GBH
GBH
Home Hacks CVE/vulnerability

CVE/vulnerability

Adobe patches Multiple Security Flaw in Flash Player and Adobe Connect

0
Adobe releases patches for critical security flaws which allows attackers to control your system. This bundle applies for Windows, Macintosh, Linux and Chrome OS. Flash...

Lenovo VIBE Mobile Phones Vulnerable to Local Root Privilege Escalation – Its Time...

0
A Critical Vulnerabilities Discovered in Lenovo Vibe Android Mobiles Phones which leads to Local Privilege Escalation to the Victims device that is not protected...

6 Critical RCE and Buffer Overflow Vulnerabilities in IBM Informix Dynamic Server and...

0
IBM Informix Dynamic Server and Informix Open Admin Tool contains 6 Critical Vulnerabilities including RCE and a Buffer overflow in HEAP. IBM Informix Dynamic Server for...

200 Million Downloaded video players including VLC Player are vulnerable to Malicious...

0
A new Cyber Attack Spreading through Vulnerable Subtitles which Downloaded by  Victims Media Player and threatens more than 200 Millions of vulnerable Machine in...

A Backdoor Discover in Skype allows to hack everything that Skype can offer for...

0
Trustwave recently reported a locally exploitable issue in the Skype Desktop API Mac OS-X which provides an API to local programs/plugins executing on the...

Apache Struts2 Remote Code Execution Vulnerability S2-046

0
Apache Struts is a free and open-source framework used to build Java web applications.This is not the first remote code execution vulnerability discovered on...

How a Single SMS with WAP Crap can Break your Samsung Galaxy phone

0
Security researchers from Contextis disclosed a bug in Samsung Galaxy phones that can be triggered remotely with SMS, which when combined give chances to ransomware...

New Zero Day Attack Discovered in MS Word Document Uses to Hack your PC...

0
MS word Document is on of the main Vector to easily spread the Macro viruses to the Victims. an undisclosed vulnerability has been Discovered in  Microsoft Office...

WordPress Plugin Stop User Enumeration does not stop user enumeration

1
User Enumeration is the capacity to automatically figure out if a given account is valid on a system. By enumerating client accounts, you are at danger of locking...

Trend Micro ServerProtect Contains Multiple Critical Arbitrary Code Execution Vunerabilities including XSS and CSRF

0
A Trend Micro product ServerProtect for Linux 3.0 Contain 6 Major and very critical vulnerabilities Discovered. ServerProtect Protecting against viruses, rootkits, and data-stealing malware...

Penetration Testing as a Service

Website

Complete Free Website Security Check

Website

Recent Posts