Security News > 2015 > December > Critical RCE bug in FireEye's security appliances exploitable via email (Help Net Security)
2015-12-16 09:00
Last week, FireEye has silently pushed out a patch for an extremely easy-to-exploit remote code execution bug affecting its NX, EX, FX and AX Series security appliances in their default configuration.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/3B57KhLnkyQ/secworld.php
Related news
- Phishers send corrupted documents to bypass email security (source)
- Veeam warns of critical RCE bug in Service Provider Console (source)
- Exploit released for critical WhatsUp Gold RCE flaw, patch now (source)
- Veeam Issues Patch for Critical RCE Vulnerability in Service Provider Console (source)
- PoC exploit for critical WhatsUp Gold RCE vulnerability released (CVE-2024-8785) (source)
- Ivanti Issues Critical Security Updates for CSA and Connect Secure Vulnerabilities (source)
- Apache issues patches for critical Struts 2 RCE bug (source)
- Critical security hole in Apache Struts under exploit (source)
- The ongoing evolution of the CIS Critical Security Controls (source)
- Critical RCE Flaw in GFI KerioControl Allows Remote Code Execution via CRLF Injection (source)