Subscribe to Updates
Get the latest creative news from FooBar about art, design and business.
Browsing: Alerts
HomeDescriptionStack-based buffer overflow vulnerability in Softing Industrial Automation GmbH gateways allows overflow buffers. This issue affects pnGate: through 1.30 epGate:…
MS-ISAC ADVISORY NUMBER:2025-113DATE(S) ISSUED:12/09/2025OVERVIEW:Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote…
Australian Ransomware Attack, 12 December 2024: Medusa claims 852.4GB of data stolen from Ainsworth Game Technology. Include, confidential business information,…
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Canon imageCLASS MF654Cdw printers. Authentication is not…
MS-ISAC ADVISORY NUMBER:2025-114DATE(S) ISSUED:12/09/2025OVERVIEW:Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary…
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2026-33634…
MS-ISAC ADVISORY NUMBER:2025-115DATE(S) ISSUED:12/11/2025OVERVIEW:Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary…
CVSSv3 Score: 5.6 An Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) vulnerability [CWE-89] in FortiAnalyzer…
MS-ISAC ADVISORY NUMBER:2025-116DATE(S) ISSUED:12/15/2025OVERVIEW:Multiple vulnerabilities have been discovered in Apple products, the most severe of which could allow for arbitrary…
An unauthenticated remote attacker can exploit a hidden function in the CLI prompt to escape the restricted interface, leading to…