July 9, 2019
June 18, 2019
May 14, 2019
*** Vulnerable RDP servers should be patched IMMEDIATELY even where there is a potential business impact (unscheduled maintenance). Notify email@example.com if you anticipate any delays in patching. ***
A zero-day elevation of privilege vulnerability exists in the way Microsoft Windows Error Reporting (WER) handles files. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.
While details about the use of the exploit are not available, it has reportedly been used in limited attacks against specific targets. Successful exploitation has been observed in the wild. 
March 14, 2019
February 21, 2019
A highly critical bug has been discovered in Drupal that can be used for remote code execution . Drupal is a Content Management System (CMS) commonly used to host websites. In the past this sort of exploit has been used to deliver remote access tools, ransomware, and cryptominers to web servers . Based on similar exploits against various CMS software in the past, we can expect that attackers will begin exploiting this software quickly.
February 12, 2019
Open Containers runc is prone to a local command-execution vulnerability. Runc is a command line utility designed to spawn container systems. It is the container runtime that underpins many open source container management systems including Docker, Kubernetes, containerd, Podman, and CRI-O.  
December 20, 2018
Microsoft just published an out-of-band patch for Internet Explorer. It fixes a memory corruption vulnerability in the scripting engine. This vulnerability is identified as CVE-2018-8653.
When successfully exploited, Internet Explorer could execute arbitrary code in the context of the current user. To exploit the vulnerability, the victim must just visit a malicious web page delivered through a phishing email or social engineering. 
August 23, 2018
A critical remote code execution vulnerability has been discovered in Apache Struts, a popular open source framework for developing web applications in the Java programming language.  In the past, Apache Struts RCE vulnerabilities have been weaponized in less than 24 hours -- one of which resulted in the Equifax breach that totaled over $600 million in cost. 
August 17, 2018
A vulnerability has been discovered in Oracle Database that could allow for complete compromise of the database, as well as shell access to the underlying server.  . The vulnerability resides in the Java Virtual Machine component of the Oracle Database Server and does not require user interaction. The vulnerability allows low-privileged attackers that have Create Session privilege with network access via Oracle Net to compromise the Java VM component.
April 26, 2018
March 28, 2018
NOTE: Drupal core developers have stated that exploits for this vulnerability will likely be developed within days. Drupal site owners must take action immediately or risk complete compromise of their sites.
A remote code execution vulnerability exists within multiple subsystems of Drupal 7.x and 8.x. 
This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being completely compromised. 
March 2, 2018
Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow an attacker to execute arbitrary code. PHP is a programming language originally designed for use in web-based applications with HTML content. PHP supports a wide variety of platforms and is used by numerous web-based software applications. 
February 22, 2018
January 5, 2018
A team of security researchers disclosed several software analysis methods that, when used for malicious purposes, have the potential to improperly gather sensitive data from many types of computing devices with many different vendors’ processors and operating systems.
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. 
November 29, 2017
October 18, 2017
October 17, 2017
Researchers have discovered serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks. This includes everything from computers, tablets, phones, home wireless routers and any device that supports WPA2 over Wi-Fi.
While details are still emerging, not all vendors have released patches as of yet. So, in some cases, there will be little users can do until patches are released. An attacker needs to be in range of an access-point to leverage this attack.
September 6, 2017
A critical vulnerability has been discovered in the Apache Struts web application framework for Java web applications. A remote code execution attack is possible when using the Apache Struts REST plugin with XStream handler to deserialise XML requests. 
Attackers can execute arbitrary code remotely by exploiting this vulnerability.
June 14, 2017
A remote code execution vulnerability exists when Windows Search handles objects in memory. This can be exploited by an attacker sending a specially crafted SMB message to the Windows Search service. 
Due to recent nation-state activity and the elevated risk of potential cyber attacks, Microsoft has released security updates for older unsupported versions of Windows for this issue as well as other high-severity fixes in the June patch release.