Vulnerabilities (Page 20)

Cyber Security Vulnerabilities | Infosec Vulnerabilities | Information Security Vulnerabilities | Bug bounty

Cybersecurity specialists reported the finding of three vulnerabilities in Django, a free and open source content management system (CMS) platform for publishing content on the Internet. According to the report,Read More →

Trevor Spiniolas is a renowned mobile security researcher who has reported various issues and bugs affecting multiple commonly used technological devices. In his latest report, the expert details the findingRead More →

HCL Digital Experience (DX), a platform for creating and managing web platforms, is affected by multiple vulnerabilities that could lead to remote code execution (RCE) scenarios, the researchers claim. AlthoughRead More →

Cybersecurity specialists report the detection of at least six high-risk vulnerabilities and no known updates in the latest firmware version for Netgear Nighthawk R6700v3 routers. These devices are widely usedRead More →

This week, the Apache Software Foundation issued a new set of patches to address remote code execution (RCE) flaws in Log4j, which could be exploited by threat actors to compromiseRead More →

A cybersecurity specialist reports the detection of a dozen vulnerabilities in myPRO, a product developed by industrial automation firm mySCADA. Among the reported flaws, the expert highlighted an error consideredRead More →

Cybersecurity specialists report the detection of a flaw that would allow threat actors to abuse a set of load optimization features in Google Chrome to evade the Site Isolation feature.Read More →

The cybersecurity unit of the Federal Bureau of Investigation (FBI) has launched an alert to notify organizations using ManageEngine Desktop Central, developed by Zoho, that a hacking group is exploitingRead More →

Exploiting vulnerabilities detected in previous versions of Log4j remains a severe issue, so the cybersecurity community is still looking for the best ways to prevent a cyberattack. However, some usersRead More →