabilities are as follows: * A remote code execution vulnerability in vCenter Server which enablesa malicious actor to execute commands with unrestricted...
Read More
DESCRIPTION:Multiple vulnerabilities have been discovered in Microsoft products, themost severe of which could allow for arbitrary code execution in thecontext of the logged on user. Depending on the privileges associatedwith the user, an attacker could then install programs; view, change, ordelete data; or create new accounts with full user rights. Users whoseaccounts are configured to have fewer user rights on the system could beless impacted...
Read More
DESCRIPTION:Multiple vulnerabilities have been discovered in Cisco Webex NetworkRecording Player and Cisco Webex Player that could allow for arbitrarycode execution. The Webex meeting service is a hosted multimediaconferencing solution that is managed and maintained by Cisco Webex. TheWebex Network Recording Player is an application that is used to convertWebex recording files to standard formats such as Windows Media Video,Flash or MP4. The Webex Player is...
Read More
DESCRIPTION:Multiple vulnerabilities have been discovered in Mozilla Firefox,Firefox Extended Support Release (ESR) and Mozilla Firefox for iOS, themost severe of which could allow for arbitrary code execution. MozillaFirefox is a web browser used to access the Internet. Mozilla FirefoxESR is a version of the web browser intended to be deployed in largeorganizations. Mozilla Firefox for iOS is a web browser used to accessthe Internet on...
Read More
DESCRIPTION:Multiple vulnerabilities have been discovered in Google Chrome, the mostsevere of which could allow for arbitrary code execution. Google Chromeis a web browser used to access the Internet. Successful exploitation ofthe most severe of these vulnerabilities could allow an attacker toexecute arbitrary code in the context of the browser. Depending on theprivileges associated with the application, an attacker could view,change, or delete data. If this...
Read More