Common Vulnerability Scoring System (CVSS) (Page 5)

Microsoft announced the release of several security updates to address a severe vulnerability in the Azure Synapse and Azure Data Factory pipelines whose exploitation would allow threat actors to executeRead More →

Researchers from security firm Nozomi Networks detailed the finding of a critical vulnerability residing in uClibc, a standard C library used by large enterprises around the world. This library isRead More →

Cybersecurity specialists report the detection of a critical vulnerability in Nextcloud Server, part of the client-server programs developed by Nextcloud that allow the creation of file hosting services. According toRead More →

Cybersecurity specialists report the detection of a series of vulnerabilities in Elcomplus SmartPPT SCADA, an integrated voice and data dispatch software. According to the report, successful exploitation of the flawRead More →

A flaw has been reported in the Modbus preprocessor of the Snort detection engine whose exploitation could lead to severe hacking scenarios. Snort is a free network intrusion detection systemRead More →

After receiving a report from ESET researcher Martin Smolár, Lenovo security teams announced the correction of three severe vulnerabilities. Tracked as CVE-2021-3970, CVE-2021-3971, and CVE-2021-3972, the flaws could be exploitedRead More →

Information security specialists report the detection of a critical vulnerability in Composer, a package management system for programming in PHP that provides the standard formats necessary to handle PHP dependenciesRead More →

Citrix announced the release of security patches for multiple vulnerabilities present in some of its products, including a severe issue in SD-WAN. Tracked as CVE-2022-27505, this flaw was described asRead More →

After multiple rumors, researchers from security firm Trend Micro confirmed that the Spring4Shell vulnerability is being exploited by Mirai botnet hackers. As previously reported, CVE-2022-22965 and CVE-2022-22963 are critical vulnerabilitiesRead More →