
News




2024-066: Critical Vulnerability in OpenSSH
On July 1, 2024, a new OpenSSH unauthenticated remote code execution (RCE) vulnerability dubbed regreSSHion was reported, affecting glibc-based Linux systems. This vulnerability, identified as CVE-2024-6387, allows remote attackers to execute arbitrary code as root due to a signal handler race condition in sshd. OpenSSH regreSSHion Vulnerability OpenSSH regreSSHion Vulnerability










2024-056: Multiple Vulnerabilities in Microsoft Products
On June 11, 2024, Microsoft addressed 58 vulnerabilities in its June 2024 Patch Tuesday update, including one zero-day vulnerability. This Patch Tuesday also fixes one critical vulnerability, a Microsoft Message Queuing (MSMQ) Remote Code Execution vulnerability. Microsoft Patch Tuesday - June 2024 Microsoft Patch Tuesday - June 2024 Summary On

