![2024-073: Apache HTTP Server Critical Vulnerabilities](https://www.cyex.hu/assets/images/cert.jpg)
Advisories
![2024-073: Apache HTTP Server Critical Vulnerabilities](https://www.cyex.hu/assets/images/cert.jpg)
![2024-072: Vulnerabilities in Ivanti EPMM](https://www.cyex.hu/assets/images/cert.jpg)
![2024-070: Critical Vulnerabilities in Cisco Products](https://www.cyex.hu/assets/images/cert.jpg)
![2024-069: Vulnerabilities in Citrix Netscaler](https://www.cyex.hu/assets/images/cert.jpg)
![2024-068: Critical Vulnerabilities in GeoServer and GeoTools](https://www.cyex.hu/assets/images/cert.jpg)
![2024-067: Multiple Vulnerabilities in Microsoft Products](https://www.cyex.hu/assets/images/cert.jpg)
![2024-066: Critical Vulnerability in OpenSSH](https://www.cyex.hu/assets/images/cert.jpg)
2024-066: Critical Vulnerability in OpenSSH
On July 1, 2024, a new OpenSSH unauthenticated remote code execution (RCE) vulnerability dubbed regreSSHion was reported, affecting glibc-based Linux systems. This vulnerability, identified as CVE-2024-6387, allows remote attackers to execute arbitrary code as root due to a signal handler race condition in sshd. OpenSSH regreSSHion Vulnerability OpenSSH regreSSHion Vulnerability
![2024-065: Critical Vulnerability in Juniper Networks Products](https://www.cyex.hu/assets/images/cert.jpg)
![2024-064: Vulnerabilities in GitLab](https://www.cyex.hu/assets/images/cert.jpg)
![2024-063: Critical Vulnerability in MOVEit Transfer](https://www.cyex.hu/assets/images/cert.jpg)
![2024-062: Vulnerabilities in Chrome and Chromium based Browsers](https://www.cyex.hu/assets/images/cert.jpg)
![2024-060: Vulnerabilities in VMware Products](https://www.cyex.hu/assets/images/cert.jpg)
![2024-061: Vulnerabilities in Nextcloud Products](https://www.cyex.hu/assets/images/cert.jpg)
![2024-059: Vulnerability in FortiOS](https://www.cyex.hu/assets/images/cert.jpg)
![2024-058: Vulnerabilities in PHP](https://www.cyex.hu/assets/images/cert.jpg)
![2024-057: Vulnerabilities in JetBrains Products](https://www.cyex.hu/assets/images/cert.jpg)