Vulnerabilities (Page 22)

Cyber Security Vulnerabilities | Infosec Vulnerabilities | Information Security Vulnerabilities | Bug bounty

Information security specialists reported the finding of multiple vulnerabilities in Apache Traffic Server. According to the report, successful exploitation of these flaws would allow compromising the affected systems. Below areRead More →

Cybersecurity specialists report the detection of at least 28 vulnerabilities in Qualcomm chipsets. According to the report, the successful exploitation of the flaws would allow the deployment of severe attackRead More →

After a thorough analysis, a group of researchers found more than 200 vulnerabilities in nine of the most popular WiFi routers, which reside even on devices running their latest firmwareRead More →

Cybersecurity specialists report the detection of two vulnerabilities in Hide My WP, a popular security plugin for WordPress websites. According to the report, successful exploitation of these flaws would allowRead More →

Cybersecurity specialists report the detection of two critical vulnerabilities in Cisco Security Manager, which allows system administrators to apply the best security policies, in addition to facilitating the resolution ofRead More →

In a security report, VMware notified its customers of the fix of some server-side request forgery (SSRF) and arbitrary file reading vulnerabilities in vCenter Server. According to the report, theRead More →

Specialists from the security firm Claroty reported the detection of multiple code execution vulnerabilities in various virtual private network (VPN) products dependent on OpenVPN. In total, 4 flaws were detectedRead More →

Cybersecurity specialists report the detection of a critical vulnerability affecting QNAP QTS and QNAP QuTS hero, two versions of the operating system for network attached storage (NAS) equipment developed byRead More →

Cybersecurity specialists report the detection of a severe vulnerability in Netgear devices for home and small business use that could be exploited in order to execute remote code with rootRead More →