Tuesday, March 19, 2024

CVE/vulnerability

7 Best Vulnerability Database Sources to Trace New Vulnerabilities

0
Vulnerability is the weakness that allows the attacker to enter and harm, it may be a flaw in design or misconfiguration.To exploit the...

6 Critical RCE and Buffer Overflow Vulnerabilities in IBM Informix Dynamic Server and...

0
IBM Informix Dynamic Server and Informix Open Admin Tool contains 6 Critical Vulnerabilities including RCE and a Buffer overflow in HEAP.IBM Informix Dynamic Server for...

Trend Micro ServerProtect Contains Multiple Critical Arbitrary Code Execution Vunerabilities including XSS and CSRF

0
A Trend Micro product ServerProtect for Linux 3.0 Contain 6 Major and very critical vulnerabilities Discovered. ServerProtect Protecting against viruses, rootkits, and data-stealing malware...

Multiple Vulnerabilities with Pre-installed Packages open Dell systems to Hack

0
Security experts from Talos discovered a couple of vulnerabilities in Dell Precision software which allow attackers to disable security mechanisms, escalate privileges and execute...

Lenovo VIBE Mobile Phones Vulnerable to Local Root Privilege Escalation – Its Time...

0
A Critical Vulnerabilities Discovered in Lenovo Vibe Android Mobiles Phones which leads to Local Privilege Escalation to the Victims device that is not protected...

Millions of IoT Devices Infected with “Devil’s Ivy” Remote Code Execution Vulnerability Including Internet...

0
A New Vulnerability called  “Devil’s Ivy” Discovered that infected Tens of Millions of IoT Devices which leads to Remotely Execute the code in IoT's...

Adobe patches Multiple Security Flaw in Flash Player and Adobe Connect

0
Adobe releases patches for critical security flaws which allows attackers to control your system. This bundle applies for Windows, Macintosh, Linux and Chrome OS.Flash...

Joomla! 3.7.1 is released to address a critical SQL Injection Vulnerability

0
A critical SQL Injection Vulnerability( CVE-2017-8917) with Joomla! 3.7, if you are Joomla user it's you need to update immediately. Joomla! is a content management system...

Critical Microsoft Edge Vulnerability leads to Bypass the Password and Cookie Theft –...

0
Critical Microsoft Edge Vulnerability Allows to  steal  the cookies and password revealed by Recent Research by  PoC (Proof-of-Concepts) .This Vulnerability Discovered under bypass...

WordPress vulnerable to Cross-Site Request Forgery in Connection Information – Not yet fixed with...

0
 Wordpress vulnerable to Cross-Site Request Forgery in Connection Information - Not yet fixed with the last Update.WordPress is a free online Open source content...

Managed WAF protection

Website

Recent Articles