Tag: incidents
Critical command injection vulnerability affects nearly 100 Hikvision CCTV products. Update immediately if you use any of these solutions
A critical vulnerability has been reported in multiple products from Hikvision, a Chinese state-controlled manufacturer and supplier of civilian and…
Important privilege escalation vulnerability in TP-Link TL-WA850RE routers
Cybersecurity specialists report the detection of a severe vulnerability in the line of TL-WA850RE V6 routers, developed by the technology…
3 important vulnerabilities in SAP 3D Visual Enterprise Viewer
Cybersecurity specialists reported the finding of three vulnerabilities affecting SAP 3D Visual Enterprise Viewer, a desktop application used to manage…
2 critical code injection vulnerabilities in IBM Common Licensing
Cybersecurity specialists report the detection of two vulnerabilities in IBM Common Licensing, a popular license manager for monitoring activities such…
Two severe vulnerabilities in IBM Cloud Application Business Insights: Patch ASAP
Cybersecurity specialists report the detection of two severe vulnerabilities in IBM Cloud Application Business Insights, a popular enterprise computing solution….
Log4j critical vulnerability also affects Siemens SCADA systems
A cybersecurity report notes that Siemens SPPA-T3000 implementations are vulnerable to remote code execution (RCE) attacks due to the presence…
XSS and improper access control vulnerabilities in Apache JSPWiki. Patch immediately
Cybersecurity specialists report the detection of two critical vulnerabilities in Apache JSPWiki, a wiki software built around Java JEE components,…
Critical remote code execution, security restrictions bypass and information disclosure vulnerabilities in SAP ABAP
Information security specialists report the detection of three severe vulnerabilities in various products of the technological firm SAP. According to…
Researcher publishes exploit code for BrakTooth, 16 Bluetooth vulnerabilities impacting 1,400 chipsets used in billions of devices
Cybersecurity specialists announced the release of a proof of concept (PoC) exploit to test the security of multiple Bluetooth enabled…
Critical cross-site request forgery vulnerability in Cisco Webex
Cybersecurity specialists report the detection of a severe vulnerability in Webex, the videoconferencing platform developed by Cisco. According to the…