by Fortify Security Team | Dec 5, 2022 | Actively Exploited, Google, Security Advisories
A Vulnerability has been discovered in Google Chrome which could allow for arbitrary code execution. Google Chrome is a web browser used to access the internet. Successful exploitation of this vulnerability could allow for arbitrary code execution in the context of...
by Fortify Security Team | Nov 28, 2022 | Actively Exploited, Google, Security Advisories
A Vulnerability has been discovered in Google Chrome which could allow for arbitrary code execution. Google Chrome is a web browser used to access the internet. Successful exploitation of this vulnerability could allow for arbitrary code execution in the context of...
by Fortify Security Team | Nov 8, 2022 | Actively Exploited, Microsoft, Security Advisories
Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs;...
by Fortify Security Team | Oct 11, 2022 | Actively Exploited, Microsoft, Security Advisories
Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs;...
by Fortify Security Team | Oct 11, 2022 | Actively Exploited, Fortinet, Security Advisories
A vulnerability has been discovered in FortiOS, FortiProxy and FortiSwitchManager, which could allow for authentication bypass on administrative interface. FortiOS is the Fortinet’s proprietary Operation System which is utilized across multiple product lines....
by Fortify Security Team | Sep 13, 2022 | Actively Exploited, Microsoft, Security Advisories
Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs;...