Vulnerabilities (Page 28)

Cyber Security Vulnerabilities | Infosec Vulnerabilities | Information Security Vulnerabilities | Bug bounty

Cybersecurity specialists report the detection of multiple vulnerabilities in CODESYS, a development environment for controller programming in accordance with the international industry standard IEC 61131-3. According to the report, successfulRead More →

Cybersecurity specialists reported the detection of at least five critical vulnerabilities in cURL, a software project consisting of a library and a file transfer-oriented shell. According to the report, successfulRead More →

Cybersecurity specialists reported the finding of multiple vulnerabilities in Oracle Database Server. According to the report, successful exploitation of these flaws would allow threat actors to bypass security measures inRead More →

Cybersecurity specialists reported the detection of multiple vulnerabilities in routers produced by tech firm Aruba Networks, whose exploitation would allow threat actors to deploy various malicious tasks, including remote codeRead More →

Microsoft security teams reported detection of a new vulnerability in the print queue that can be exploited by malicious hackers to elevate their privileges on the target system. This reportRead More →

Cybersecurity specialists reported the detection of at least 5 vulnerabilities in the DIR-3040 routers, developed by the technology firm D-Link. According to the report, successful exploitation of these flaws wouldRead More →

Cybersecurity specialists reported the finding of two critical vulnerabilities in PHP, a general-purpose programming language specially adapted for web development. According to the report, successful exploitation of these flaws wouldRead More →