A fost publicată lista furnizorilor de servicii de formare pentru securitate cibernetică
Accesați pagina

VENOM - Virtualized Environment Neglected Operations Manipulation

Popularity 950

VENOM,  CVE-2015-3456 , a vulnerability is discovered by Jason Geffner, Senior Security Researcher laCrowdStrike. This vulnerability code used in many virtual floppy drive virtualization platforms can allow an attacker to gain access to the host system (even rights code execution ... Read more ->

[CERT-RO#20160412] UPDATE: Badlock Bug – critical Vulnerability in Windows and Samba

Popularity 941

Security updates for solving the bug of "Badlock" have been published and can be downloaded at the following URL: https://www.samba.org/samba/history/security.html  Tuesday, 12 April 2016, is scheduled disclosure of important vulnerabilities of the security for the Windows operating ... Read more ->

Vulnerability in the Android operating system: Installer Hijacking

Popularity 1091

Recently a group of researchers from the company Palo Alto Networks has published an article on the vulnerability of the Android operating system, which they called Android Installer Hijacking, estimating that affects nearly half of current users of Android. According to information published in th ... Read more ->

Vulnerability in the bookstore Telerik Analytics Monitor Library

Popularity 1000

Telerik Analytics Monitor Library is a third party library which allows monitoring applications that use it. Some versions allow operation of a DLL hijack vulnerability that allows an attacker to load malicious code in application hosting Telerik library. Description Telerik Analytics li ... Read more ->

POODLE: Vulnerability in SSL 3.0

Popularity 1002

In September 2014, a group of researchers has discovered a vulnerability in SSL 3.0 protocol (CVE-2014-3566), calling it a poodle, acronym for "Padding Oracle On Downgraded Legacy Encryption".This vulnerability is due to a safety mechanism that reduces communication for better interoperability betwe ... Read more ->