Security researcher Max Justicz has discovered several flaws in the distribution Alpine Linux, including an arbitrary code execution.  Alpine Linux is an independent, non-commercial, general purpose Linux distribution that is heavily used in containers, including Docker. Alpine Linux is based on musl libc and busybox, it is a tiny distro and is optimized to manage resources, it […]
According to experts from Talos, security vulnerabilities in pre-installed software expose Dell systems to code execution attacks. Security vulnerabilities in pre-installed software expose Dell systems to code execution attacks. Hackers can exploit the flaws to disable security mechanisms, escalate privileges and execute arbitrary code within the context of the application user. According to the experts […]
A security expert has discovered a severe vulnerability in BitTorrent Sync that can be exploited by a remote attacker to execute arbitrary code on a vulnerable machine. The security expert Andrea Micalizzi, also known as ârgod,â, has discovered a serious vulnerability in BitTorrent Sync (CVE-2015-2846) can be exploited by a remote attacker to execute arbitrary code. […]