In: Vulnerability

Learn all about the new vulnerabilities with the help of articles and tutorials written by vulnerability experts and bug bounty rewards.

70 vulnerabilities in JuneOS affect several Juniper products

In its latest cybersecurity report, Juniper Networks announced the fixation of more than 70 vulnerabilities that reside in many of…

Critical vulnerability in SonicWall SonicOS allows spoofing packets headers and redirect firewall management users to arbitrary web domains

Cybersecurity specialists report the detection of a severe vulnerability in SonicOS, the operating system with which the most important developments…

Critical vulnerabilities in FortiClientEMS and other Fortinet products. Patch immediately

Cybersecurity specialists report the detection of multiple vulnerabilities in various Fortinet products, including FortiAnalyzer and FortiClientEMS. According to the report,…

Severe path traversal and command injection vulnerabilities in Zyxel ZyWALL VPN2S

Cybersecurity specialists report the detection of two critical vulnerabilities in Zyxel ZyWALL VPN2S, a popular firewall solution. According to the…

Code injection and input validation vulnerabilities in F-Secure Internet Gatekeeper. Patch quickly

Cybersecurity specialists report the detection of two critical vulnerabilities in some versions of F-Secure Internet Gatekeeper. According to the report,…

Critical authentication bypass vulnerability in Trend Micro ServerProtect allows unauthorized remote user to become Admin

Cybersecurity specialists report the detection of a critical vulnerability in Trend Micro ServerProtect, one of the company’s most important security…

Two High severity vulnerabilities in Adobe Premiere Pro software affect million of devices

Information security specialists report the detection of two critical vulnerabilities in Adobe Premiere Pro, a timeline-based video editing software application…

High severity RCE vulnerability in Nitro Pro PDF software

Cybersecurity specialists report the detection of a critical vulnerability in Nitro Pro, an application used to create, edit, sign, and…

5 zero-day unpatched vulnerabilities in JBL TUNE500 BT Bluetooth headphones

Cybersecurity specialists report the detection of multiple vulnerabilities in the JBL TUNE500BT Bluetooth headset, one of the most popular models…

7 critical vulnerabilities in Istio, the open source service mesh. Thousands of microservices-based applications affected

Cybersecurity specialists report the detection of a set of vulnerabilities in Istio, the service network platform with open source technology…