The Common Vulnerability Scoring System helps to evaluate vulnerabilities. We explain how the system works and its limits. The Common Vulnerability Scoring System (CVSS) is mainly...
Attackers could gain full control over PC systems with, among other things, IBM Business Process Manager or IBM Data Replication. IBM software admins should act...
Attackers could use vulnerabilities in GitLab to guess passwords or execute malicious code despite two-factor authentication. Developers who manage versions of Git-based software projects with...
Attackers could possibly inject and execute malicious code in the widespread zlib compression library. First patches are available. A critical vulnerability has been discovered in...
Google has raised the Chrome web browser to level 105. In it, the developers close numerous security gaps, including at least one critical one. With...
Nvidia’s machine learning SDK NVFlare contains a critical security vulnerability. Attackers could inject malicious code from afar. In NVidia’s NVFlare SDK, unprivileged attackers from the...
Attackers could attack industrial control systems and, in the worst case, gain full control. Security updates are available. Admins of Industrial Control Systems (ICS) from...
For the GitLab Community and Enterprise Edition, the developers have released updated versions that close a critical security hole. Gitlab closes a security gap with...
Google operating system ChromeOS is vulnerable. However, the competition discovered the possible loophole for malicious code. For example, by simply playing a prepared audio file,...
There are some critical security gaps in several zoom variants. Updates should seal them. Mac users need to update again. In several packages and variants...