----------------------------------------------------------------------------------
@MSGID: 2:467/888.188 661feeb9
ivanti has released security updates to address a critical flaw impacting
its Endpoint Manager (EPM) solution that, if successfully exploited,
could result in remote code execution (RCE) on susceptible servers.
Tracked as CVE-2023-39336, the vulnerability has been rated 9.6 out of
10 on the CVSS scoring system. The shortcoming impacts EPM 2021 and
EPM 2022 prior to SU5. ?if exploited,
https://thehackernews.com/2024/01/alert-ivanti-releases-patch-for.html
2024-01-05 13:12:00+05:30
________________________________
--- UA.HACKER - твiй помiчник у сферi кiбербезпеки | читай ще +SECURITY +UA.IT
* Origin: Читай нас за допомогою
http://winpoint.org (2:467/888.188)
SEEN-BY: 463/68 877 1331 467/4 888 5001/100
5005/49 5015/255 5019/40 5020/848
SEEN-BY: 5020/1042 4441 12000 5030/49 1081 5058/104
5060/900 5061/133
SEEN-BY: 5075/128
@PATH: 467/888 5020/1042 4441