vulnerability

Adobe has a free tool for you: its anti-piracy DRM!

It turns out, the American multimedia software giant Adobe that is known for its creative products including Photoshop, Illustrator, Premiere…

3 years ago

Jailbreaking Roku sticks with RootMyRoku

This week, developers Marcus T. and Ammar Askar (llamasoft) have released an exploit called "RootMyRoku" which is capable of achieving…

3 years ago

Samsung Email bug could let attackers access your attachments

This month, Samsung has fixed multiple high severity vulnerabilities across multiple Samsung apps including Samsung Email. By exploiting this vulnerability…

4 years ago

Git remote code execution vulnerability patched, upgrade now

The Git project has released patches for a severe remote code execution (RCE) vulnerability, CVE-2021-21300 that can be exploited by…

4 years ago

WooCommerce fixes critical Upload Files vulnerability

A critical vulnerability CVE-2021-24171 in WooCommerce Upload Files plugin can be exploited through multiple routes like double extension and path…

4 years ago

PoC exploits for Apache Flink Path Traversal vulnerabilities posted

This week Apache Flink has disclosed 2 path traversal vulnerabilities CVE-2020-17518 and CVE-2020-17519. Hackers have already posted Proof-of-Concept (PoC) exploits…

4 years ago

Cloudflare WAF bypass exploits revealed

A Cross-Site Scripting (XSS) protection bypass technique has been revealed for Cloudflare Web Application Firewall (WAF). The exploit has been…

4 years ago

Backdoor master password for thousands of Zyxel firewalls revealed

Thousands of Zyxel firewalls and access point controllers contain a secret, undocumented hardcoded password giving anyone admin access through this…

4 years ago

Joomla fixes ACL violation vulnerability after 2 years

Joomla! CMS project has fixed an access control violation flaw, CVE-2020-35616 nearly after 2 years of its reporting.

4 years ago

Google ‘Send Feedback’ bug could expose your sensitive data to attackers

Google Docs "Send Feedback" feature vulnerability which could expose your sensitive files to attackers earns researcher a $3,134 bounty.

4 years ago

This website uses cookies.