Information security experts have found 11 flaws in the Samsung Galaxy S6 Edge Information security experts from Google Project Zero found the eleven dangerous vulnerabilities in Galaxy S6 Edge from Samsung, and was immediately reported to the manufacturer. Samsung released the update which fixes eight holes in October this year. Three the least dangerous vulnerabilities […]
Search Results
Multiple vulnerabilities in the Samsung Galaxy S6 Edge
Posted: November 11, 2015 in VulnerabilitiesTags: Android vulnerabilities, High severity vulnerabilities, Samsung
Cybersecurity threats 2015: a security update that fixed five vulnerabilities in Joomla!
Posted: October 24, 2015 in Vulnerability NewsTags: Content Management System, High severity vulnerabilities, Joomla
Five vulnerabilities in the content management system Joomla! These flaws allows a remote user to elevate privileges on the system by exploiting SQL injection. One of vulnerabilities in Joomla! allows an attacker to gain administrator rights. The developers of the popular content management system Joomla released a security update that fixes five vulnerabilities. One of […]
Cybersecurity threats 2015: Three High severity vulnerabilities of the last week
Posted: October 6, 2015 in Vulnerability NewsTags: High severity vulnerabilities, Remote Code Execution, vtiger, WinRAR
Three High severity vulnerabilities of the last week Three high severity vulnerabilities have been discovered in the last week: Execution of arbitrary code in Avast Antivirus, Compromise a system via Unpatched WinRAR and Compromise the system in vtiger. 1. Execution of arbitrary code in Avast Antivirus Danger: Critical The number of vulnerabilities: 1 Vector of […]
[Android Security 2015] New Android vulnerabilities
Posted: September 11, 2015 in IT Security NewsTags: Android malware, Android Trojan, Android vulnerabilities
New Android Critical Vulnerabilities 1. CVE-2015-1538 Exploit for Android is Now Available for Testing Purposes This exploit has several caveats. First, it is not a generic exploit. Zimperium Team only tested it to work on a single device model. Zimperium Team tested this exploit on a Nexus running Android 4.0.4. Also, due to variances in […]
Cybersecurity threats 2015: new security vulnerabilities has been found by security researchers
Posted: August 22, 2015 in VulnerabilitiesTags: Android, Android vulnerabilities, Apache Tomcat, Apple QuickTime, Apple QuickTime vulnerabilities, Cybersecurity threats 2015, Drupal, Drupal vulnerabilities
Several new security vulnerabilities of varying severity has been found by security researchers Several new security vulnerabilities of varying severity has been found by security researchers: System compromise in Android (high severity vulnerability) Bypassing security restrictions on Apache Tomcat (middle severity vulnerability) Multiple vulnerabilities in CMS Drupal (low severity vulnerability) Compromising the system in Apple […]
Cybersecurity threats 2015: Four new vulnerabilities in the Cisco products
Posted: April 9, 2015 in IT Security NewsTags: Cisco products, Cross-site scripting, Cyber Security 2015, Cybersecurity threats 2015, Denial of Service
Four new vulnerabilities in the Cisco products Four Cisco security products are vulnerable to the DDoS and XSS attacks. Four new vulnerabilities have been found in the Cisco products. Affected Products: Nexus 9000 Series Switches (CVE-2015-0686 DDoS vulnerability) Catalyst 4500 Series (CVE-2015-0687 DDoS vulnerability) Aggregation Services Routers (CVE-2015-0688 DDoS vulnerability) Wireless LAN Controller (CVE-2015-0690 XSS […]
Kernel Multiple Vulnerabilities in FreeBSD
Posted: January 28, 2015 in VulnerabilitiesTags: FreeBSD, FreeBSD vulnerabilities
Multiple vulnerabilities have been found in the FreeBSD kernel code. FreeBSD Kernel Multiple Vulnerabilities Danger level: middle The presence of fixes: Yes The number of vulnerabilities: 3 CVSSv2 rating: (AV: L / AC: L / Au: N / C: N / I: N / A: C / E: U / RL: OF / RC: C) […]
Vulnerabilities 2015: High risk vulnerabilities in the Microsoft Windows
Posted: January 14, 2015 in VulnerabilitiesTags: Buffer Overflow vulnerability, Cybersecurity threats 2015, Directory traversal attack, Microsoft Windows, Vulnerabilities 2015, vulnerability in Windows
Microsoft patches two critical vulnerabilities in the Windows: Directory traversal attack CVE-2015-0016 (vulnerability exists in the TS WebProxy Windows component) Buffer Overflow Vulnerability CVE-2015-0014 (A buffer overflow vulnerability exists in Windows Telnet service) Bypass security restrictions in Microsoft Windows (Directory traversal attack) Danger level: High The presence of fixes: Yes The number of vulnerabilities: 1
The latest vulnerabilities in WordPress plugins (December 28, 2014)
Posted: December 28, 2014 in VulnerabilitiesTags: W3 Total Cache Plugin, WordPress vulnerabilities, WordPress XCloner, WP Symposium Plugin
Here three vulnerabilities found in plugins of Content Management System WordPress: Disclosure of sensitive data in XCloner, SQL-injection in WP Symposium Plugin, and Cross-site scripting (CSRF-attack) in W3 Total Cache Plugin. 1. Disclosure of sensitive data in WordPress XCloner Danger level: Low Availability correction: None The number of vulnerabilities: 1 CVSSv2 rating: (AV: L / […]
Cybersecurity threats 2014: multiple dangerous vulnerabilities in the WordPress InfiniteWP Admin Panel
Posted: December 10, 2014 in VulnerabilitiesTags: Cybersecurity threats 2014, InfiniteWP, InfiniteWP Admin Panel, WordPress vulnerabilities
The researchers emphasize that the gaps in the free app puts at risk the safety of hundreds of thousands of web resources. According to the Walter Hop’s notification, a security researcher and founder of Netherlands-based Web development company Slik, he was able to find a number of vulnerabilities in popular free application InfiniteWP Admin Panel, […]