Vulnerabilities

A Vulnerability is a state in a computing system (or set of systems) which either (a) allows an attacker to execute commands as another user, (b) allows an attacker to access data that is contrary to the specified access restrictions for that data, (c) allows an attacker to pose as another entity, or (d) allows an attacker to conduct a denial of service.

Advisories relating to Symantec products may be viewed here.

  1. Type: Vulnerability. ISC Kea is prone to a remote denial-of-service vulnerability; fixes are available.
  2. Type: Vulnerability. Palo Alto Networks GlobalProtect Agent is prone to a local privilege-escalation vulnerability; fixes are available.
  3. Type: Vulnerability. ISC Kea is prone to a remote denial-of-service vulnerability; fixes are available.
  4. Type: Vulnerability. ISC Kea is prone to a remote denial-of-service vulnerability; fixes are available.
  5. Type: Vulnerability. Cisco Aironet Access Points is prone to an unauthorized access vulnerability; fixes are available.
  6. Type: Vulnerability. Jenkins is prone to multiple security vulnerabilities; fixes are available.
  7. Type: Vulnerability. Pulse Connect Secure and Policy Secure are prone to an access-bypass vulnerability; fixes are available.
  8. Type: Vulnerability. Pulse Connect Secure and Pulse Policy Secure are prone to multiple security vulnerabilities; fixes are available.
  9. Type: Vulnerability. Cisco SPA100 Series Analog Telephone Adapter is prone to multiple arbitrary code-execution vulnerabilities; fixes are available.
  10. Type: Vulnerability. Multiple Cisco Products are prone to a cross-site request-forgery vulnerability; fixes are available.