Multiple Vulnerabilities in Progress Telerik Report Server Could Allow for Remote Code Execution

Multiple vulnerabilities have been discovered in Progress Telerik Report Server, which could allow for remote code execution. Telerik Report Server provides centralized management for Progress’ business intelligence reporting suite through a web applic...

Continue ReadingMultiple Vulnerabilities in Progress Telerik Report Server Could Allow for Remote Code Execution

A Vulnerability in Check Point Security Gateways Could Allow for Credential Access

A vulnerability has been discovered in Check Point Security Gateway Products that could allow for credential access. A Check Point Security Gateway sits between an organization’s environment and the Internet to enforce policy and block threats and malw...

Continue ReadingA Vulnerability in Check Point Security Gateways Could Allow for Credential Access

Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution

Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the conte...

Continue ReadingMultiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution