Rilevato lo sfruttamento attivo in rete della vulnerabilità CVE-2022-27924 – già sanata dal vendor – presente nel prodotto Zimbra Collaboration Suite Source link Author: csirt@alfacert.gov.it Article used for cyber security disclosure.
Rilevato lo sfruttamento attivo in rete della vulnerabilità CVE-2022-27924 – già sanata dal vendor – presente nel prodotto Zimbra Collaboration Suite Source link Author: csirt@alfacert.gov.it Article used for cyber security disclosure.
Original release date: August 4, 2022 CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise. Note:…
Aggiornamenti di sicurezza Cisco sanano tre vulnerabilità critiche nei router VPN Small Business Source link Author: csirt@alfacert.gov.it Article used for cyber security disclosure.
Original release date: August 3, 2022 VMware has released security updates to address multiple vulnerabilities in VMware’s Workspace ONE Access, Access Connector, Identity Manager, Identity Manager Connector, and vRealize Automation. A remote attacker could exploit some of these vulnerabilities to take control of an affected…
Rilasciati aggiornamenti di sicurezza Fortinet che risolvono vulnerabilità in vari prodotti Source link Author: csirt@alfacert.gov.it Article used for cyber security disclosure.
Original release date: July 27, 2022 | Last revised: July 28, 2022 The Samba Team has released security updates to address vulnerabilities in multiple versions of Samba. An attacker could exploit one of these vulnerabilities to take control of an affected system. CISA encourages users…
Scarica il riepilogo delle notizie pubblicate dallo CSIRT Italia dal 25 al 31 luglio 2022 Source link Author: csirt@alfacert.gov.it Article used for cyber security disclosure.
Original release date: July 29, 2022 CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise….