Tag: vulnerability

3 important vulnerabilities in SAP 3D Visual Enterprise Viewer

Cybersecurity specialists reported the finding of three vulnerabilities affecting SAP 3D Visual Enterprise Viewer, a desktop application used to manage…

2 critical code injection vulnerabilities in IBM Common Licensing

Cybersecurity specialists report the detection of two vulnerabilities in IBM Common Licensing, a popular license manager for monitoring activities such…

Critical vulnerabilities in Apache HTTP Server

Cybersecurity specialists report the detection of multiple vulnerabilities in Apache HTTP Server. According to the report, successful exploitation of these…

Log4j critical vulnerability also affects Siemens SCADA systems

A cybersecurity report notes that Siemens SPPA-T3000 implementations are vulnerable to remote code execution (RCE) attacks due to the presence…

4 major security flaws in Microsoft SharePoint Server have been patched. Update immediately

Cybersecurity specialists report the detection of multiple vulnerabilities in Microsoft SharePoint Server, an enterprise collaboration platform. According to the report,…

8 severe security flaws in SonicWall SECURE MOBILE ACCESS (SMA) 100 SERIES

Cybersecurity specialists report the detection of 8 vulnerabilities in SonicWall Secure Mobile Access (SMA) 100. According to the report, the…

Critical vulnerability in Zoho ManageEngine Desktop Central, tool for installing software patches

In a cybersecurity alert, Zoho asked its customers to update their Desktop Central and Desktop Central MSP deployments to the…

Critical remote code execution, security restrictions bypass and information disclosure vulnerabilities in SAP ABAP

Information security specialists report the detection of three severe vulnerabilities in various products of the technological firm SAP. According to…

Researcher publishes exploit code for BrakTooth, 16 Bluetooth vulnerabilities impacting 1,400 chipsets used in billions of devices

Cybersecurity specialists announced the release of a proof of concept (PoC) exploit to test the security of multiple Bluetooth enabled…

2 critical security flaws in Nitro Pro PDF software

Cybersecurity specialists report the detection of two severe vulnerabilities in Nitro Pro, one of the most popular programs for reading…