Search Results

Several new security vulnerabilities of varying severity has been found by security researchers Several new security vulnerabilities of varying severity has been found by security researchers: System compromise in Android (high severity vulnerability) Bypassing security restrictions on Apache Tomcat (middle severity vulnerability) Multiple vulnerabilities in CMS Drupal (low severity vulnerability) Compromising the system in Apple […]

The latest Cross-site scripting vulnerabilities in WordPress plugins Three new Cross-site scripting vulnerabilities in WordPress plugins: MaxButtons (vulnerability CVE-2014-7181), WP Google Maps(vulnerabiliy CVE-2014-7182), and WooCommerce(vulnerability CVE-2014-6313). 1. Cross-site scripting in WordPress MaxButtons Danger of level: Low Availability of corrections: Yes Quantity of vulnerabilities: 1 CVSSv2 Rating: (AV: N / AC: L / Au: N / […]

The latest Cross-site scripting vulnerabilities in WordPress plugins Five Cross-site scripting vulnerabilities in WordPress plugins: Profile Builder, Photo Gallery, EWWW Image Optimizer, Contact Form DB, and Google Calendar Events. 1. Cross-site scripting in WordPress Profile Builder Plugin Danger: Low Availability Corrections: Yes Number of vulnerabilities: 1 CVSSv2 Rating: (AV: N / AC: L / Au: […]

The latest vulnerabilities in WordPress plugins Three Security Bypass vulnerabilities in WordPress plugins: Access Areas, Download Manager, and DukaPress. 1. Security Bypass in WordPress Access Areas Plugin Danger: Low Availability of Corrections: Yes Number of vulnerabilities: 1 CVSSv2 Rating: (AV: N / AC: L / Au: N / C: P / I: P / A: […]

  Apple issues seven updates, fixes more than 40 vulnerabilities in Mac OS X Mavericks Operation of these gaps allow execution of arbitrary code on the target system, implement bypassing of address space randomization (ASLR) and so on. Late last week, Apple released an updates to Mac OS X Mavericks 10.9.5, which consisted of more […]

Cyber Security Notifications: New Vulnerabilities of September 2014 New Microsoft vulnerabilities of September 10, 2014 Denial of service in the Microsoft Lync Server Privilege escalation in the Microsoft Windows Task Manager Denial of service in Microsoft .NET Framework Multiple vulnerabilities in Microsoft Internet Explorer

Google introduced an adjustment issue web-browser Chrome 23.0.1271.97, which eliminated six vulnerabilities and represented a portion of bug fixes. One of the vulnerabilities given the status of a critical problem to bypass all security levels browser. Critical issue (CVE-2012-5142) was detected Google employees and appears in the output of buffer boundaries when performing work on […]

Hacking news 2015: The Hacking Team Hacking – Latest news Recall, July 5, unknown hackers have broken into the computer network of the company and abducted more than 400 GB of corporate data. Stolen information includes corporate documents, source code, and even, as it became known, a few exploits for zero-day vulnerability in Adobe Flash. […]

Dangerous vulnerability has been fixed in Drupal. The most serious issue outlined in the advisory (CVE-2015-3234) allows a malicious user to log in as other users on the site, including administrators, and hijack their accounts. The victim must have an account in a certain OpenID-providers for a successful attack. Vulnerabilities identified in the module OpenID, […]

New multiple vulnerabilities have been discovered in WordPress Content Management System which allows a remote user to take control of the affected system. Danger level: Medium Availability of fixes: Yes Number of vulnerabilities: 4 CVE ID: No Information Vector of operation: Remote Impact: Cross-site scripting, Denial of service, Security Bypass