Multiple vulnerabilities have been discovered in Ivanti Avalanche, the most severe of which could allow for remote code execution. Ivanti Avalanche is a mobile device management system. Network security features allow one to manage wireless settings (including encryption and authentication), and apply those settings on a schedule throughout the network. Successful exploitation could allow for remote code execution in the context of the system. Depending on the privileges associated with the system, an attacker could then install programs; view, change, or delete data.
More Stories
chromium-125.0.6422.60-3.el7
FEDORA-EPEL-2024-07403ba3a8 Packages in this update: chromium-125.0.6422.60-3.el7 Update description: update to 125.0.6422.60 High CVE-2024-4947: Type Confusion in V8 High CVE-2024-4948: Use...
USN-6777-2: Linux kernel (Azure) vulnerabilities
Zheng Wang discovered that the Broadcom FullMAC WLAN driver in the Linux kernel contained a race condition during device removal,...
USN-6766-3: Linux kernel (AWS) vulnerabilities
It was discovered that the Open vSwitch implementation in the Linux kernel could overflow its stack during recursive action operations...
nextcloud-28.0.5-2.fc39
FEDORA-2024-80aa2e0e55 Packages in this update: nextcloud-28.0.5-2.fc39 Update description: Update nextcloud to 28.0.5 and PR #11 PR #11 Many issues fixed...
nextcloud-28.0.5-2.fc40
FEDORA-2024-456a389028 Packages in this update: nextcloud-28.0.5-2.fc40 Update description: Update nextcloud to 28.0.5 and PR #11 PR #11 Many issues fixed...
ZDI-CAN-24210: PDF-XChange
A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by 'Mat Powell of Trend Micro Zero Day Initiative' was reported to...