Security Advisories & Alerts

21Nails: Multiple Critical Vulnerabilities in Exim Mail Server

The Qualys Research Team has discovered multiple critical vulnerabilities in the Exim mail server, some of the which can be chained together to obtain full remote unauthenticated code execution and gain root privileges. The 21Nails vulnerabilities, if left unpatched, could allow threat actors to take over these systems and then intercept or tamper with email communications passing through the Exim server. 11 issues are local...

Read More


Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution

DESCRIPTION:Multiple vulnerabilities have been discovered in Apple Products, themost severe of which could allow for arbitrary code execution. * iCloud for Windows is a cloud storage and cloud computing service.* Xcode is an integrated development environment (IDE) for macOS.* Safari is a graphical web browser developed by Apple, based on theWebKit engine.* macOS Big Sur is the 17th and current major release of macOS.* macOS...

Read More


Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution

DESCRIPTION:Multiple vulnerabilities have been discovered in Google Chrome, the mostsevere of which could allow for arbitrary code execution. Google Chromeis a web browser used to access the Internet. Successful exploitation ofthe most severe of these vulnerabilities could allow an attacker toexecute arbitrary code in the context of the browser. Depending on theprivileges associated with the application, an attacker could view,change, or delete data. If this...

Read More


Multiple Vulnerabilities in SonicWall Email Security Could Allow for Arbitrary Code Execution

DESCRIPTION:Multiple vulnerabilities in SonicWall Email Security (ES) could allowfor arbitrary code execution. Successful exploitation of thesevulnerabilities could allow for arbitrary code execution. SonicWallEmail Security (ES) is an email security solution that providescomprehensive inbound and outbound protection, and defends againstadvanced email-borne threats such as ransomware, zero-day threats, spearphishing and business email compromise (BEC). The solution can bedeployed as a physical appliance, virtual appliance, softwareinstallation, or a...

Read More


Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution

DESCRIPTION:Multiple vulnerabilities have been discovered in Google Chrome, the mostsevere of which could allow for arbitrary code execution. Google Chromeis a web browser used to access the Internet. Successful exploitation ofthe most severe of these vulnerabilities could allow an attacker toexecute arbitrary code in the context of the browser. Depending on theprivileges associated with the application, an attacker could view,change, or delete data. If this...

Read More


Page 31 of 132« First...1020...2930313233...405060...Last »