2026年3月17日星期二

Microsoft Edge 遠端執行程式碼漏洞

Microsoft Edge 遠端執行程式碼漏洞

發佈日期: 2026年03月17日

風險: 極高度風險

類型: 用戶端 - 瀏覽器

於微軟 Edge 發現一個漏洞。遠端攻擊者可利用此漏洞,於目標系統觸發遠端執行任意程式碼、繞過保安限制及資料篡改。

 

注意:

CVE-2026-3909 正被廣泛利用。遠端攻擊者可利用此漏洞透過特製的 HTML 頁面執行越界記憶體存取。

 

因此,此漏洞的風險等級被評為極高度風險。


影響

  • 遠端執行程式碼
  • 繞過保安限制
  • 篡改

受影響之系統或技術

  • Microsoft Edge 146.0.3856.62 之前的版本

解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

安裝軟件供應商提供的修補程式:

  • 更新至 146.0.3856.62 或之後版本

漏洞識別碼


資料來源


相關連結

Microsoft Edge Remote Code Execution Vulnerability

Microsoft Edge Remote Code Execution Vulnerability

Release Date: 17 Mar 2026

RISK: Extremely High Risk

TYPE: Clients - Browsers

A vulnerability was identified in Microsoft Edge. A remote attacker could exploit this vulnerability to trigger remote code execution, security restriction bypass and data manipulation on the targeted system.

 

Note:

CVE-2026-3909 is being exploited in the wild. A remote attacker could use this flaw to perform out of bounds memory access via a crafted HTML page. 

 

Hence, the risk level is rated as Extremely High Risk.


Impact

  • Remote Code Execution
  • Security Restriction Bypass
  • Data Manipulation

System / Technologies affected

  • Microsoft Edge version prior to 146.0.3856.62

Solutions

Before installation of the software, please visit the software vendor web-site for more details.

Apply fixes issued by the vendor:

  • Update to version 146.0.3856.62 or later

Vulnerability Identifier


Source


Related Link

2026年3月16日星期一

Debian Linux 內核多個漏洞

Debian Linux 內核多個漏洞

發佈日期: 2026年03月16日

風險: 中度風險

類型: 操作系統 - LINUX

於 Debian Linux 內核發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升及洩露敏感資料。


Debian Linux Kernel Multiple Vulnerabilities

Debian Linux Kernel Multiple Vulnerabilities

Release Date: 16 Mar 2026

RISK: Medium Risk

TYPE: Operating Systems - Linux

Multiple vulnerabilities were identified in Debian Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege and sensitive information disclosure on the targeted system.


Microsoft 產品資料洩露漏洞

Microsoft 產品資料洩露漏洞

發佈日期: 2026年03月16日

風險: 中度風險

類型: 操作系統 - 應用程式平台

於Microsoft產品發現一個漏洞。遠端攻擊者可利用這個漏洞,於目標系統觸發洩露敏感資料及篡改。


影響

  • 資料洩露
  • 篡改

受影響之系統或技術

  • Microsoft Office:
    • Excel (iOS, Android)
    • Word (iOS, Android)
    • PowerPoint (iOS, Android)
    • Outlook (iOS, Android, Mac)
    • OneNote (iOS, Android)
    • Teams (iOS, Android)
    • Loop (iOS)
  • Microsoft 365 Apps:
    • Copilot (iOS, Android)
  • Microsoft Power BI:
    • Power BI (iOS, Android)
  • Microsoft Edge Browser:
    • Edge (iOS, Android)

解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

安裝軟件供應商提供的修補程式或緩解措施:


漏洞識別碼


資料來源


相關連結

Microsoft Products Information Disclosure Vulnerability

Microsoft Products Information Disclosure Vulnerability

Release Date: 16 Mar 2026

RISK: Medium Risk

TYPE: Operating Systems - Application Platforms

A vulnerability was identified in Microsoft products. A remote attacker could exploit this vulnerability to trigger sensitive information disclosure and data manipulation on the targeted system.


Impact

  • Information Disclosure
  • Data Manipulation

System / Technologies affected

  • Microsoft Office:
    • Excel (iOS, Android)
    • Word (iOS, Android)
    • PowerPoint (iOS, Android)
    • Outlook (iOS, Android, Mac)
    • OneNote (iOS, Android)
    • Teams (iOS, Android)
    • Loop (iOS)
  • Microsoft 365 Apps:
    • Copilot (iOS, Android)
  • Microsoft Power BI:
    • Power BI (iOS, Android)
  • Microsoft Edge Browser:
    • Edge (iOS, Android)

Solutions

Before installation of the software, please visit the software vendor web-site for more details.

Apply fixes or mitigations issued by the vendor:


Vulnerability Identifier


Source


Related Link

Microsoft Edge 多個漏洞

Microsoft Edge 多個漏洞

發佈日期: 2026年03月16日

風險: 極高度風險

類型: 用戶端 - 瀏覽器

於 Microsoft Edge 發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發遠端執行任意程式碼、阻斷服務狀況、繞過保安限制、仿冒及洩露敏感資料。

 

注意:

CVE-2026-3910 正被廣泛利用。遠端攻擊者可利用此漏洞透過特製的 HTML 頁面在沙箱內執行任意程式碼。

 

因此,此漏洞的風險等級被評為極高度風險。


影響

  • 遠端執行程式碼
  • 繞過保安限制
  • 仿冒
  • 阻斷服務
  • 資料洩露

受影響之系統或技術

  • Microsoft Edge 146.0.3856.59 之前的版本

解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

安裝軟件供應商提供的修補程式:

  • 更新至 146.0.3856.59 或之後版本

漏洞識別碼


資料來源


相關連結

Microsoft Edge Multiple Vulnerabilities

Microsoft Edge Multiple Vulnerabilities

Release Date: 16 Mar 2026

RISK: Extremely High Risk

TYPE: Clients - Browsers

Multiple vulnerabilities were identified in Microsoft Edge. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, denial of service condition, security restriction bypass, spoofing and sensitive information disclosure on the targeted system.

 

Note:

CVE-2026-3910 is being exploited in the wild. A remote attacker could use this flaw to execute arbitrary code inside a sandbox via a crafted HTML page. 

 

Hence, the risk level is rated as Extremely High Risk.


Impact

  • Remote Code Execution
  • Security Restriction Bypass
  • Spoofing
  • Denial of Service
  • Information Disclosure

System / Technologies affected

  • Microsoft Edge version prior to 146.0.3856.59

Solutions

Before installation of the software, please visit the software vendor web-site for more details.

Apply fixes issued by the vendor:

  • Update to version 146.0.3856.59 or later

Vulnerability Identifier


Source


Related Link

釣魚警報 - mickmick.net 呼籲公眾提防假冒水務署釣魚郵件騙取信用卡資料

網絡釣魚警告

現況及相關趨勢

近日有騙徒冒充水務署,以短訊或電郵方式向市民發送訛稱「用水帳戶資料更新提示」通知,並列出所謂 「欠款」,誘使收件人點擊連結進入釣魚網站,並要求輸入個人資料或信用卡資料以繳交費用。mickmick.net 近日亦接獲並處理多宗相關個案,翻查個案處理紀錄,假冒水務署的詐騙手法其實在兩年前已出現(相關保安警報),近日的個案反映此類以政府公共服務名義進行的釣魚攻擊近期又再度活躍起來。

 

相關釣魚訊息一般以「用水帳戶近期帳務資料已更新」、「建議您登入水務署服務平台查閱帳戶資料及帳單紀錄」等字眼作招徠,並附上文字超連結,連結至看似官方的釣魚網站,聲稱可直接前往登入「水務署服務平台」或「水務署官方網站」頁面查閱帳戶資料及帳單紀錄。一旦點擊相關連結會進入假冒水務署登入頁面的釣魚網站;釣魚網站會以真實機構標誌及版面設計混淆視聽,令用戶在不知情下輸入資料。市民應提高警覺,切勿因「暫停供水」等訊息而急於點擊及提交信用卡號碼等個人資料。

 

近期釣魚訊息常見特徵(示例):

  1. 以「用水帳戶資料更新提示」作為主旨,要求登入帳戶完成付款或提供資料。
  2. 附上簡短網址或文字超連結(例如「水務署服務平台」),將特定文字設為可點擊的連結,引導至釣魚網站。
  3. 假冒水務署登入及繳費頁面要求輸入電話號碼及信用卡資料等敏感資料。
  4. 釣魚網址刻意包含與「wsdbg」 、「wsdio」 、「wsdde」 、「wsdazx」等與水務署官方網址相關字眼或以相似拼寫混淆視聽。

 

假冒水務署的釣魚電郵及釣魚網站攻擊流程

  1. 騙徒先假冒水務署發送釣魚電郵或短訊,訛稱細額欠款來引誘受害人登入處理。

(上圖為分別兩封不同內容的釣魚電郵)

 

  1. 點擊釣魚連結後,假冒頁面無論在構圖及設計上都與官方網站非常相似。頁面更會裝模作樣,要求輸入電話號碼驗證身份,但測試顯示其實輸入任何號碼(如 123456)均可通過驗證。

 

  1. 其後,假頁面會提示有逾期的水費帳單。

 

  1. 點擊「繼續處理」後,受害人更能查看帳單詳情。

 

  1. 利用細額款項來減低受害人戒心,點擊「立即繳費」後,假頁面就會要求受害人輸入信用卡資料。

 

  1. 點擊提交後,假頁面會停留在假的載入畫面不停轉動,而另一邊廂,受害人的信用卡資料已被傳送至騙徒手上。

 

假冒旅遊熱點售票網站
除針對水務署外,騙徒亦假冒香港知名景點的官方售票網站,透過搜尋廣告、社交平台及即時通訊工具來散播聲稱有限時折扣或超低價的優惠,誘導市民購買門票並提交個人資料。


 
(上圖為假冒知名景點售票網站的釣魚網站)

mickmick.net 呼籲公眾提高警覺,切勿在可疑網站輸入任何資料或進行付款。如收到懷疑假冒水務署名義發出的短訊或電郵,切勿點擊連結或提供任何個人及付款資料;如需查閱賬單或繳費,應自行於瀏覽器輸入水務署官方網站或使用官方流動應用程式,並採取以下措施防範相關釣魚攻擊:

  • 避免點擊來歷不明的連結,尤其是涉及「限時折扣」、「欠款」、「停水」、「罰款」等催促字眼的訊息。
  • 應先核對網址,政府部門官方網站一般使用「.gov.hk」網域;如網址可疑,請停止操作並自行於瀏覽器輸入官方網站;而水務署官方網址為 www.wsd.gov.hk
  • 切勿在可疑網站輸入敏感資料,例如身份證號碼或信用卡資料等。
  • 如需付款或查閱賬單,應使用官方渠道,例如官方網站或官方流動應用程式,或向機構官方聯絡途徑核實。
  • 可利用「CyberDefender守網者」的「防騙視伏器」,通過檢查網址和IP地址等,來辨識詐騙及網絡陷阱。

如已輸入信用卡資料到釣魚網站:

  • 立即聯絡銀行或發卡機構凍結及更換信用卡,並更改相關帳戶密碼。
  • 監察交易紀錄,保留證據(截圖、電郵、交易紀錄、網址等)以便跟進。

Phishing Alert - mickmick.net Warns of Phishing Scams Impersonating Water Supplies Department via Fake Bills

Phishing Alert

Current Status and Related Trends

Recently, scammers have been impersonating the Water Supplies Department (WSD), sending SMS messages or emails to the public under the guise of a “Water account information update notice.” These messages list alleged “arrears” to lure recipients into clicking links to phishing websites, where they are prompted to enter personal details or credit card information to make payment. mickmick.net has received and handled multiple related cases in recent days. A review of case handling records shows that phishing impersonating the Water Supplies Department actually emerged as early as two years ago (see the relevant security alert). Recent cases indicate that this type of phishing attack conducted in the name of government public services has become active again lately. 

 

These phishing messages commonly use phrases such as “Your water account’s recent billing information has been updated” and “Please log into the WSD service platform to review your account details and billing records.” They include hyperlinked text that leads to phishing sites designed to look like official pages, claiming to take users directly to the “WSD Service Platform” or the “WSD official website” to review account and bill information. Once the link is clicked, users are taken to a fake WSD login page. The phishing site uses genuine-looking logos and layouts to deceive users into entering their information unknowingly. The public should remain vigilant and not be rushed into clicking links or submitting personal data, such as credit card numbers, by messages mentioning “water supply suspension.”


Common characteristics observed in recent phishing messages (examples): 

  1. Subject lines such as “Water Account Information Update Notice,” prompting users to log in to complete payment or provide information. 
  2. Use of shortened URLs or hyperlinked text (for example, “WSD Service Platform”), turning specific words into clickable links that lead to phishing websites. 
  3. Fake WSD login and payment pages that request sensitive data such as phone numbers and credit card details. 
  4. Phishing URLs deliberately containing terms related to the WSD official website or similar spellings to confuse users, such as “wsdbg/wsdio/wsdde/wsdazx.”

 

Attack Flow of the Phishing Emails and Websites Impersonating the Water Supplies Department

 

  1. Scammers first impersonate WSD to send phishing emails or SMS messages, falsely claiming small outstanding amounts to entice victims to log in and resolve them.   

(The images above showed two phishing emails with different contents.)

 

  1. After clicking the phishing link, the fake page closely mimics the official website in layout and design. It pretends to verify identity by asking for a phone number, but tests show that entering any number (e.g., 123456) will pass the verification.

 

  1. The fake page then indicates there is an overdue water bill.

 

  1. After clicking “Continue,” victims can even view detailed bill information.

 

  1. By presenting a small payment amount to lower the victim’s guard, the fake page prompts users to click “Pay Now,” after which it requests credit card details.

 

  1. After submission, the fake page remains on a perpetual loading screen, while the victim’s credit card information has already been transmitted to the scammers.

 

Fake tourist hotspot ticketing websites
In addition, scammers also impersonate the official ticketing websites of famous Hong Kong attractions, spreading claims of limited-time discounts or super low prices through search engine ads, social media platforms, and instant messaging tools to lure citizens into purchasing tickets and submitting their personal information. 
 


(The image above showed a fake ticketing site of a well-known attraction)

mickmick.net urges the public to remain vigilant and never enter any information or make payments on suspicious websites. If you receive suspicious SMS messages or emails purporting to be from WSD, do not click on any links and do not provide personal or payment information. If you need to check your bill or make a payment, enter the official website address directly in your browser or use the official mobile application. To guard against related phishing attacks, please take the following measures:

  • Avoid clicking links from unknown sources, especially messages that use urgent language such as “limited-time discount,” “arrears,” “water suspension,” or “fines.” 
  • Verify the website address first. Government departments’ official websites generally use the “.gov.hk” domain. If a URL appears suspicious, stop the operation and manually enter the official address in your browser. The official WSD website is www.wsd.gov.hk
  • Never enter sensitive information, such as identity card numbers or credit card details, on suspicious websites. 
  • For payments or bill enquiries, use official channels such as the official website or mobile application, or verify via the organisation’s official contact methods.
  • Use the free search engine “Scameter” of Cyberdefender.hk to identify fraud and network traps by checking website addresses and IP addresses.

 

If you have already entered your credit card details on a phishing website, you should:

  • Immediately contact your bank or card issuer to freeze and replace the card and change the passwords for any related accounts.
  • Monitor your transactions and retain evidence (e.g., screenshots, emails, transaction records, URLs) for follow-up.

2026年3月13日星期五

思科 IOS XR 多個漏洞

思科 IOS XR 多個漏洞

發佈日期: 2026年03月13日

風險: 中度風險

類型: 保安軟件及應用設備 - 保安軟件及應用設備

於思科 IOS XR 發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發阻斷服務狀況及遠端執行任意程式碼。


Cisco IOS XR Multiple Vulnerabilities

Cisco IOS XR Multiple Vulnerabilities

Release Date: 13 Mar 2026

RISK: Medium Risk

TYPE: Security software and application - Security Software & Appliance

Multiple vulnerabilities were identified in Cisco IOS XR. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition and remote code execution on the targeted system.


Erlang/OTP 多個漏洞

Erlang/OTP 多個漏洞

發佈日期: 2026年03月13日

風險: 中度風險

類型: 伺服器 - 網站伺服器

於 Erlang/OTP 發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發阻斷服務狀況及洩露敏感資料。


影響

  • 阻斷服務
  • 資料洩露

受影響之系統或技術

  • OTP-26.2.5.18 以前的版本

解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

安裝供應商提供的修補程式:

 

  • OTP-26.2.5.18

漏洞識別碼


資料來源


相關連結

Erlang/OTP Multiple Vulnerabilities

Erlang/OTP Multiple Vulnerabilities

Release Date: 13 Mar 2026

RISK: Medium Risk

TYPE: Servers - Web Servers

Multiple vulnerabilities were identified in Erlang/OTP.  A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition and sensitive information disclosure on the targeted system.


Impact

  • Denial of Service
  • Information Disclosure

System / Technologies affected

  • Versions prior to OTP-26.2.5.18

Solutions

Before installation of the software, please visit the vendor web-site for more details.

Apply fixes issued by the vendor:

 

  • OTP-26.2.5.18

Vulnerability Identifier


Source


Related Link

Google Chrome 多個漏洞

Google Chrome 多個漏洞

發佈日期: 2026年03月13日

風險: 高度風險

類型: 用戶端 - 瀏覽器

於 Google Chrome 發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發繞過保安限制及資料篡改。

 

注意:

CVE-2026-3909 正被廣泛利用。攻擊者可利用此漏洞觸發資料篡改。

 

CVE-2026-3910 正被廣泛利用。攻擊者可利用此漏洞觸發繞過保安限制。

 

因此,風險等級被評為高風險。

 

影響

  • 篡改
  • 繞過保安限制

受影響之系統或技術

  • Google Chrome 146.0.76380.115 (Android) 之前的版本
  • Google Chrome 146.0.7680.75 (Linux) 之前的版本
  • Google Chrome 146.0.7680.75/76 (Mac) 之前的版本
  • Google Chrome 146.0.7680.75/76 (Windows) 之前的版本

解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

安裝軟件供應商提供的修補程式:

  • 更新至 146.0.76380.115 (Android) 或之後版本
  • 更新至 146.0.7680.75 (Linux) 或之後版本
  • 更新至 146.0.7680.75/76 (Mac) 或之後版本
  • 更新至 146.0.7680.75/76 (Windows) 或之後版本

漏洞識別碼


資料來源


相關連結

Google Chrome Multiple Vulnerabilities

Google Chrome Multiple Vulnerabilities

Release Date: 13 Mar 2026

RISK: High Risk

TYPE: Clients - Browsers

Multiple vulnerabilities were identified in Google Chrome. A remote attacker could exploit some of these vulnerabilities to trigger security restriction bypass and data manipulation on the targeted system.

 

Note:

CVE-2026-3909 is being exploited in the wild. An attacker could use this flaw to trigger data manipulation. 

 

CVE-2026-3910 is being exploited in the wild. An attacker could use this flaw to trigger security restriction bypass. 

 

Hence, the risk level is rated as High Risk.


Impact

  • Data Manipulation
  • Security Restriction Bypass

System / Technologies affected

  • Google Chrome prior to 146.0.76380.115 (Android)
  • Google Chrome prior to 146.0.7680.75 (Linux)
  • Google Chrome prior to 146.0.7680.75/76 (Mac)
  • Google Chrome prior to 146.0.7680.75/76 (Windows)

Solutions

Before installation of the software, please visit the software vendor web-site for more details.

Apply fixes issued by the vendor:

  • Update to version 146.0.76380.115 (Android) or later
  • Update to version 146.0.7680.75 (Linux) or later
  • Update to version 146.0.7680.75/76 (Mac) or later
  • Update to version 146.0.7680.75/76 (Windows) or later

Vulnerability Identifier


Source


Related Link

GitLab 多個漏洞

GitLab 多個漏洞

發佈日期: 2026年03月13日

風險: 中度風險

類型: 伺服器 - 其他伺服器

於 GitLab 發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發阻斷服務狀況、跨網站指令碼、資料篡改、敏感資料洩露及繞過保安限制。


影響

  • 阻斷服務
  • 繞過保安限制
  • 跨網站指令碼
  • 篡改
  • 資料洩露

受影響之系統或技術

  • GitLab Community Edition (CE) 18.9.2, 18.8.6, 18.7.6 以前的版本
  • GitLab Enterprise Edition (EE) 18.9.2, 18.8.6, 18.7.6 以前的版本

解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

 

安裝供應商提供的修補程式:


漏洞識別碼


資料來源


相關連結

GitLab Multiple Vulnerabilities

GitLab Multiple Vulnerabilities

Release Date: 13 Mar 2026

RISK: Medium Risk

TYPE: Servers - Other Servers

Multiple vulnerabilities were identified in GitLab. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, cross-site scripting, data manipulation, information disclosure and security restriction bypass on the targeted system.


Impact

  • Denial of Service
  • Security Restriction Bypass
  • Cross-Site Scripting
  • Data Manipulation
  • Information Disclosure

System / Technologies affected

  • GitLab Community Edition (CE) versions prior to 18.9.2, 18.8.6, 18.7.6
  • GitLab Enterprise Edition (EE) versions prior to 18.9.2, 18.8.6, 18.7.6

Solutions

Before installation of the software, please visit the vendor web-site for more details.

 

Apply fixes issued by the vendor:


Vulnerability Identifier


Source


Related Link

2026年3月12日星期四

Fortinet 產品多個漏洞

Fortinet 產品多個漏洞

發佈日期: 2026年03月12日

風險: 中度風險

類型: 操作系統 - Network

於 Fortinet 產品發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發遠端執行任意程式碼、洩露敏感資料及繞過保安限制。


影響

  • 繞過保安限制
  • 資料洩露
  • 遠端執行程式碼

受影響之系統或技術

FortiAnalyzer

  • FortiAnalyzer 6.4 所有版本
  • FortiAnalyzer 7.0 所有版本
  • FortiAnalyzer 7.2 所有版本
  • FortiAnalyzer 7.4 所有版本
  • FortiAnalyzer 7.6.0 至 7.6.4

FortiAnalyzer Cloud

  • FortiAnalyzer Cloud 6.4 所有版本
  • FortiAnalyzer Cloud 7.0.1 至 7.0.14
  • FortiAnalyzer Cloud 7.2.1 至 7.2.10
  • FortiAnalyzer Cloud 7.4.1 至 7.4.7
  • FortiAnalyzer Cloud 7.6.2

FortiManager

  • FortiManager 6.4 所有版本
  • FortiManager 7.0 所有版本
  • FortiManager 7.2 所有版本
  • FortiManager 7.4 所有版本
  • FortiManager 7.6.0 至 7.6.4

FortiManager Cloud

  • FortiManager Cloud 6.4 所有版本
  • FortiManager Cloud 7.0.1 至 7.0.14
  • FortiManager Cloud 7.2.1 至 7.2.10
  • FortiManager Cloud 7.4.1 至 7.4.7
  • FortiManager Cloud 7.6.2 至 7.6.3

解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

 

安裝供應商提供的修補程式:


漏洞識別碼


資料來源


相關連結

Fortinet Products Multiple Vulnerabilities

Fortinet Products Multiple Vulnerabilities

Release Date: 12 Mar 2026

RISK: Medium Risk

TYPE: Operating Systems - Networks OS

Multiple vulnerabilities were identified in Fortinet Products. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, sensitive information disclosure and security restriction bypass on the targeted system.


Impact

  • Security Restriction Bypass
  • Information Disclosure
  • Remote Code Execution

System / Technologies affected

FortiAnalyzer

  • FortiAnalyzer 6.4 all versions
  • FortiAnalyzer 7.0 all versions
  • FortiAnalyzer 7.2 all versions
  • FortiAnalyzer 7.4 all versions
  • FortiAnalyzer 7.6.0 through 7.6.4

FortiAnalyzer Cloud

  • FortiAnalyzer Cloud 6.4 all versions
  • FortiAnalyzer Cloud 7.0.1 through 7.0.14
  • FortiAnalyzer Cloud 7.2.1 through 7.2.10
  • FortiAnalyzer Cloud 7.4.1 through 7.4.7
  • FortiAnalyzer Cloud 7.6.2

FortiManager

  • FortiManager 6.4 all versions
  • FortiManager 7.0 all versions
  • FortiManager 7.2 all versions
  • FortiManager 7.4 all versions
  • FortiManager 7.6.0 through 7.6.4

FortiManager Cloud

  • FortiManager Cloud 6.4 all versions
  • FortiManager Cloud 7.0.1 through 7.0.14
  • FortiManager Cloud 7.2.1 through 7.2.10
  • FortiManager Cloud 7.4.1 through 7.4.7
  • FortiManager Cloud 7.6.2 through 7.6.3

Solutions

Before installation of the software, please visit the vendor web-site for more details.

 

Apply fixes issued by the vendor:


Vulnerability Identifier


Source


Related Link

Mozilla Firefox 多個漏洞

Mozilla Firefox 多個漏洞

發佈日期: 2026年03月12日

風險: 中度風險

類型: 用戶端 - 瀏覽器

於 Mozilla Firefox 發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發繞過保安限制及遠端執行任意程式碼。

 

影響

  • 遠端執行程式碼
  • 繞過保安限制

受影響之系統或技術

以下版本之前的版本﹕

 

  • Firefox 148.0.2

解決方案

在安裝軟體之前,請先瀏覽供應商之官方網站,以獲得更多詳細資料。

更新至版本:

 

  • Firefox 148.0.2

漏洞識別碼


資料來源


相關連結

Microsoft Edge 遠端執行程式碼漏洞

Microsoft Edge 遠端執行程式碼漏洞 發佈日期: 2026年03月17日 風險: 極高度風險 類型: 用戶端 - 瀏覽器 於微軟 E...