Multiple Vulnerabilities in Palo Alto PAN-OS Could Allow for Authentication Bypass

Multiple vulnerabilities have been discovered in Palo Alto PAN-OS, the most severe of which could allow for authentication bypass. PAN-OS is the software that runs all Palo Alto Networks next-generation firewalls. Successful exploitation could allow fo...

Continue ReadingMultiple Vulnerabilities in Palo Alto PAN-OS Could Allow for Authentication Bypass

Multiple Vulnerabilities in Ivanti Endpoint Manager Could Allow for Remote Code Execution

Multiple vulnerabilities have been discovered in Ivanti Endpoint Manager, the most severe of which could allow for remote code execution. Ivanti Endpoint Manager is a client-based unified endpoint management software. Successful exploitation could allo...

Continue ReadingMultiple Vulnerabilities in Ivanti Endpoint Manager Could Allow for Remote Code Execution

Multiple Vulnerabilities in Citrix Products Could Allow for Remote Code Execution

Multiple vulnerabilities have been discovered in Citrix products, the most severe of which could allow for remote code execution. Citrix ADC performs application-specific traffic analysis to intelligently distribute, optimize, and secure Layer 4 - Laye...

Continue ReadingMultiple Vulnerabilities in Citrix Products Could Allow for Remote Code Execution