Vulnerabilities (Page 20)

Cyber Security Vulnerabilities | Infosec Vulnerabilities | Information Security Vulnerabilities | Bug bounty

At the beginning of 2021, Microsoft issued security updates for almost 100 vulnerabilities, among which 9 bugs considered critical stand out. System updates will fix all errors currently identified inRead More →

Cybersecurity specialists reported the finding of three vulnerabilities in Django, a free and open source content management system (CMS) platform for publishing content on the Internet. According to the report,Read More →

Trevor Spiniolas is a renowned mobile security researcher who has reported various issues and bugs affecting multiple commonly used technological devices. In his latest report, the expert details the findingRead More →

HCL Digital Experience (DX), a platform for creating and managing web platforms, is affected by multiple vulnerabilities that could lead to remote code execution (RCE) scenarios, the researchers claim. AlthoughRead More →

Cybersecurity specialists report the detection of at least six high-risk vulnerabilities and no known updates in the latest firmware version for Netgear Nighthawk R6700v3 routers. These devices are widely usedRead More →

This week, the Apache Software Foundation issued a new set of patches to address remote code execution (RCE) flaws in Log4j, which could be exploited by threat actors to compromiseRead More →

A cybersecurity specialist reports the detection of a dozen vulnerabilities in myPRO, a product developed by industrial automation firm mySCADA. Among the reported flaws, the expert highlighted an error consideredRead More →

Cybersecurity specialists report the detection of a flaw that would allow threat actors to abuse a set of load optimization features in Google Chrome to evade the Site Isolation feature.Read More →

The cybersecurity unit of the Federal Bureau of Investigation (FBI) has launched an alert to notify organizations using ManageEngine Desktop Central, developed by Zoho, that a hacking group is exploitingRead More →