Vulnerabilities (Page 25)

Cyber Security Vulnerabilities | Infosec Vulnerabilities | Information Security Vulnerabilities | Bug bounty

Cybersecurity specialists report the detection of 26 vulnerabilities in Adobe Acrobat and Adobe Reader, two popular software tools. According to the report, the successful exploitation of these flaws would allowRead More →

Cybersecurity specialists report the detection of a severe vulnerability in WooCommerce and Multi Currency, two popular WordPress plugins. According to the report, successful exploitation of the vulnerability would allow threatRead More →

Through a GitHub repository, cybersecurity specialist Nguyen The Duc published the proof-of-concept (PoC) exploit code to achieve a successful exploitation of the newly identified zero-day vulnerability in Ghostscript servers. AccordingRead More →

Cybersecurity specialists report the detection of 7 vulnerabilities in the Xiaomi MDZ-36-DB Bluetooth speakers. According to the report, the successful exploitation of these flaws would allow the deployment of multipleRead More →

Cisco security teams announced the correction of an authentication bypass vulnerability in Enterprise NFV Infrastructure Software (NFVIS). Tracked as CVE-2021-34746, this flaw resides in the TACACS+AAA system of the affectedRead More →

Cybersecurity specialists report the detection of a severe vulnerability in Linphone Session Initiation Protocol (SIP) that would allow threat actors to block an application remotely. SIP is a signaling protocolRead More →

Parallels Desktop developers announced the release of an alternative solution to mitigate the exploitation of a privilege escalation flaw in Parellels Desktop v16 and earlier software. The problem is thatRead More →

Security specialists report the detection of at least 40 security flaws in a popular encryption mechanism whose exploitation would have allowed threat actors to deploy Man-in-The-Middle (MiTM) attacks in orderRead More →