Common Vulnerability Scoring System (CVSS) (Page 6)

Developers addressed a command injection vulnerability in asciidoctor-include-ext, a popular Ruby library that allows users to parse and convert AsciiDoc files. According to the report, this vulnerability allows remote codeRead More →

VMware released a critical security alert to address various vulnerabilities found in Workspace ONE Access, VMware Identity Manager (vIDM), vRealize Lifecycle Manager, vRealize Automation, and VMware Cloud Foundation products. AccordingRead More →

Cybersecurity specialists report the detection of multiple vulnerabilities in various products developed by Autodesk. According to the report, successful exploitation of these flaws would allow threat actors to deploy multipleRead More →

Cybersecurity specialists report the detection of a critical vulnerability in Vim, the improved version of the Vi text editor, present in all UNIX systems and developed by Bram Moolenaar inRead More →

Cybersecurity specialists report the detection of two critical vulnerabilities in Western Digital My Cloud OS 5, a solution for creating backups and managing large volumes of content from multiple computersRead More →

Cybersecurity specialists report the detection of a critical vulnerability in SonicOS, the operating system executed in the physical and virtual firewalls developed by the technology firm SonicWall. According to theRead More →

Cybersecurity specialists report the detection of some critical vulnerabilities in NumPy, a library for the Python programming language with support for creating vectors and multidimensional arrays, along with a largeRead More →

Sophos security teams announced the fix of a critical vulnerability in authentication software running on Universal Threat Manager (UTM) devices. The vulnerability was described as a SQL injection bug inRead More →

Cybersecurity specialists recommend users of Parse Server, a popular API server module for Node/Express, immediately apply a fix for a newly detected remote code execution (RCE) vulnerability. Identified by securityRead More →