Wednesday, April 26, 2017

Critical Microsoft Edge Vulnerability leads to Bypass the Password and Cookie Theft –...

Critical Microsoft Edge Vulnerability Allows to  steal  the cookies and password revealed by Recent Research by  PoC (Proof-of-Concepts) .This Vulnerability Discovered under bypass the Same Origin Policy (SOP). This Vulnerability Allows to Bypass the victims cookies by force  them...

WordPress vulnerable to Cross-Site Request Forgery in Connection Information – Not yet fixed with...

 Wordpress vulnerable to Cross-Site Request Forgery in Connection Information - Not yet fixed with the last Update. WordPress is a free online Open source content Managed system focused on PHP and MySQL. It is one the powerful and most used...

New Zero Day Attack Discovered in MS Word Document Uses to Hack your PC...

MS word Document is on of the main Vector to easily spread the Macro viruses to the Victims. an undisclosed vulnerability has been Discovered in  Microsoft Office RTF( Rich Text Format) Document. FireEye Security Researchers Said, This vulnerability allows a malicious actor to execute a Visual...

Around 8 million websites affected by a critical Buffer Overflow Vulnerability resides in IIS...

Internet Information Services is an extensible web server made by Microsoft for use with the Windows NT family.IIS can help you achieve better performance, reliability, scalability, and security for your websites. The IIS6.0 zero-day flaw was found by two scientists with...

Apache Struts2 Remote Code Execution Vulnerability S2-046

Apache Struts is a free and open-source framework used to build Java web applications.This is not the first remote code execution vulnerability discovered on Apache Struts. Apache Struts2 official released a security bulletin, the bulletin pointed out that Apache Struts2...

Most Popular