RCE

Flaws allow hacking a system playing untrusted videos on VLC Player

Two vulnerabilities in VLC media player could allow remote attackers to take full control over a computer system while playing…

7 years ago

Tor Browser 8.5.2 fixes Firefox zero-day. Update it now!

Developers at the Tor Project have released the Tor Browser 8.5.2 to address the recently fixed CVE-2019-11707 zero-day flaw in…

7 years ago

Critical RCE affects older Diebold Nixdorf ATMs

Automated teller machine vendor Diebold Nixdorf has released security updates to address a remote code execution vulnerability in older ATMs.…

7 years ago

PoC Exploits for CVE-2019-0708 wormable Windows flaw released online

Several security experts have developed PoC exploits for wormable Windows RDS flaw tracked as CVE-2019-0708 and dubbed BlueKeep. Experts have…

7 years ago

Adobe patches over 80 flaws in Flash, Acrobat Reader, and Media Encoder

Adobe Patch Tuesday updates for May 2019 address a critical flaw in Flash Player and more than 80 vulnerabilities in…

7 years ago

Thrangrycat flaw could allow compromising millions of Cisco devices

Security firm Red Balloon discovered a severe vulnerability dubbed Thrangrycat, in Cisco products that could be exploited to an implant persistent…

7 years ago

Experts found a remote-code execution flaw in SQLite

Researchers at Cisco Talos discovered an use-after-free() vulnerability in SQLite that could be exploited by an attacker to remotely execute code…

7 years ago

Google May 2019 Patches address 4 RCE flaws in Android

Android May 2019 Patches address critical vulnerabilities in the Google operating system, including 4 remote code execution flaws. Google released…

7 years ago

How to Hack Dell computers exploiting a flaw in pre-installed Dell SupportAssist

A flaw in Dell SupportAssist, a pre-installed tool on most Dell computers, could be exploited by hackers to compromise them…

7 years ago

Tenable experts found 15 flaws in wireless presentation systems

Experts at Tenable discovered 15 vulnerabilities in eight wireless presentation systems, including flaws that can be exploited to remotely hack…

7 years ago

This website uses cookies.