CIS Advisories

CIS Advisories

233 bookmarks
Custom sorting
A Vulnerability in SonicWall SonicOS management access and SSLVPN Could Allow for Unauthorized Access
A Vulnerability in SonicWall SonicOS management access and SSLVPN Could Allow for Unauthorized Access
A vulnerability has been discovered in SonicWall SonicOS Management Access and SSLVPN, which could allow for unauthorized resource access and in specific conditions, causing the firewall to crash. SonicOS is SonicWall’s operating system designed for their firewalls and other security devices. Successful exploitation of the most severe of these vulnerabilities could allow for unauthorized access on the system. Depending on the privileges associated with the system, an attacker could then; view, change, or delete data.
·cisecurity.org·
A Vulnerability in SonicWall SonicOS management access and SSLVPN Could Allow for Unauthorized Access
A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution
A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution
A Vulnerability has been discovered in Google Chrome which could allow for arbitrary code execution. Successful exploitation of the the vulnerability could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
·cisecurity.org·
A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution
Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution
Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Apple products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
·cisecurity.org·
Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution
Multiple Vulnerabilities in Microsoft SharePoint Server Could Allow for Remote Code Execution
Multiple Vulnerabilities in Microsoft SharePoint Server Could Allow for Remote Code Execution
Multiple Vulnerabilities have been discovered in Microsoft SharePoint Server, which could allow for remote code execution. Microsoft SharePoint Server is a web-based collaborative platform that integrates with Microsoft Office. Successful exploitation of these vulnerabilities allows for unauthenticated access to systems and enables malicious actors to fully access SharePoint content, including file systems and internal configurations, and execute code over the network
·cisecurity.org·
Multiple Vulnerabilities in Microsoft SharePoint Server Could Allow for Remote Code Execution
Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
·cisecurity.org·
Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution.  Adobe After Effects – Used for creating motion graphics, visual effects, and compositing in film, television, and online content.Adobe Substance 3D Viewer – A 3D visualization and editing tool for opening, adjusting, and rendering 3D models.Adobe Audition – Professional audio editing and mixing software for recording, restoring, and producing high-quality sound.Adobe InCopy – A writing and editing tool that integrates with Adobe InDesign for collaborative publishing workflows.Adobe InDesign – Used to design and publish brochures, digital magazines, eBooks, posters, and presentations.Adobe Connect – A web conferencing platform for hosting virtual meetings, webinars, and online training sessions.Adobe Dimension – A 3D design tool for creating photorealistic product mockups and brand visualizations.Adobe Substance 3D Stager – A 3D scene design and rendering tool for assembling and lighting photorealistic compositions.Adobe Illustrator – A vector graphics editor for creating logos, icons, illustrations, and typography.Adobe FrameMaker – A document processor for authoring and publishing large, structured technical documentation.Adobe Experience Manager (AEM) Forms – Enables creation and deployment of digital forms integrated with backend systems.Adobe Experience Manager (AEM) Screens – A digital signage solution for managing interactive experiences across physical displays.Adobe ColdFusion – A rapid web application development platform that supports integration with databases, APIs, and cloud services.  Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged-on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights
·cisecurity.org·
Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
Multiple Vulnerabilities in Microsoft SharePoint Server Could Allow for Remote Code Execution
Multiple Vulnerabilities in Microsoft SharePoint Server Could Allow for Remote Code Execution
Multiple Vulnerabilities have been discovered in Microsoft SharePoint Server, which could allow for remote code execution. Microsoft SharePoint Server is a web-based collaborative platform that integrates with Microsoft Office. Successful exploitation of these vulnerabilities allows for unauthenticated access to systems and enables malicious actors to fully access SharePoint content, including file systems and internal configurations, and execute code over the network
·cisecurity.org·
Multiple Vulnerabilities in Microsoft SharePoint Server Could Allow for Remote Code Execution
Multiple Vulnerabilities in Mozilla Thunderbird Could Allow for Arbitrary Code Execution
Multiple Vulnerabilities in Mozilla Thunderbird Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the most severe of which could allow for arbitrary code execution. Mozilla Thunderbird is an email client. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
·cisecurity.org·
Multiple Vulnerabilities in Mozilla Thunderbird Could Allow for Arbitrary Code Execution
Critical Patches Issued for Microsoft Products, July 8, 2025
Critical Patches Issued for Microsoft Products, July 8, 2025
Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
·cisecurity.org·
Critical Patches Issued for Microsoft Products, July 8, 2025
A Vulnerability in FortiWeb Could Allow for SQL Injection
A Vulnerability in FortiWeb Could Allow for SQL Injection
A vulnerability has been discovered FortiWeb, which could allow for SQL injection. FortiWeb is a web application firewall (WAF) developed by Fortinet. It's designed to protect web applications and APIs from a wide range of attacks, including those targeting known vulnerabilities and zero-day exploits. Successful exploitation of this vulnerability could allow for SQL injection attacks that could lead to arbitrary code execution in the context of the system.
·cisecurity.org·
A Vulnerability in FortiWeb Could Allow for SQL Injection
A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution
A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution
A Vulnerability has been discovered in Google Chrome which could allow for arbitrary code execution. Successful exploitation of the the vulnerability could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
·cisecurity.org·
A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution
Multiple Vulnerabilities in Citrix Products Could Allow For Disclosure Of Sensitive Data
Multiple Vulnerabilities in Citrix Products Could Allow For Disclosure Of Sensitive Data
Multiple vulnerabilities have been discovered in Citrix products, the most severe of which could allow disclosure of sensitive data. Citrix ADC performs application-specific traffic analysis to intelligently distribute, optimize, and secure Layer 4 - Layer 7 network traffic for web applications. Successful exploitation of the most severe of these vulnerabilities could allow for memory overread, leading to disclosure of potentially sensitive information such as authenticated session tokens. Depending on the sensitive information retrieved via this technique, the attacker may gain further access to the appliance or systems.
·cisecurity.org·
Multiple Vulnerabilities in Citrix Products Could Allow For Disclosure Of Sensitive Data
Multiple Vulnerabilities in Cisco ISE and ISE-PIC Could Allow for Remote Code Execution
Multiple Vulnerabilities in Cisco ISE and ISE-PIC Could Allow for Remote Code Execution
Multiple vulnerabilities have been discovered in Cisco ISE and ISE-PIC that could allow for remote code execution. Cisco Identity Services Engine (ISE) is a security policy management platform that provides secure access to network resources. Successful exploitation of these vulnerabilities could allow the attacker to obtain root privileges on an affected device.
·cisecurity.org·
Multiple Vulnerabilities in Cisco ISE and ISE-PIC Could Allow for Remote Code Execution
A Vulnerability in Grafana Could Allow for Arbitrary Code Execution
A Vulnerability in Grafana Could Allow for Arbitrary Code Execution
A vulnerability exists in Grafana which could result in arbitrary code execution. Grafana is an open-source platform used for visualizing and analyzing time series data. It allows users to connect to various data sources, query and transform data, and create interactive dashboards to monitor and explore metrics, logs, and traces. Successful exploitation could allow an attacker to run malicious plugins and take over user accounts without needing elevated privileges. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
·cisecurity.org·
A Vulnerability in Grafana Could Allow for Arbitrary Code Execution
Multiple Vulnerabilities in Mozilla Firefox Could Allow for Arbitrary Code Execution
Multiple Vulnerabilities in Mozilla Firefox Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Mozilla Firefox, the most severe of which could allow for arbitrary code execution. Mozilla Firefox is a web browser used to access the Internet. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
·cisecurity.org·
Multiple Vulnerabilities in Mozilla Firefox Could Allow for Arbitrary Code Execution
Critical Patches Issued for Microsoft Products, June 10, 2025
Critical Patches Issued for Microsoft Products, June 10, 2025
Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
·cisecurity.org·
Critical Patches Issued for Microsoft Products, June 10, 2025
Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution.  Adobe InCopy is a word processor within Adobe Creative Cloud that allows copywriters and editors to write, edit, and format text in InDesign documents, while designers work on the same file in InDesign simultaneously.Adobe Experience Manager (AEM) is a comprehensive content management system (CMS) and digital asset management (DAM) platform that helps businesses create, manage, and deliver digital experiences across multiple channels.Adobe Commerce is a comprehensive, enterprise-grade e-commerce platform, formerly known as Magento Commerce, that allows businesses to build, personalize, and manage online stores.Adobe InDesign is a professional-grade software used for desktop publishing and page layout design.Adobe Substance 3D Sampler is a 3D scanning and material creation software that transforms real-life pictures into photorealistic materials, 3D objects, and HDR environments.Adobe Acrobat Reader is a free software that serves as the industry standard for viewing, printing, and interacting with PDFs.Adobe Substance 3D Painter is a software application primarily used for texturing 3D models. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights
·cisecurity.org·
Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
Multiple Vulnerabilities in HPE StoreOnce Software Could Allow for Remote Code Execution
Multiple Vulnerabilities in HPE StoreOnce Software Could Allow for Remote Code Execution
Multiple Vulnerabilities have been discovered in HPE StoreOnce Software, which when chained together could allow for remote code execution, potentially leading to session hijacking and full system compromise. HPE StoreOnce is a data protection platform from Hewlett Packard Enterprise that uses deduplication to reduce backup storage requirements and improve backup and recovery speeds. Successful exploitation of these vulnerabilities could allow remote code execution, disclosure of information, server-side request forgery, authentication bypass, arbitrary file deletion, and directory traversal information disclosure.
·cisecurity.org·
Multiple Vulnerabilities in HPE StoreOnce Software Could Allow for Remote Code Execution
Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser used to access the internet. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged-on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
·cisecurity.org·
Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution
A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution
A vulnerability has been discovered in Google Chrome which could allow for arbitrary code execution. Successful exploitation of this vulnerability could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
·cisecurity.org·
A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution
Multiple Vulnerabilities in Ivanti Endpoint Manager Mobile Could Allow for Remote Code Execution
Multiple Vulnerabilities in Ivanti Endpoint Manager Mobile Could Allow for Remote Code Execution
Multiple vulnerabilities have been discovered in Ivanti Endpoint Manager Mobile, the most severe of which could allow for remote code execution. Ivanti Endpoint Manager Mobile (EPMM) is a unified endpoint management solution that enables organizations to securely manage and monitor mobile devices, applications, and content across multiple platforms from a centralized interface. Successful exploitation of the most severe of these vulnerabilities could allow for remote code execution in the context of the system. Depending on the privileges associated with the system, an attacker could then install programs; view, change, or delete data.
·cisecurity.org·
Multiple Vulnerabilities in Ivanti Endpoint Manager Mobile Could Allow for Remote Code Execution
Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution. Adobe produces software that is used for creating and publishing a wide variety of content including graphics, photography, illustration, animation, multimedia, motion pictures and print. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
·cisecurity.org·
Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
Critical Patches Issued for Microsoft Products, May 13, 2025
Critical Patches Issued for Microsoft Products, May 13, 2025
Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
·cisecurity.org·
Critical Patches Issued for Microsoft Products, May 13, 2025
Multiple Vulnerabilities in Fortinet Products Could Allow for Arbitrary Code Execution
Multiple Vulnerabilities in Fortinet Products Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Fortinet Products, the most severe of which could allow for arbitrary code execution. The products affected by vulnerabilities in this round of monthly Fortinet patches is: FortiADC is an application delivery controller (ADC) from Fortinet that enhances application availability, performance, and security. It offers features like load balancing, SSL/TLS offloading, web application firewalls (WAF), and global server load balancing (GSLB).FortiAnalyzer is a log management, analytics, and reporting platform that provides organizations with a single console to manage, automate, orchestrate, and respond, enabling simplified security operations, proactive identification and remediation of risks, and complete visibility of the entire attack landscape.FortiClient Endpoint Management Server (EMS) is a centralized platform for managing and deploying FortiClient software on endpoints, providing visibility, policy enforcement, and compliance management for organizations using FortiClient for endpoint security. FortiCamera is a suite of smart, network-based video surveillance solutions offered by Fortinet.FortiManager is a comprehensive network management solution designed to streamline the administration, configuration, and monitoring of Fortinet devices across complex network environments.FortiOS is the Fortinet’s proprietary Operation System which is utilized across multiple product lines.FortiNDR is Fortinet’s network detection and response (NDR) solution which uses file-based analytics & AI to detect suspicious network activity.FortiProxy is a secure web proxy solution that enhances network security by filtering web traffic and providing advanced threat protection.FortiSIEM is a is a highly scalable multi-tenant Security Information and Event Management (SIEM) solution that provides real-time infrastructure and user awareness for accurate threat detection, analysis and reporting.FortiSwitch Manager enables network administrators to cut through the complexities of non-FortiGate-managed FortiSwitch deployments.FortiVoice is a robust communication solution that integrates voice, conferencing, and messaging services to enhance business collaboration and productivity.FortiWeb is a web application firewall (WAF) that protects web applications and APIs from attacks that target known and unknown exploits and helps maintain compliance with regulations. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged-on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
·cisecurity.org·
Multiple Vulnerabilities in Fortinet Products Could Allow for Arbitrary Code Execution
Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution
Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution
Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for remote code execution with no additional execution privileges needed. Android is an operating system developed by Google for mobile devices, such as smartphones, tablets, and watches. Successful exploitation of the most severe of these vulnerabilities could allow for remote code execution within the context of the affected service account. Depending on the privileges associated with the service account, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Service accounts that are configured to have fewer user rights on the system could be less impacted than those that operate with administrative user rights.
·cisecurity.org·
Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution
Multiple Vulnerabilities in SonicWall Secure Mobile Access (SMA) 100 Series Management Interface Could Allow for Remote Code Execution
Multiple Vulnerabilities in SonicWall Secure Mobile Access (SMA) 100 Series Management Interface Could Allow for Remote Code Execution
Multiple vulnerabilities have been discovered in SonicWall Secure Mobile Access (SMA) 100 Management Interface, which could allow for remote code execution. SonicWall Secure Mobile Access (SMA) is a unified secure access gateway used by organizations to provide employees access to applications from anywhere. Successful exploitation of these vulnerabilities when chained together could allow for remote code execution, potentially leading to session hijacking and full system compromise.
·cisecurity.org·
Multiple Vulnerabilities in SonicWall Secure Mobile Access (SMA) 100 Series Management Interface Could Allow for Remote Code Execution
Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution
Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Mozilla products, the most severe of which could allow for arbitrary code execution.Mozilla Firefox is a web browser used to access the Internet.Mozilla Firefox ESR is a version of the web browser intended to be deployed in large organizations.Mozilla Thunderbird is an email client.Mozilla Thunderbird ESR is a version of the email client intended to be deployed in large organizations.Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
·cisecurity.org·
Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution
A Vulnerability in SAP NetWeaver Visual Composer Could Allow for Remote Code Execution
A Vulnerability in SAP NetWeaver Visual Composer Could Allow for Remote Code Execution
A vulnerability has been discovered in SAP NetWeaver Visual Composer, which could allow for remote code execution. SAP NetWeaver Visual Composer is SAP’s web-based software modelling tool. It enables business process specialists and developers to create business application components, without coding. Successful exploitation of this vulnerability could allow for remote code execution in the context of the system.
·cisecurity.org·
A Vulnerability in SAP NetWeaver Visual Composer Could Allow for Remote Code Execution
A Vulnerability in SonicWall Secure Mobile Access (SMA) 100 Series Management Interface Could Allow for Remote Code Execution
A Vulnerability in SonicWall Secure Mobile Access (SMA) 100 Series Management Interface Could Allow for Remote Code Execution
A vulnerability has been discovered in SonicWall Secure Mobile Access (SMA) 100 Management Interface, which could allow for remote code execution. SonicWall Secure Mobile Access (SMA) is a unified secure access gateway used by organizations to provide employees access to applications from anywhere. Successful exploitation of this vulnerability could allow for remote code execution.
·cisecurity.org·
A Vulnerability in SonicWall Secure Mobile Access (SMA) 100 Series Management Interface Could Allow for Remote Code Execution
Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution
Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Apple products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
·cisecurity.org·
Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution