Skip to main content


SolarWinds has released a security update to address a high-severity, directory traversal vulnerability in Serv-U, a managed file transfer (MFT) platform.  An unauthorised attacker could exploit this vulnerability to access and read confidential files on a host device.

Veeam has reported that a proof-of concept exploit is now publicly available for the recently reported authentication bypass flaw (CVE-2024-29849).  This vulnerability could allow an attacker to remotely access a VBEM web interface.  It is recommend to upgrade to VBEM version or above. 

PHP versions installed on Microsoft Windows operating systems (OS) could be affected by a critical security vulnerability (CVE-2024-4577), which was discovered by the cybersecurity company, DevCore.  An attacker could exploit this vulnerability to execute arbitrary PHP code on vulnerable instances.  A proof of concept is now publicly available and there is evidence of this vulnerability being exploited in the wild.

PHP is a widely used open-source general-purpose scripting language that is especially suited for web development and can be embedded into HTML.

Microsoft has released its scheduled June 2024 security update that addresses 49 vulnerabilities. A critical remote code execution (RCE) vulnerability (CVE-2024-30080) has been identified in the Microsoft Message Queuing (MSMQ) service.  To exploit this vulnerability, an attacker would need to send a specially crafted malicious MSMQ packet to a MSMQ server. This could result in remote code execution on the server side.

JetBrains has released a critical security advisory addressing one critical vulnerability that could lead to the disclosure of access tokens to third-party sites. This insufficiently protected credential vulnerability (CVE-2024-37051) affects all IntelliJ-based integrated development environments (IDEs) as of version 2023.1 that have the JetBrains GitHub plugin enabled and in use.

JetBrains IntellJ is an open source software (OSS) platform for building IDEs and language-aware developer tools.

Fortinet has released security updates to address multiple stack-based buffer overflow vulnerabilities [CWE-121] in the command line interpreter of FortiOS.  These may allow an authenticated attacker to execute unauthorised code or commands using specially crafted command line arguments.

Recommended Action

Organisations are encouraged to review the appropriate security advisory pages and apply the updates:

SolarWinds – Security Advisory

Veeam  –  Veeam Support Knowledge Base


Microsoft ­Update Guide

JetBrains – JetBrains Blog

Fortinet –  Fortiguard Labs

If you have any concerns, or have been affected by a cyber-related issue, report it to us by submitting a Cyber Concerns Online Reporting Form.


  • Advisory
  • Vulnerability
  • Exploit
  • Patches and Updates