Sources to trace New Vulnerabilities

Sources to Trace New Vulnerabilities

Vulnerability defined as the weakness that allows attacker to enter in and harm, it may be a flaw in design or misconfiguration. In order...
Adobe patches Multiple Security Flaw in Flash Player

Adobe patches Multiple Security Flaw in Flash Player and Adobe Connect

Adobe releases patches for critical security flaws which allows attackers to control your system. This bundle applies for Windows, Macintosh, Linux and Chrome OS. Flash...
Privilege Escalation Vulnerability in Lenovo Transition Application

Privilege Escalation Vulnerability in Lenovo Transition Application

Summary Description: A vulnerability was identified in the Lenovo Transition program specific to some Lenovo Yoga, Flex and Miix systems running Windows where a user...
Pwn2Own 2019

Pwn2Own 2019 – Apple Safari, VirtualBox, VMware Hacked – Ethical Hackers Earned $240,000...

Trend Micro’s Zero Day Initiative (ZDI) vulnerability research contest Pwn2Own 2019 Successfully started its first-day contest and the team of researchers...
CSRF

phpMyAdmin CSRF Vulnerability Allows An Attacker to Deleting Records From Database

A new Critical CSRF Vulnerability discovered in widely used phpMyAdmin open source admin tool allows an attacker perform harmful database operation such as DROP...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Computer Security