Vulnerabilities (Page 19)

Cyber Security Vulnerabilities | Infosec Vulnerabilities | Information Security Vulnerabilities | Bug bounty

Three critical remote code execution (RCE) vulnerabilities in the PHP Everywhere plugin could put more than 30,000 WordPress websites worldwide at risk. This plugin allows website administrators to insert PHPRead More →

Cybersecurity specialists report the detection of a critical zero-day vulnerability in Argo Continuous Deployment (Argo CD), a widely used Kubernetes tool for automation of the deployment of desired application statesRead More →

Cybersecurity specialists report that a Chinese hacking group is exploiting a critical zero-day vulnerability in Zimbra in order to access exposed email inboxes and obtain information related to European governmentsRead More →

Cybersecurity specialists report the detection of a set of critical vulnerabilities in the UEFI firmware of InsydeH20, used by technology companies such as Acer, AMD, ASUS, Dell, HP, Intel, LenovoRead More →

On Monday, the Cybersecurity and Infrastructure Security Agency (CISA) published a report detailing the detection of eight new security flaws in its Known Exploited Vulnerabilities Catalog, some of which couldRead More →

Cybersecurity specialists reported the detection of three vulnerabilities in PrinterLogic whose exploitation would allow threat actors to trace a remote code execution path on any connected endpoint. As you mayRead More →

Cybersecurity specialists report the finding of CVE-2022-0185, a severe vulnerability in the Linux kernel that can be exploited to evade containers in Kubernetes, allowing threat actors to access resources onRead More →

McAfee security teams announced the correction of a critical vulnerability in McAfee Agent for Windows software that would allow threat actors to perform privilege escalation and remote code execution (RCE)Read More →

Cloud infrastructure management firm Box confirmed that its security teams are addressing a flaw in its SMS-based two-factor authentication (2FA) system after a report detailing a hacking technique that wouldRead More →