Vulnerabilities

Cyber Security Vulnerabilities | Infosec Vulnerabilities | Information Security Vulnerabilities | Bug bounty

Information security specialists report the detection of a severe vulnerability in the TP-Link TL-WR840N EU routers. According to the report, successful exploitation of this flaw would allow threat actors toRead More →

Maintainers of Argo CD, the continuous delivery (CD) tool for Kubernetes, announced the fix of a vulnerability that would have allowed threat actors to spoof JSON Web Tokens (JWTs) andRead More →

Cisco announced the fixing of a zero-day vulnerability in the software of its XR IOS routers whose exploitation would have allowed unauthenticated threat actors to remotely access Redis instances runningRead More →

In a recent alert, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) recommends VMware users update or even delete their deployments due to the detection of critical vulnerabilities, exploited justRead More →

Rapid7 cybersecurity specialists report that thousands of Zyxel firewalls could be exposed to remote attacks due to a recently detected vulnerability. While the company has already released the corresponding patches,Read More →

An Intel security report points to the detection of various memory errors in the firmware of microprocessors used in hundreds of its products. According to the company’s report, these areRead More →

Microsoft announced the release of several security updates to address a severe vulnerability in the Azure Synapse and Azure Data Factory pipelines whose exploitation would allow threat actors to executeRead More →

Researchers from security firm Nozomi Networks detailed the finding of a critical vulnerability residing in uClibc, a standard C library used by large enterprises around the world. This library isRead More →