Search Results

Updated dokuwiki packages fix security vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions. Vulnerabilities: Bypassing a security policy in DokuWiki Danger level: Middle Availability fixes: Yes Number of vulnerabilities: 4 CVSSv2 Rating: (AV: N / AC: M / Au: N / C: P / I: P / A: N / […]

“CVE-2014-8517” vulnerability: Remote command execution in FreeBSD FreeBSD developers have published a notification of elimination of vulnerability in FreeBSD. Operation of vulnerability allows to execute arbitrary commands, provides access to critical information and locks the computer. A malicious HTTP server could cause ftp to execute arbitrary commands. Danger level: High Availability fixes: Yes Number of […]

A serious vulnerability in the PlayStation Network service A critical vulnerability (SQL-injection) revealed in PlayStation Network. The flaw allows an attacker to gain access to Sony’s customer data. Experts in the field of cyber security have warned that in the Sony PlayStation Network was discovered a serious vulnerability. As reported at, service from Sony […]

Information leak and access control bypass in WordPress WP eCommerce Plugin Exploitation of this vulnerability allows criminals to export all the user names, addresses and other confidential information of clients. Experts of the company Sucuri found dangerous vulnerability in the plugin “WP eCommerce”, which allows attackers to easily access and edit personal information of users. […]

Three new vulnerabilities in the Open Source CRM EspoCRM: PHP File Inclusion, Improper Access Control and Reflected Cross-Site Scripting. Danger level: High Availability Corrections: Yes Number of vulnerabilities: 3 CVSSv2 Rating: (AV: N / AC: H / Au: N / C: C / I: C / A: C / E: U / RL: OF / […]

Trend Micro has studied cyber threat to modern TVs Trend Micro has released a infographic for today’s cyber threats such as TV Smart TV. According to statistics, by 2016 the share of Smart TV will account for 85% of the market. According to experts at Trend Micro, the fact that the Smart TV allows its […]

The main part of cyber attacks will focus on smart phones, social networks and the government. Researchers at Symantec presented their forecast of the threat of cyber security in the coming year. According to them, the main “victims” of malicious users and programs become mobile operating systems, social networks and government sites. Experts point out […]

Five vulnerabilities in the content management system Joomla! These flaws allows a remote user to elevate privileges on the system by exploiting SQL injection. One of vulnerabilities in Joomla! allows an attacker to gain administrator rights. The developers of the popular content management system Joomla released a security update that fixes five vulnerabilities. One of […]

Three High severity vulnerabilities of the last week Three high severity vulnerabilities have been discovered in the last week: Execution of arbitrary code in Avast Antivirus, Compromise a system via Unpatched WinRAR and Compromise the system in vtiger. 1. Execution of arbitrary code in Avast Antivirus Danger: Critical The number of vulnerabilities: 1 Vector of […]

Several new security vulnerabilities of varying severity has been found by security researchers Several new security vulnerabilities of varying severity has been found by security researchers: System compromise in Android (high severity vulnerability) Bypassing security restrictions on Apache Tomcat (middle severity vulnerability) Multiple vulnerabilities in CMS Drupal (low severity vulnerability) Compromising the system in Apple […]