VENOM, CVE-2015-3456 , a vulnerability is discovered by Jason Geffner, Senior Security Researcher laCrowdStrike. This vulnerability code used in many virtual floppy drive virtualization platforms can allow an attacker to gain access to the host system (even rights code execution ... Read more ->
Security updates for solving the bug of "Badlock" have been published and can be downloaded at the following URL: https://www.samba.org/samba/history/security.html Tuesday, 12 April 2016, is scheduled disclosure of important vulnerabilities of the security for the Windows operating ... Read more ->
Recently a group of researchers from the company Palo Alto Networks has published an article on the vulnerability of the Android operating system, which they called Android Installer Hijacking, estimating that affects nearly half of current users of Android. According to information published in th ... Read more ->
Telerik Analytics Monitor Library is a third party library which allows monitoring applications that use it. Some versions allow operation of a DLL hijack vulnerability that allows an attacker to load malicious code in application hosting Telerik library. Description Telerik Analytics li ... Read more ->
In September 2014, a group of researchers has discovered a vulnerability in SSL 3.0 protocol (CVE-2014-3566), calling it a poodle, acronym for "Padding Oracle On Downgraded Legacy Encryption".This vulnerability is due to a safety mechanism that reduces communication for better interoperability betwe ... Read more ->