Search Results

Cell-phone, especially smart-phone, has become a vital part of our lives and we can’t seem to even start our day without it. The digital era that we live in today demands us to stay on the go and hence smart-phones have become an essential extension of our ‘self’. Where the worldwide sales and usage of […]

Five vulnerabilities in the content management system Joomla! These flaws allows a remote user to elevate privileges on the system by exploiting SQL injection. One of vulnerabilities in Joomla! allows an attacker to gain administrator rights. The developers of the popular content management system Joomla released a security update that fixes five vulnerabilities. One of […]

Three High severity vulnerabilities of the last week Three high severity vulnerabilities have been discovered in the last week: Execution of arbitrary code in Avast Antivirus, Compromise a system via Unpatched WinRAR and Compromise the system in vtiger. 1. Execution of arbitrary code in Avast Antivirus Danger: Critical The number of vulnerabilities: 1 Vector of […]

Several new security vulnerabilities of varying severity has been found by security researchers Several new security vulnerabilities of varying severity has been found by security researchers: System compromise in Android (high severity vulnerability) Bypassing security restrictions on Apache Tomcat (middle severity vulnerability) Multiple vulnerabilities in CMS Drupal (low severity vulnerability) Compromising the system in Apple […]

Four new vulnerabilities in the Cisco products Four Cisco security products are vulnerable to the DDoS and XSS attacks. Four new vulnerabilities have been found in the Cisco products. Affected Products: Nexus 9000 Series Switches (CVE-2015-0686 DDoS vulnerability) Catalyst 4500 Series (CVE-2015-0687 DDoS vulnerability) Aggregation Services Routers (CVE-2015-0688 DDoS vulnerability) Wireless LAN Controller (CVE-2015-0690 XSS […]

Three new vulnerabilities have been found in the Linux Kernel CVE-2014-3673, CVE-2014-3687, and CVE-2014-3688. These vulnerabilities allows a remote user to cause a denial of service (Kernel panic). Denial of service in the Linux Kernel Danger level: Middle The presence of fixes: Yes The number of vulnerabilities: 3

The researchers emphasize that the gaps in the free app puts at risk the safety of hundreds of thousands of web resources. According to the Walter Hop’s notification, a security researcher and founder of Netherlands-based Web development company Slik, he was able to find a number of vulnerabilities in popular free application InfiniteWP Admin Panel, […]

Dangerous vulnerability in the popular (around 850,000 downloads) WordPress Download Manager plugin. The vulnerability was discovered and disclosed last week. Exploitation of this vulnerability allows an attacker to take remotely control of the target web-site through the introduction of backdoors and modify user passwords. Specialists of the company Sucuri found dangerous vulnerability in the WordPress […]

Privilege escalation and potential Object Injection vulnerability. The vulnerability allows a remote user to cause a denial of service and data manipulation. Danger level: average The presence of fixes: Yes The number of vulnerabilities: 1 CVSSv2 rating: (AV: N / AC: L / Au: N / C: N / I: P / A: P / […]

New multiple vulnerabilities have been discovered in WordPress Content Management System which allows a remote user to take control of the affected system. Danger level: Medium Availability of fixes: Yes Number of vulnerabilities: 4 CVE ID: No Information Vector of operation: Remote Impact: Cross-site scripting, Denial of service, Security Bypass