Vulnerability Summary for the Week of March 28, 2022

Original release date: April 4, 2022  High Vulnerabilities Primary Vendor -- Product Description Published CVSS Score Source & Patch Info genians -- genian_nac An remote code execution vulnerability due to…

Comments Off on Vulnerability Summary for the Week of March 28, 2022

CISA Releases Security Advisories for Rockwell Automation Products

Original release date: March 31, 2022CISA has released two Industrial Controls Systems Advisories (ICSAs) detailing vulnerabilities in Rockwell Automation products. An attacker could exploit these vulnerabilities to inject code on…

Comments Off on CISA Releases Security Advisories for Rockwell Automation Products

CISA Adds Seven Known Exploited Vulnerabilities to Catalog

Original release date: March 31, 2022CISA has added seven new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent…

Comments Off on CISA Adds Seven Known Exploited Vulnerabilities to Catalog

CISA Adds 32 Known Exploited Vulnerabilities to Catalog

Original release date: March 28, 2022CISA has added 32 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent…

Comments Off on CISA Adds 32 Known Exploited Vulnerabilities to Catalog

Vulnerability Summary for the Week of March 21, 2022

Original release date: March 28, 2022  High Vulnerabilities Primary Vendor -- Product Description Published CVSS Score Source & Patch Info adobe -- acrobat_dc Acrobat Reader DC version 21.007.20099 (and earlier),…

Comments Off on Vulnerability Summary for the Week of March 21, 2022

CISA Adds 66 Known Exploited Vulnerabilities to Catalog

Original release date: March 25, 2022CISA has added 66 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent…

Comments Off on CISA Adds 66 Known Exploited Vulnerabilities to Catalog