Advisories
The latest information on known vulnerabilities in popular software and systems
121 - 130 of 195 results
Issued on 11.07.2024
A vulnerability has been discovered in Android OS that could allow for remote code execution. Android is an operating system developed by Go...
Issued on 11.06.2024
A vulnerability has been discovered in Cisco Unified Industrial Wireless Software for Ultra-Reliable Wireless Backhaul Access Point that could al...
Issued on 10.29.2024
Multiple vulnerabilities have been discovered in Siemens InterMesh Subscriber Devices, the most severe of which could allow for remote code execu...
Issued on 10.27.2024
Multiple vulnerabilities have been discovered in Apple products, the most severe of which could allow for arbitrary code execution. Successful ex...
Issued on 10.23.2024
A vulnerability has been discovered in Fortinet FortiManager which could allow for remote code execution. FortiManager is a network and security ...
Issued on 10.18.2024
Multiple vulnerabilities have been discovered in Microsoft Edge (Chromium-based), the most severe of which could allow for arbitrary code executi...
Issued on 10.15.2024
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exp...
Issued on 10.15.2024
Multiple vulnerabilities have been discovered in Oracle products, the most severe of which could allow for remote code execution.
Issued on 10.14.2024
Multiple Vulnerabilities in Palo Alto Network’s Expedition have been discovered, the most severe of which could allow for arbitrary code executio...
Issued on 10.10.2024
A vulnerability has been discovered in Mozilla Firefox which could allow for arbitrary code execution. Mozilla Firefox is a web browser used to a...
Explore Related Cybersecurity Solutions

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More