Vulnerabilities (Page 30)

Cyber Security Vulnerabilities | Infosec Vulnerabilities | Information Security Vulnerabilities | Bug bounty

Schneider Electric security teams reported the discovery of a set of critical vulnerabilities in its PowerLogic EGX100 and PowerLogic EGX3000 communication solutions, which are part of the company’s family ofRead More →

Cybersecurity specialists report the discovery of a critical vulnerability in the P2P software development kit of ThroughTek, a company that has developed multiple devices such as IP cameras with P2PRead More →

Check Point cybersecurity specialists reported the discovery of four vulnerabilities in Microsoft Office that could be exploited for the creation of malicious documents in Word and Excel, which would facilitateRead More →

VMware security teams announced the remediation of a critical vulnerability in the vCenter Server platform whose exploitation would allow threat actors to take complete control of the affected system. TheRead More →