Tag: technology

High-Risk Vulnerability in Third-Party Service Allows Take Control of Drupal Websites

In its latest security alert, the team behind Drupal reported finding a set of severe vulnerabilities in a third-party library….

Remote code execution and DoS vulnerabilities in Vim text editor

Information security specialists report the detection of two vulnerabilities in Vim, the improved version of the Vi text editor, present…

2 critical vulnerabilities in Avast Antivirus and AVG Antivirus

Cybersecurity specialists report the detection of two severe vulnerabilities in Avast Antivirus and AVG Antivirus, two of the most popular…

2 critical vulnerabilities in Aruba Instant On 1930 switches

Cybersecurity experts report the detection of two vulnerabilities in Aruba Instant On 1930 enterprise switches, developed by Aruba Networks. Apparently,…

Protect your networks: Authentication bypass vulnerability in Zyxel firewalls

Zyxel security teams have fixed a dangerous vulnerability recently detected in some of its firewall solutions, recommending its customers to…

Check if these 7 vulnerabilities affect your NETGEAR network products. 30 product models affected

Cybersecurity specialists report the detection of multiple vulnerabilities in NETGEAR network products. According to the report, successful exploitation of the…

4 critical vulnerabilities patched in Apache HTTP Server

The detection of at least four vulnerabilities in Apache HTTP Server has been confirmed. According to information security specialists, the…

Important privilege escalation vulnerability in TP-Link TL-WA850RE routers

Cybersecurity specialists report the detection of a severe vulnerability in the line of TL-WA850RE V6 routers, developed by the technology…

Severe security flaws in Schneider Electric IGSS Data Server

Cybersecurity specialists report the detection of multiple vulnerabilities in IGSS Data Server, one of the most important solutions of the…

Vulnerabilidades críticas en Wireshark; actualice ahora

Se han detectado al menos 5 vulnerabilidades en el popular analizador de paquetes Wireshark. Acorde al reporte, la explotación exitosa…