Vulnerabilities (Page 14)

Cyber Security Vulnerabilities | Infosec Vulnerabilities | Information Security Vulnerabilities | Bug bounty

An Intel security report points to the detection of various memory errors in the firmware of microprocessors used in hundreds of its products. According to the company’s report, these areRead More →

Microsoft announced the release of several security updates to address a severe vulnerability in the Azure Synapse and Azure Data Factory pipelines whose exploitation would allow threat actors to executeRead More →

Researchers from security firm Nozomi Networks detailed the finding of a critical vulnerability residing in uClibc, a standard C library used by large enterprises around the world. This library isRead More →

Anti-Malware Security and Brute-Force Firewall, a popular security plugin for WordPress websites, is affected by a reflected cross-site scripting vulnerability whose exploitation would allow threat actors to compromise users withRead More →

In a joint statement, the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI) and the cybersecurity agencies of Canada, the United Kingdom, New Zealand and AustraliaRead More →

Cybersecurity specialists report the detection of a critical vulnerability in Nextcloud Server, part of the client-server programs developed by Nextcloud that allow the creation of file hosting services. According toRead More →

At least one sophisticated hacking group has been exploiting a critical remote code execution (RCE) vulnerability in VMware Workspace ONE Access. Tracked as CVE-2022-22954, the flaw was addressed in aRead More →

A recent report by the U.S. Department of Homeland Security (DHS) notes that, over the past year, the “Hack the DHS” vulnerability bounty program involved more than 450 cybersecurity professionals,Read More →

Cybersecurity specialists report the detection of a series of vulnerabilities in Elcomplus SmartPPT SCADA, an integrated voice and data dispatch software. According to the report, successful exploitation of the flawRead More →