HomeSearch
VULNERABILITIES - search results
If you're not happy with the results, please do another search.
PaperCut found to have Crtical Vulnerabilities
PaperCut MF and PaperCut NG before version 22.1.3 are vulnerable to track turndown, which makes the hackers read, and upload files to the application server of PaperCut NG/MF and delete random files from remote locations.
Popular Software Package Managers Riddled With Multiple Vulnerabilities
SonarSource researchers found multiple security flaws in major package managers. These vulnerabilities, if exploited, might be used to run arbitrary code and access sensitive information. This includes source code and access tokens from compromised machines.
UK Govt. NCSC will be publishing Nmap scripts to help find vulnerabilities
UK Govt. NCSC will be publishing Nmap scripts to help find vulnerabilities
Google Releases New Chrome Update to Patch 37 Vulnerabilities
Chrome users are recommended to update to the latest version (97.0.4692.71) for Windows, Mac, and Linux by heading to Settings > Help > 'About...
Chrome vulnerable to Zero-Day: No Patch yet for other Chromium browsers
Amit Gupta - 0
Google has released crucial updates for its Chrome browser, addressing four security vulnerabilities, one of which is an actively exploited zero-day flaw.
Information Security Trends Advisory for 2024
Amit Gupta - 0
As technology advances, so do the tactics of cyber threats, presenting an ever-evolving landscape of challenges for cybersecurity professionals. Anticipating the trends that will...
OpenSSL vulnerable to two high severity ZeroDay – All you need to know
Amit Gupta - 0
All in all, your assets may not be as severely impacted by these vulnerabilities as you thought. But it is always better to be cautious and hence, cybermetrics suggests that you follow the undermentioned action strategies.
Uber hacked. Says no sensitive data lost. investigation ongoing
The data breach was done by an 18-year-old, who social engineered an uber employee into accepting the Multi-Factor authentication(MFA) prompt sent by him and likewise registered the victim on his system.
FileWave MDM lets remote attackers compromise your organization’s mobile devices
Using a FileWave MDM the IT administrators can see and control the crucial aspects of a device such as configurations, security, and location access, including auxiliary device data.
Atlassian Confluence Vulnerability Under Active Exploitation
The actual culprit is a bug named CVE-2022-26138 that makes a hard-coded password a child's play for the hackers to compromise the Confluence Server Pages, though sitting at remote locations
Recent Comments