❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMS-ISAC (Security Advisories)

A Vulnerability in SonicOS Could Allow for Denial of Service (DoS)

24 November 2025 at 13:33

A vulnerability has been discovered SonicOS, which could allow for Denial of Service (DoS). SonicOS is the operating system that runs on SonicWall's network security appliances, such as firewalls. Successful exploitation of this vulnerabilityΒ could allow a remote unauthenticated attacker to cause Denial of Service (DoS), which could cause an impacted firewall to crash. This vulnerability ONLY impacts the SonicOS SSLVPN interface or service if enabled on the firewall.

Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution

24 November 2025 at 09:58

Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilitiesΒ could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Multiple Vulnerabilities in Fortinet Products Could Allow for Arbitrary Code Execution

18 November 2025 at 18:01

Multiple vulnerabilities have been discovered in Fortinet products, the most severe of which could allow for arbitrary code execution.

  • FortiClient for Windows isΒ a unified endpoint security solution that provides a range of security features, including a VPN client for secure remote access to corporate networks, antivirus protection, web filtering, and vulnerability assessment.
  • FortiExtender isΒ a device from Fortinet that provides secure 5G/LTE and Ethernet connectivity to extend a network's edge.
  • FortiMail isΒ a secure email gateway from Fortinet that protects against email-borne threats like spam, phishing, and malware, and prevents data loss.Β 
  • FortiPAM provides privileged account management, session monitoring and management, and role-based access control to secure access to sensitive assets and mitigate data breaches.
  • FortiSandbox is an advanced threat detection solution from Fortinet that uses sandboxing to analyze suspicious files and network traffic for advanced threats like zero-day malware and ransomware.
  • FortiADC isΒ anΒ application delivery controller (ADC)Β that improves the availability, performance, and security of web applications.Β 
  • FortiWeb isΒ a web application firewall (WAF) that protects web applications and APIs from cyberattacks like SQL injection and cross-site scripting, while also helping to meet compliance requirements.
  • FortiVoice isΒ a unified communications solution that combines voice, chat, conferencing, and fax into a single, secure platform for businesses and schools.
  • FortiOS is the Fortinet’s proprietary Operation System which is utilized across multiple product lines.
  • FortiProxy isΒ aΒ secure web gatewayΒ product from Fortinet that protects users from internet-borne attacks, enforces compliance, and improves network performance.

Β 

Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the affected service account. Depending on the privileges associated with the service account an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Service accounts that are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

A Vulnerability in FortiWeb Could Allow for Remote Code Execution

14 November 2025 at 13:51

A vulnerability has been discovered FortiWeb, which could allow for remote code execution. FortiWeb is a web application firewall (WAF) developed by Fortinet. It's designed to protect web applications and APIs from a wide range of attacks, including those targeting known vulnerabilities and zero-day exploits. Successful exploitation of this vulnerabilityΒ could allow an attacker to execute administrative commands on the system via crafted HTTP or HTTPS requests.

Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution

11 November 2025 at 15:33

Multiple vulnerabilities have been discovered in Mozilla products, the most severe of which could allow for arbitrary code execution.Β 

  • Mozilla Firefox is a web browser used to access the Internet.
  • Mozilla Firefox ESR is a version of the web browser intended to be deployed in large organizations.Β 

Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Critical Patches Issued for Microsoft Products, November 11, 2025

11 November 2025 at 14:48

Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution. Successful exploitation of the most severe of these vulnerabilities could result in an attacker gaining the same privileges as the logged-on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution

11 November 2025 at 13:44

Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution.

  • Adobe InDesign is a professional page layout and desktop publishing software used for designing and publishing content for both print and digital media.
  • Adobe InCopy is a professional word processor designed for writers and editors to collaborate with designers on documents simultaneously.
  • Adobe Photoshop is a powerful raster graphics editor developed by Adobe for image creation, editing, and manipulation.
  • Adobe Illustrator is a professional vector graphics editor used for creating logos, icons, typography, and other scalable graphics that retain clarity at any size.
  • Adobe Illustrator mobile is a vector graphics app for the iPad that allows users to create and edit illustrations, logos, and graphics on the go.
  • Adobe Pass is a cloud-based service that helps broadcasters, cable networks, and pay-TV providers manage subscriber access to online content, enabling viewers to log in once and watch across multiple devices and websites.
  • Adobe Substance 3D is a suite of tools for creating 3D content, including modeling, texturing, and rendering.
  • Adobe Format Plugins are software add-ons for Adobe products that extend functionality, allowing them to interact with and convert between various file formats.

Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution

10 November 2025 at 13:57

Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for remote code execution. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of the most severe of these vulnerabilities could allow for remote code execution. Depending on the privileges associated with the exploited component, an attacker could then install programs; view, change, or delete data; or create new accounts with full rights.Β 

Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution

7 November 2025 at 16:37

Multiple vulnerabilities have been discovered in Apple products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Multiple Vulnerabilities in Cisco Products Could Allow for Remote Code Execution

6 November 2025 at 17:42

Multiple vulnerabilities have been discovered in Cisco products, the most severe of which could allow for remote code execution. Cisco is a leading technology company best known for its networking hardware and software, such as routers and switches, that form the backbone of the internet and enterprise networks. Successful exploitation of the most severe of these vulnerabilitiesΒ could allow for remote code execution as root, which may lead to the complete compromise of the affected device.

A Vulnerability in CWP (aka Control Web Panel or CentOS Web Panel) Could Allow for Remote Code Execution

4 November 2025 at 16:31

A vulnerability has been discovered in CWP (aka Control Web Panel or CentOS Web Panel), which could allow for remote code execution. CWP, or Control Web Panel, isΒ a free server administration tool for enterprise-based Linux distributions like CentOS, which simplifies managing web hosting services. The admin interface (accessible on port 2087 or 2031) and the user interface (accessible on port 2083) serve distinct roles in server management. There are both PHP based applications but the admin interface, secured by HTTPS on port 2087, is designed for system administrators and provides full control over the server, allowing tasks such as configuring web servers (Apache/NGINX), managing DNS, setting up email services, creating user accounts, monitoring resources, and implementing security measures like Config Server Firewall (CSF). It requires root or admin credentials for access. Successful exploitation of this vulnerability could allow an actor to bypass the authentication process and trigger a command injection in the application.

A Vulnerability in Microsoft Windows Server Update Services (WSUS) Could Allow for Remote Code Execution

24 October 2025 at 15:18

A vulnerability has been discovered in Microsoft Windows Server Update Services (WSUS) which could allow for remote code execution. WSUS is a tool that helps organizations manage and distribute Microsoft updates across multiple computers. Instead of every PC downloading updates from Microsoft’s servers, WSUS downloads the updates and stores them, then distributes them to all computers on the network that connect to it. Successful exploitation of the vulnerabilityΒ could allow an attacker to gain full control of the WSUS server and distribute malicious updates to client devices.

Multiple Vulnerabilities in Ivanti Products Could Allow for Remote Code Execution

16 October 2025 at 14:14

Multiple vulnerabilities have been discovered in Ivanti products, the most severe of which could allow for remote code execution. Successful exploitation of the most severe of these vulnerabilities could allow for remote code execution in the context of the system.


  • Ivanti Endpoint Manager is a client-based unified endpoint management software.
  • Ivanti Endpoint Manager Mobile (Ivanti EPMM) is a mobile management software engine that enables mobile device, application, and content management.
  • Ivanti Neurons for Mobile Device Management (MDM) is a platform designed to streamline the management and security of mobile devices across various operating systems.


Depending on the privileges associated with the system, an attacker could then install programs; view, change, or delete data. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Critical Patches Issued for Microsoft Products, October 14, 2025

16 October 2025 at 14:11

Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution. Successful exploitation of the most severe of these vulnerabilities could result in an attacker gaining the same privileges as the logged-on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution

16 October 2025 at 14:10

Multiple vulnerabilities have been discovered in Mozilla products, the most severe of which could allow for arbitrary code execution.


  • *Mozilla Firefox is a web browser used to access the Internet.
  • Mozilla Firefox ESR is a version of the web browser intended to be deployed in large organizations.
  • Mozilla Thunderbird is an email client.
  • Mozilla Thunderbird ESR is a version of the email client intended to be deployed in large organizations.


Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution

16 October 2025 at 14:09

Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution.

Β 

  • Adobe Connect is a software suite for online collaboration.
  • Adobe Commerce is an enterprise-grade eCommerce platform that provides tools for creating and managing online stores for both B2B and B2C businesses.
  • Magento Open Source isΒ a free, downloadable eCommerce platform from Adobe that provides the core tools to create and manage an online store.
  • Adobe Creative Cloud isΒ a subscription service that provides access to Adobe's suite of creative software applications.
  • Adobe Bridge isΒ a digital asset management and file browser for Creative Cloud applications.
  • Adobe Animate isΒ a multimedia creation tool used for designing interactive animations.
  • Adobe Experience Manager (AEM) is a comprehensive content management and digital asset management system.
  • Adobe Substance 3D Viewer is a free, standalone desktop application (currently in beta) designed to help designers and artists visualize and work with 3D models, textures, and materials.
  • Adobe Substance 3D Modeler is a sculpting and 3D modeling application within Adobe's Substance 3D suite that combines virtual reality (VR) and desktop experiences for natural, gestural creation of 3D models.
  • Adobe FrameMaker is an authoring and publishing application primarily used forΒ creating and managing long, complex technical and structured documents.
  • Adobe Illustrator is used forΒ creating vector-based graphics like logos, icons, and illustrations that can be scaled to any size without losing quality.
  • Adobe Dimension is a 3D design application for creating photorealistic product mockups, brand visualizations, and other 3D graphics.
  • Adobe Substance 3D Stager isΒ a professional software for creating and rendering 3D scenes to produce photorealistic images.

Β 

Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights

Β 

A Vulnerability in Oracle E-Business Suite Could Allow for Remote Code Execution

16 October 2025 at 14:04

A vulnerability has been discovered in Oracle E-Business Suite, which could allow for remote code execution. Oracle E-Business Suite (EBS) is a comprehensive suite of integrated business applications that runs core enterprise functions. Successful exploitation of this vulnerability could allow an actor to execute code in the context of the affected component. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

Multiple Vulnerabilities in VMware Aria Operations and VMware Tools Could Allow for Privilege Escalation

30 September 2025 at 22:12

Multiple vulnerabilities have been discovered in VMware Aria Operations and VMware Tools, the most severe of which could allow for privilege escalation to root. VMware Aria is a multi-cloud management platform that provides automation, operations, and cost management for applications and infrastructure across private, public, and hybrid cloud environments. Successful exploitation of the most severe of these vulnerabilitiesΒ could allow for privilege escalation to root. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

Multiple Vulnerabilities in Cisco Products Could Allow for Remote Code Execution

25 September 2025 at 19:17

Multiple vulnerabilities have been discovered in Cisco products, the most severe of which could allow for remote code execution. Cisco is a leading technology company best known for its networking hardware and software, such as routers and switches, that form the backbone of the internet and enterprise networks. Successful exploitation of the most severe of these vulnerabilitiesΒ could allow for remote code execution as root, which may lead to the complete compromise of the affected device.

❌
❌