Tag: Vulnerabilities
You are here: Home \ Vulnerabilities \ Page 3
The two vulnerabilities are critical remote code execution flaws that exist in Adobe Photoshop CC.
Attackers can abuse URL requests processed by an email program for Mac to steal files from the victim — sometimes without user interaction.
An unpatched buffer overflow flaw allows remote attackers to completely take over the device and enter the home network.
An attacker could escalate privileges on the server, further penetrating the network, harvesting customer information or mounting credible social-engineering campaigns.
Researchers launched a Proof-of-Concept attack on two Android mobile phones and an embedded system board.
The recently-patched flaw could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
The unpatched flaw would allow a bad actor to execute information-exfiltrating malware, backdoors, ransomware or any other kind of bad code he or she chose.
The issue impacts several content management systems, including Typo3 and WordPress, as well as widely-used PDF generation library TCPDF.
An analysis of the world’s most-visited websites shows that vulnerable software, too much active content and large amounts of code execution open visitors to a raft of potential dangers.
The Cosmos Bank incident is only the latest, not the last, thanks to lagging security practices.
123456789 ... 18 ... 27 ... 36 ... 45 ... 54 ... 63 ... 72 ... 81 ... 90 ... 99 ... 108 ... 117 ... 126 ...