GBH
GBH
Home Tags Vulnerability

Tag: Vulnerability

Vulnerability Assessment

Benefits of Vulnerability Assessment – A Detailed Guide

0
We all know that vulnerability assessment is very important nowadays, and that's why most of companies use this assessment. Whether the company is small...
Samsung Galaxy Store Flaw

Samsung Galaxy Store Flaw Allows Remote Attacker to Run Code on Affected Phones

0
A security flaw in the Galaxy Store allows attackers to trigger remote code execution on affected smartphones.  The now patched vulnerability, which affects Galaxy Store...
Cisco AnyConnect Secure

Hackers Actively Exploiting Cisco AnyConnect Secure Flaw to Perform DLL Hijacking

0
Cisco issued a warning of active exploitation attempts targeting two security vulnerabilities in the Cisco AnyConnect Secure Mobility Client for Windows.  The security flaws are...
22-Yrs-Old SQLite Bug Let Hackers Perform Code Execution & DOS Attack On Control Programs

22-Yrs-Old SQLite Bug Let Hackers Perform Code Execution & DOS Attack On Control Programs

0
Trail of Bits researcher Andreas Kellas recently disclosed a 22-Years-Old SQLite bug which has been tracked as "CVE-2022-35737." The SQLite database library has been...
BIND DNS Software

BIND DNS Software High-Severity Flaws Let Hackers Remotely Trigger the Attack

0
The ISC (Internet Systems Consortium) released a security patch this week in an attempt to address six vulnerabilities that could allow remote attackers to...
RCE Bug in ZOHO Products Let Hackers Execute Arbitrary Code Remotely

RCE Bug in ZOHO Products Let Hackers Execute Arbitrary Code Remotely

0
CISA's bug catalog has been updated with a new vulnerability related to Java deserialization, which has been exploited in the wild by malicious threat...
15-Year-Old Python Bug Let Hacker Execute Code in 350k Python Projects

15-Year-Old Python Bug Let Hacker Execute Code in 350k Python Projects

0
The cybersecurity researchers at Trellix have recently identified a 15-year-old Python bug that has been found to potentially impact 350,000 open-source repositories. There is...
High Severity IDOR Bugs inCNCF ‘Harbor’ Project by VMware

High Severity IDOR Bugs inCNCF ‘Harbor’ Project by VMware

0
Oxeye, the provider of award-winning cloud-native application security, today announced that its security researchers have uncovered several new high severity variants of the IDOR...
Critical Flaws in Airplanes WiFi Access Point Let Attackers Gain Root Access

Critical Flaws in Airplanes WiFi Access Point Let Attackers Gain Root Access

0
Two critical vulnerabilities have been found recently in the wireless LAN devices of Contec. These critical vulnerabilities were discovered by the cybersecurity analysts, Samy...
Lenovo BIOS Vulnerabilities

Lenovo Several High-Severity BIOS Vulnerabilities Impacts Hundreds of Devices

0
Recently, Lenovo’s new BIOS updates fixes the high-severity vulnerabilities impacting hundreds of devices in several models (Desktop, All in One, IdeaCentre, Legion, ThinkCentre, ThinkPad,...

Penetration Testing as a Service

Website

Complete Free Website Security Check

Website

Recent Posts