Security News > 2015 > December > Critical RCE bug in FireEye's security appliances exploitable via email (Help Net Security)

2015-12-16 09:00
Last week, FireEye has silently pushed out a patch for an extremely easy-to-exploit remote code execution bug affecting its NX, EX, FX and AX Series security appliances in their default configuration.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/3B57KhLnkyQ/secworld.php
Related news
- Gladinet’s Triofox and CentreStack Under Active Exploitation via Critical RCE Vulnerability (source)
- Critical Erlang/OTP SSH pre-auth RCE is 'Surprisingly Easy' to exploit, patch now (source)
- Critical Erlang/OTP SSH RCE bug now has public exploits, patch now (source)
- Critical Commvault RCE vulnerability fixed, PoC available (CVE-2025-34028) (source)
- Critical Langflow RCE flaw exploited to hack AI app servers (source)
- SysAid Patches 4 Critical Flaws Enabling Pre-Auth RCE in On-Premise Version (source)
- Majority of Browser Extensions Pose Critical Security Risk, A New Report Reveals (source)
- Unpatched critical bugs in Versa Concerto lead to auth bypass, RCE (source)