Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution. Adobe is a software that is...
Six 0-Days Lead Microsoft’s August 2024 Patch Push
Microsoft today released updates to fix at least 90 security vulnerabilities in Windows and related software, including a whopping six zero-day flaws that are already...
Multiple Vulnerabilities in Ivanti Products Could Allow for Remote Code Execution
Multiple vulnerabilities have been discovered in Ivanti products, the most severe of which could allow for remote code execution. Ivanti Avalanche is a mobile device...
Critical Patches Issued for Microsoft Products, August 13, 2024
Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged...
USN-6959-1: .NET vulnerability
It was discovered that .NET suffered from an information disclosure vulnerability. An attacker could potentially use this issue to read targeted email messages. Read More
Re: Microsoft PlayReady WMRMECC256 Key / root key issue (attack #5)
Posted by Security Explorations on Aug 13 Hello All, In my previous post, I shamefully confused two root keys (WMRMECC256 and ECC256MSBCertRootIssuer) while decribing the...
USN-6949-2: Linux kernel vulnerabilities
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the...
The AI Fix #11: AI gods, a robot dentist, and an angry human
In episode 11 of The AI Fix, OpenAI battles a Shakespearean lawyer, Graham sings an uncanny bluegrass acrostic, Google drops the ball with a terrible...
Gold Mining Firm in Australia Reports Ransomware Breach
In a Monday filing with the ASX, Evolution Mining stated that the incident was contained Read More
USN-6958-1: Libcroco vulnerabilities
It was discovered that Libcroco was incorrectly accessing data structures when reading bytes from memory, which could cause a heap buffer overflow. An attacker could...