by Fortify Security Team | May 5, 2022 | Security Advisories
Multiple vulnerabilities have been discovered in F5Networks products, the most severe of which could result in arbitrary code execution. BIG-IP is a family of products covering software and hardware designed around application availability, access control, and...
by Fortify Security Team | May 4, 2022 | Security Advisories
Multiple vulnerabilities have been discovered in Mozilla Firefox and Firefox Extended Support Release (ESR), the most severe of which could allow for arbitrary code execution. Mozilla Firefox is a web browser used to access the Internet. Mozilla Firefox ESR is a...
by Fortify Security Team | May 4, 2022 | Security Advisories
A vulnerability which could allow for DNS poisoning attacks has been discovered in the C standard libraries uClibe and uClibe-ng, which are widely used in IoT products. DNS poisoning enables a subsequent Man-in-the-Middle scenario, which can be used to perform actions...
by Fortify Security Team | May 3, 2022 | Security Advisories
Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for escalation of privilege. Android is an operating system developed by Google for mobile devices, including, but not limited to,...
by Fortify Security Team | Apr 27, 2022 | Security Advisories
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser used to access the Internet. Successful exploitation of the most severe of these vulnerabilities could...
by Fortify Security Team | Apr 22, 2022 | Security Advisories
Multiple vulnerabilities have been discovered in Oracle products, which could allow for remote code execution. April 22 – THREAT INTELLIGENCE UPDATED: A new proof of concept code demonstrating a newly disclosed digital signature bypass vulnerability in Java has been...