New Zero Day Attack Discovered in MS Word Document Uses to Hack your PC...

MS word Document is on of the main Vector to easily spread the Macro viruses to the Victims. an undisclosed vulnerability has been Discovered in  Microsoft Office RTF( Rich Text Format) Document. FireEye Security Researchers Said, This vulnerability allows a malicious actor to execute a Visual...

Trend Micro ServerProtect Contains Multiple Critical Arbitrary Code Execution Vunerabilities including XSS and CSRF

A Trend Micro product ServerProtect for Linux 3.0 Contain 6 Major and very critical vulnerabilities Discovered. ServerProtect Protecting against viruses, rootkits, and data-stealing malware while simplifying and automating security operations on servers and storage systems. This 6 vulnerabilities allowing  remote...
Google Forms WordPress Plugin unauthenticated PHP Object injection vulnerability

WordPress Plugin Stop User Enumeration does not stop user enumeration

User Enumeration is the capacity to automatically figure out if a given account is valid on a system. By enumerating client accounts, you are at danger of locking out accounts after a predefined number of failed attempts. Stop User Enumeration is a module stops...

Security Researcher Breaks Google’s ReCaptcha v2 using Google’s Own Tool

Researcher Discover "A logic vulnerability" dubbed ReBreakCaptcha to bypassing Google's reCAPTCHA fields which is using for prevent from robots and abusive scripts to access sites  by using google's Speech Recognition API. According to the Security Researcher , a bypass Technique...

WordPress vulnerable to Cross-Site Request Forgery in Connection Information – Not yet fixed with...

 Wordpress vulnerable to Cross-Site Request Forgery in Connection Information - Not yet fixed with the last Update. WordPress is a free online Open source content Managed system focused on PHP and MySQL. It is one the powerful and most used...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Most Popular

Recommended