Vulnerabilities (Page 18)

Cyber Security Vulnerabilities | Infosec Vulnerabilities | Information Security Vulnerabilities | Bug bounty

In its latest security alert, Cisco recommended that users of Firepower firewall devices apply available updates to physical and virtual deployments to enable support for the new SSL Certificate AuthorityRead More →

Cybersecurity specialists developed a code for the exploitation of CVE-2022-24086, a dangerous vulnerability in AdobeCommerce and Magento Open Source. Adobe security teams reported that some isolated cases of exploitation ofRead More →

Information security specialists report the detection of multiple vulnerabilities in TIBCO BusinessConnect Container Edition. According to the report, the successful exploitation of these vulnerabilities would allow the deployment of multipleRead More →

Specialists from an Austrian university developed a formal security framework to analyze the security of web browsers. Dubbed as WebSpec, this project has already proved useful for the identification ofRead More →

An information security report points to the detection of two critical vulnerabilities in One Speaker, a popular smart speaker manufactured by technology firm Sonos. According to the report, the successfulRead More →

In its latest security update, Apple included fixes for a zero-day vulnerability that would have allowed threat actors to hack iPhone, iPad and Mac devices. The flaw was tracked asRead More →

Three critical remote code execution (RCE) vulnerabilities in the PHP Everywhere plugin could put more than 30,000 WordPress websites worldwide at risk. This plugin allows website administrators to insert PHPRead More →

Cybersecurity specialists report the detection of a critical zero-day vulnerability in Argo Continuous Deployment (Argo CD), a widely used Kubernetes tool for automation of the deployment of desired application statesRead More →

Cybersecurity specialists report that a Chinese hacking group is exploiting a critical zero-day vulnerability in Zimbra in order to access exposed email inboxes and obtain information related to European governmentsRead More →