Vulnerabilities (Page 16)

Cyber Security Vulnerabilities | Infosec Vulnerabilities | Information Security Vulnerabilities | Bug bounty

A severe vulnerability in a PHP function would allow threat actors to evade security measures implemented for the protection of web applications. The affected feature is filter_var(), which allows developersRead More →

Cybersecurity specialists report the detection of a critical vulnerability in Vim, the improved version of the Vi text editor, present in all UNIX systems and developed by Bram Moolenaar inRead More →

Cybersecurity specialists report the detection of two critical vulnerabilities in Western Digital My Cloud OS 5, a solution for creating backups and managing large volumes of content from multiple computersRead More →

Open source interactive HTTPS proxy service Mitmproxy announced the fix of a dangerous vulnerability that would have allowed threat actors to deploy HTTP request smuggling attacks against backend servers. TheseRead More →

Cybersecurity specialists report the detection of a critical vulnerability in SonicOS, the operating system executed in the physical and virtual firewalls developed by the technology firm SonicWall. According to theRead More →

Cybersecurity specialists report the detection of some critical vulnerabilities in NumPy, a library for the Python programming language with support for creating vectors and multidimensional arrays, along with a largeRead More →

Sophos security teams announced the fix of a critical vulnerability in authentication software running on Universal Threat Manager (UTM) devices. The vulnerability was described as a SQL injection bug inRead More →

Hacking groups keep playing a key role in the conflict between Ukraine and Russia almost a month after the start of the military invasion ordered by the government of VladimirRead More →

Cybersecurity specialists recommend users of Parse Server, a popular API server module for Node/Express, immediately apply a fix for a newly detected remote code execution (RCE) vulnerability. Identified by securityRead More →