Apple iOS, iPadOS, and macOS contain an out-of-bounds write vulnerability in the Image I/O framework.
🚨 Exploited
Source: CISA
#CVE #Security #HighPriority #Exploited
Apple iOS, iPadOS, and macOS contain an out-of-bounds write vulnerability in the Image I/O framework.
🚨 Exploited
Source: CISA
#CVE #Security #HighPriority #Exploited
Trend Micro Apex One Management Console (on-premise) contains an OS command injection vulnerability that could allow a pre-authenticated remote attacker to upload malicious code and execute commands on...
🚨 Exploited
Source: CISA
#CVE #Security #HighPriority #Exploited
Trend Micro Apex One Management Console (on-premise) contains an OS command injection vulnerability that could allow a pre-authenticated remote attacker to upload malicious code and execute commands on...
🚨 Exploited
Source: CISA
#CVE #Security #HighPriority #Exploited
RARLAB WinRAR contains a path traversal vulnerability affecting the Windows version of WinRAR. This vulnerability could allow an attacker to execute arbitrary code by crafting malicious archive files.
🚨 Exploited
Source: CISA
#CVE #Security #HighPriority #Exploited
RARLAB WinRAR contains a path traversal vulnerability affecting the Windows version of WinRAR. This vulnerability could allow an attacker to execute arbitrary code by crafting malicious archive files.
🚨 Exploited
Source: CISA
#CVE #Security #HighPriority #Exploited