Tag: vulnerability
4 critical vulnerabilities in Moxa VPort 06EC-2V Series and VPort 461A Series IP cameras
Cybersecurity specialists report the detection of 4 critical vulnerabilities in Moxa VPort video servers. According to the report, the successful…
3 important vulnerabilities in SAP 3D Visual Enterprise Viewer
Cybersecurity specialists reported the finding of three vulnerabilities affecting SAP 3D Visual Enterprise Viewer, a desktop application used to manage…
2 critical code injection vulnerabilities in IBM Common Licensing
Cybersecurity specialists report the detection of two vulnerabilities in IBM Common Licensing, a popular license manager for monitoring activities such…
Critical vulnerabilities in Apache HTTP Server
Cybersecurity specialists report the detection of multiple vulnerabilities in Apache HTTP Server. According to the report, successful exploitation of these…
Log4j critical vulnerability also affects Siemens SCADA systems
A cybersecurity report notes that Siemens SPPA-T3000 implementations are vulnerable to remote code execution (RCE) attacks due to the presence…
4 major security flaws in Microsoft SharePoint Server have been patched. Update immediately
Cybersecurity specialists report the detection of multiple vulnerabilities in Microsoft SharePoint Server, an enterprise collaboration platform. According to the report,…
8 severe security flaws in SonicWall SECURE MOBILE ACCESS (SMA) 100 SERIES
Cybersecurity specialists report the detection of 8 vulnerabilities in SonicWall Secure Mobile Access (SMA) 100. According to the report, the…
Critical vulnerability in Zoho ManageEngine Desktop Central, tool for installing software patches
In a cybersecurity alert, Zoho asked its customers to update their Desktop Central and Desktop Central MSP deployments to the…
Critical remote code execution, security restrictions bypass and information disclosure vulnerabilities in SAP ABAP
Information security specialists report the detection of three severe vulnerabilities in various products of the technological firm SAP. According to…
Researcher publishes exploit code for BrakTooth, 16 Bluetooth vulnerabilities impacting 1,400 chipsets used in billions of devices
Cybersecurity specialists announced the release of a proof of concept (PoC) exploit to test the security of multiple Bluetooth enabled…