vulnerability (Page 20)

Information security specialists reported the finding of multiple vulnerabilities in Apache Traffic Server. According to the report, successful exploitation of these flaws would allow compromising the affected systems. Below areRead More →

Cybersecurity specialists report the detection of at least 28 vulnerabilities in Qualcomm chipsets. According to the report, the successful exploitation of the flaws would allow the deployment of severe attackRead More →

Cybersecurity specialists report that, for some years now, a hacker has been running malicious servers throughout the Tor network in what appears to be an attempt to deanonymize users ofRead More →

Pip-audit is a tool developed in collaboration with Google for scanning Python environments and detecting possible known security flaws. According to cybersecurity experts, Pip-audit uses the PyPi JSON API forRead More →

After a thorough analysis, a group of researchers found more than 200 vulnerabilities in nine of the most popular WiFi routers, which reside even on devices running their latest firmwareRead More →

Cybersecurity specialists report the detection of two critical vulnerabilities in Cisco Security Manager, which allows system administrators to apply the best security policies, in addition to facilitating the resolution ofRead More →

In a security report, VMware notified its customers of the fix of some server-side request forgery (SSRF) and arbitrary file reading vulnerabilities in vCenter Server. According to the report, theRead More →

Specialists from the security firm Claroty reported the detection of multiple code execution vulnerabilities in various virtual private network (VPN) products dependent on OpenVPN. In total, 4 flaws were detectedRead More →

Cybersecurity specialists report the detection of a critical vulnerability affecting QNAP QTS and QNAP QuTS hero, two versions of the operating system for network attached storage (NAS) equipment developed byRead More →