Vulnerabilities (Page 25)

Cyber Security Vulnerabilities | Infosec Vulnerabilities | Information Security Vulnerabilities | Bug bounty

Cybersecurity specialists report the detection of four vulnerabilities in Apache HTTP server, the open source server for UNIX, Microsoft Windows and other systems. According to the report, the successful exploitationRead More →

Multiple investigative agencies issued a joint security alert to warn Zoho users about a hacking group that has been exploiting a critical vulnerability in its single sign on and passwordRead More →

Cybersecurity specialists report the detection of 26 vulnerabilities in Adobe Acrobat and Adobe Reader, two popular software tools. According to the report, the successful exploitation of these flaws would allowRead More →

Cybersecurity specialists report the detection of a severe vulnerability in WooCommerce and Multi Currency, two popular WordPress plugins. According to the report, successful exploitation of the vulnerability would allow threatRead More →

Through a GitHub repository, cybersecurity specialist Nguyen The Duc published the proof-of-concept (PoC) exploit code to achieve a successful exploitation of the newly identified zero-day vulnerability in Ghostscript servers. AccordingRead More →

Cybersecurity specialists report the detection of 7 vulnerabilities in the Xiaomi MDZ-36-DB Bluetooth speakers. According to the report, the successful exploitation of these flaws would allow the deployment of multipleRead More →

Cisco security teams announced the correction of an authentication bypass vulnerability in Enterprise NFV Infrastructure Software (NFVIS). Tracked as CVE-2021-34746, this flaw resides in the TACACS+AAA system of the affectedRead More →

Cybersecurity specialists report the detection of a severe vulnerability in Linphone Session Initiation Protocol (SIP) that would allow threat actors to block an application remotely. SIP is a signaling protocolRead More →

Parallels Desktop developers announced the release of an alternative solution to mitigate the exploitation of a privilege escalation flaw in Parellels Desktop v16 and earlier software. The problem is thatRead More →