2026年3月6日星期五

Google Chrome 多個漏洞

Google Chrome 多個漏洞

發佈日期: 2026年03月06日

風險: 中度風險

類型: 用戶端 - 瀏覽器

於 Google Chrome 發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發遠端執行任意程式碼、阻斷服務狀況、繞過保安限制、資料篡改及洩露敏感資料。

 

影響

  • 資料洩露
  • 篡改
  • 繞過保安限制
  • 阻斷服務
  • 遠端執行程式碼

受影響之系統或技術

  • Google Chrome 145.0.7632.159 (Linux) 之前的版本
  • Google Chrome 145.0.7632.159/160 (Mac) 之前的版本
  • Google Chrome 145.0.7632.159/160 (Windows) 之前的版本

解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

安裝軟件供應商提供的修補程式:

  • 更新至 145.0.7632.159 (Linux) 或之後版本
  • 更新至 145.0.7632.159/160 (Mac) 或之後版本
  • 更新至 145.0.7632.159/160 (Windows) 或之後版本

漏洞識別碼


資料來源


相關連結

Google Chrome Multiple Vulnerabilities

Google Chrome Multiple Vulnerabilities

Release Date: 6 Mar 2026

RISK: Medium Risk

TYPE: Clients - Browsers

Multiple vulnerabilities were identified in Google Chrome. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, denial of service condition, security restriction bypass, data manipulation and sensitive information disclosure on the targeted system.


Impact

  • Information Disclosure
  • Data Manipulation
  • Security Restriction Bypass
  • Denial of Service
  • Remote Code Execution

System / Technologies affected

  • Google Chrome prior to 145.0.7632.159 (Linux)
  • Google Chrome prior to 145.0.7632.159/160 (Mac)
  • Google Chrome prior to 145.0.7632.159/160 (Windows)

Solutions

Before installation of the software, please visit the software vendor web-site for more details.

Apply fixes issued by the vendor:

  • Update to version 145.0.7632.159 (Linux) or later
  • Update to version 145.0.7632.159/160 (Mac) or later
  • Update to version 145.0.7632.159/160 (Windows) or later

Vulnerability Identifier


Source


Related Link

2026年3月5日星期四

Aruba Products Multiple Vulnerabilities

Aruba Products Multiple Vulnerabilities

Release Date: 5 Mar 2026

RISK: Medium Risk

TYPE: Security software and application - Security Software & Appliance

Multiple vulnerabilities were identified in Aruba Products. A remote attacker could exploit these vulnerabilities to trigger denial of service condition, security restriction bypass, sensitive information disclosure and spoofing on the targeted system.


Impact

  • Spoofing
  • Information Disclosure
  • Security Restriction Bypass
  • Denial of Service

System / Technologies affected

  • AOS-8.10.x.x: 8.10.0.21 and below
  • AOS-8.12.x.x: 8.12.0.6 and below
  • AOS-8.13.x.x: 8.13.1.1 and below
  • AOS-10.4.x.x: 10.4.1.10 and below
  • AOS-10.7.x.x: 10.7.2.2 and below
  • AOS-10.8.x.x: 10.8.0.0 and below

 

HPE Aruba Networking End of Maintenance (EoM) Software Version(s):

 

  • AOS-10.6.x.x: all
  • AOS-10.5.x.x: all
  • AOS-10.3.x.x: all
  • AOS-8.12.x.x: all
  • AOS-8.11.x.x: all
  • AOS-8.9.x.x: all
  • AOS-8.8.x.x: all
  • AOS-8.7.x.x: all
  • AOS-8.6.x.x: all
  • AOS-6.5.4.x: all
  • SD-WAN 8.7.0.0-2.3.0.x: all
  • SD-WAN 8.6.0.4-2.2.x.x: all

Solutions

Before installation of the software, please visit the vendor web-site for more details.

 

Apply fixes issued by the vendor:

Note: End of Maintenance (EoM) versions are not addressed by the provided solution.


Vulnerability Identifier


Source


Related Link

思科產品多個漏洞

思科產品多個漏洞

發佈日期: 2026年03月05日

風險: 中度風險

類型: 保安軟件及應用設備 - 保安軟件及應用設備

於思科產品發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、彷冒、遠端執行任意程式碼、洩露敏感資料、跨網站指令碼、資料篡改及繞過保安限制。


影響

  • 阻斷服務
  • 繞過保安限制
  • 遠端執行程式碼
  • 跨網站指令碼
  • 資料洩露
  • 仿冒
  • 篡改
  • 權限提升

受影響之系統或技術

  • Cisco Secure Firewall Adaptive Security Appliance (ASA)
  • Cisco Secure Firewall Management Center (FMC)
  • Cisco Secure Firewall Threat Defense (FTD)
  • ClamAV

請參考供應商發佈的連結以了解受影響的版本:


解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

 

安裝供應商提供的修補程式:


漏洞識別碼


資料來源


相關連結

Cisco Products Multiple Vulnerabilities

Cisco Products Multiple Vulnerabilities

Release Date: 5 Mar 2026

RISK: Medium Risk

TYPE: Security software and application - Security Software & Appliance

Multiple vulnerabilities were identified in Cisco products. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege, spoofing, remote code execution, sensitive information disclosure, cross-site scripting, data manipulation and security restriction bypass on the targeted system.


Impact

  • Denial of Service
  • Security Restriction Bypass
  • Remote Code Execution
  • Cross-Site Scripting
  • Information Disclosure
  • Spoofing
  • Data Manipulation
  • Elevation of Privilege

System / Technologies affected

  • Cisco Secure Firewall Adaptive Security Appliance (ASA)
  • Cisco Secure Firewall Management Center (FMC)
  • Cisco Secure Firewall Threat Defense (FTD)
  • ClamAV

For affected versions, please refer to the link issued by the vendor:


Solutions

Before installation of the software, please visit the vendor web-site for more details.

 

Apply fixes issued by the vendor:


Vulnerability Identifier


Source


Related Link

2026年3月3日星期二

Android 多個漏洞

Android 多個漏洞

發佈日期: 2026年03月03日

風險: 中度風險

類型: 操作系統 - 流動裝置及操作系統

於 Android 發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發執行任意程式碼、洩露敏感資料、阻斷服務狀況及權限提升。


Android Multiple Vulnerabilities

Android Multiple Vulnerabilities

Release Date: 3 Mar 2026

RISK: Medium Risk

TYPE: Operating Systems - Mobile & Apps

Multiple vulnerabilities were identified in Android. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, sensitive information disclosure, denial of service condition and elevation of privilege on the targeted system.


三星產品多個漏洞

三星產品多個漏洞

發佈日期: 2026年03月03日

風險: 中度風險

類型: 操作系統 - 流動裝置及操作系統

於三星產品發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發敏感資料洩露、繞過保安限制、阻斷服務狀況、權限提升及遠端執行程式碼。

 

 


影響

  • 阻斷服務
  • 權限提升
  • 遠端執行程式碼
  • 繞過保安限制
  • 資料洩露

受影響之系統或技術

  • 運行 Android 13, 14, 15, 16 的三星產品
  • Exynos 1280, 1380, 1480, 1580, 2200, 2400, 2500

有關受影響產品,請參閱以下連結:

https://security.samsungmobile.com/securityUpdate.smsb

https://semiconductor.samsung.com/support/quality-support/product-security-updates/


解決方案

在安裝軟件之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

 

安裝軟件供應商提供的修補程式:


漏洞識別碼


資料來源


相關連結

Google Chrome 多個漏洞

Google Chrome 多個漏洞 發佈日期: 2026年03月06日 風險: 中度風險 類型: 用戶端 - 瀏覽器 於 Google Chr...