Vulnerabilities (Page 16)

Cyber Security Vulnerabilities | Infosec Vulnerabilities | Information Security Vulnerabilities | Bug bounty

Developers addressed a command injection vulnerability in asciidoctor-include-ext, a popular Ruby library that allows users to parse and convert AsciiDoc files. According to the report, this vulnerability allows remote codeRead More →

VMware released a critical security alert to address various vulnerabilities found in Workspace ONE Access, VMware Identity Manager (vIDM), vRealize Lifecycle Manager, vRealize Automation, and VMware Cloud Foundation products. AccordingRead More →

A severe vulnerability in a PHP function would allow threat actors to evade security measures implemented for the protection of web applications. The affected feature is filter_var(), which allows developersRead More →

Cybersecurity specialists report the detection of a critical vulnerability in Vim, the improved version of the Vi text editor, present in all UNIX systems and developed by Bram Moolenaar inRead More →

Cybersecurity specialists report the detection of two critical vulnerabilities in Western Digital My Cloud OS 5, a solution for creating backups and managing large volumes of content from multiple computersRead More →

Open source interactive HTTPS proxy service Mitmproxy announced the fix of a dangerous vulnerability that would have allowed threat actors to deploy HTTP request smuggling attacks against backend servers. TheseRead More →

Cybersecurity specialists report the detection of a critical vulnerability in SonicOS, the operating system executed in the physical and virtual firewalls developed by the technology firm SonicWall. According to theRead More →

Cybersecurity specialists report the detection of some critical vulnerabilities in NumPy, a library for the Python programming language with support for creating vectors and multidimensional arrays, along with a largeRead More →

Sophos security teams announced the fix of a critical vulnerability in authentication software running on Universal Threat Manager (UTM) devices. The vulnerability was described as a SQL injection bug inRead More →