Vulnerabilities (Page 28)

Cyber Security Vulnerabilities | Infosec Vulnerabilities | Information Security Vulnerabilities | Bug bounty

Cybersecurity specialists reported the detection of at least five critical vulnerabilities in cURL, a software project consisting of a library and a file transfer-oriented shell. According to the report, successfulRead More →

Cybersecurity specialists reported the finding of multiple vulnerabilities in Oracle Database Server. According to the report, successful exploitation of these flaws would allow threat actors to bypass security measures inRead More →

Cybersecurity specialists reported the detection of multiple vulnerabilities in routers produced by tech firm Aruba Networks, whose exploitation would allow threat actors to deploy various malicious tasks, including remote codeRead More →

Microsoft security teams reported detection of a new vulnerability in the print queue that can be exploited by malicious hackers to elevate their privileges on the target system. This reportRead More →

Cybersecurity specialists reported the detection of at least 5 vulnerabilities in the DIR-3040 routers, developed by the technology firm D-Link. According to the report, successful exploitation of these flaws wouldRead More →

Cybersecurity specialists reported the finding of two critical vulnerabilities in PHP, a general-purpose programming language specially adapted for web development. According to the report, successful exploitation of these flaws wouldRead More →

Just a couple of weeks after a hacking group forced the deletion of files on My Book Live network storage (NAS) devices, a security report revealed some details about aRead More →

Cybersecurity specialists report the detection of a critical vulnerability in OWASP ModSecurity Core Rule Set (CRS), whose exploitation would allow threat actors to bypass security mechanisms in affected deployments, includingRead More →