Privilege Escalation Vulnerability in Lenovo Transition Application
Summary Description:
A vulnerability was identified in the Lenovo Transition program specific to some Lenovo Yoga, Flex and Miix systems running Windows where a user...
Google Forms WordPress Plugin unauthenticated PHP Object injection vulnerability
Introduction
The Google Forms WordPress Plugin fetches a published Google Form using a WordPress custom post or shortcode, removes the Google wrapper HTML and then...
Discovered Critical Bug allowed to Delete any Videos from Facebook
Security researcher Dan Melamed came across the vulnerability in June 2016. The bug is some ways similar to a vulnerability discovered by another researcher...
WordPress Plugin Stop User Enumeration does not stop user enumeration
User Enumeration is the capacity to automatically figure out if a given account is valid on a system.
By enumerating client accounts, you are at danger of locking...
Critical Bug:Single MMS Can Crash Message application On IOS
A solitary instant message could be abused to impair the Messages application on any iPhone because of an as of late found bug.
The bug...