Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
2947 Results
Vulnerabilities in WordPress
WordPress announced a security update to address vulnerabilities in WordPress. Exploitation of some of these vulnerabilities could allow a remote attacker to take control of an affected website.
High and Medium Vulnerabilities Affecting ISC Berkeley Internet Name Domain (BIND)
The Internet Systems Consortium (ISC) has released security advisories to address High and Medium vulnerabilities affecting ISC Berkeley Internet Name Domain (BIND). Exploitation of this vulnerability could allow a remote attacker to cause a denial-of-service condition.
Experts Recommend Raspberry and Linux Users Change Default Passwords on Their Machines
Attacks have surged on Raspberry Pi prompting experts to recommend Raspberry and Linux users to change default passwords on their machines. Bot-driven attempts to hijack systems using default credentials is surging.
Severe Vulnerability in CRI-O Container Engine for Kubernetes
A Severe vulnerability was patched in CRI-O Container Engine for Kubernetes. A remote attacker could exploit this vulnerability to escape the container and gain root access to the host.
High Vulnerabilities in the OpenSSL Software Library
The maintainers of OpenSSL released security updates to address High vulnerabilities in in the OpenSSL software library. A remote attacker could exploit this vulnerability to create a denial-of-service (DoS) condition.
Critical Vulnerabilities in the Veeam Data Backup Solution
Veeam released security updates to address Critical vulnerabilities in the Veeam Data Backup Solution. A remote attacker could exploit this vulnerability to execute malicious code remotely without authentication.
Vulnerabilities in Multiple AMD Products
AMD released a Mitigation Update to address vulnerabilities in multiple products. A remote attacker could exploit this vulnerability to obtain potentially sensitive bits of information from a device.
Chrome version 99.0.4844.74 for Windows, Mac, and Linux was released
Google has released Chrome version 99.0.4844.74 for Windows, Mac, and Linux. A remote attacker could exploit the vulnerabilities to take control of an affected system. For a complete description of the vulnerabilities and effected systems, visit Chrome Release Note.
Vulnerabilities in Multiple Apple Products
Apple has released security updates to address vulnerabilities in multiple products. A remote attacker could exploit this vulnerability to take control of an affected system. For a complete description of the vulnerabilities and effected systems, visit Apple Security Updates. IT Security
High Vulnerability in Redis
A High vulnerability was discovered in Redis. Redis, a persistent key-value database, due to a packaging issue, is prone to a (Debian-specific) Lua sandbox escape, which c