Tag: vulnerability
2 critical security flaws in Nitro Pro PDF software
Cybersecurity specialists report the detection of two severe vulnerabilities in Nitro Pro, one of the most popular programs for reading…
Critical vulnerability in SonicWall SonicOS allows spoofing packets headers and redirect firewall management users to arbitrary web domains
Cybersecurity specialists report the detection of a severe vulnerability in SonicOS, the operating system with which the most important developments…
Critical vulnerabilities in FortiClientEMS and other Fortinet products. Patch immediately
Cybersecurity specialists report the detection of multiple vulnerabilities in various Fortinet products, including FortiAnalyzer and FortiClientEMS. According to the report,…
Severe path traversal and command injection vulnerabilities in Zyxel ZyWALL VPN2S
Cybersecurity specialists report the detection of two critical vulnerabilities in Zyxel ZyWALL VPN2S, a popular firewall solution. According to the…
Code injection and input validation vulnerabilities in F-Secure Internet Gatekeeper. Patch quickly
Cybersecurity specialists report the detection of two critical vulnerabilities in some versions of F-Secure Internet Gatekeeper. According to the report,…
Critical authentication bypass vulnerability in Trend Micro ServerProtect allows unauthorized remote user to become Admin
Cybersecurity specialists report the detection of a critical vulnerability in Trend Micro ServerProtect, one of the company’s most important security…
Two High severity vulnerabilities in Adobe Premiere Pro software affect million of devices
Information security specialists report the detection of two critical vulnerabilities in Adobe Premiere Pro, a timeline-based video editing software application…
High severity RCE vulnerability in Nitro Pro PDF software
Cybersecurity specialists report the detection of a critical vulnerability in Nitro Pro, an application used to create, edit, sign, and…
5 zero-day unpatched vulnerabilities in JBL TUNE500 BT Bluetooth headphones
Cybersecurity specialists report the detection of multiple vulnerabilities in the JBL TUNE500BT Bluetooth headset, one of the most popular models…
7 critical vulnerabilities in Istio, the open source service mesh. Thousands of microservices-based applications affected
Cybersecurity specialists report the detection of a set of vulnerabilities in Istio, the service network platform with open source technology…