KDE Frameworks KConfig Code Execution Vulnerability [CVE-2019-14744]

CVE number – CVE-2019-14744 A vulnerability in KDE Frameworks KConfig could allow an unauthenticated, remote attacker to execute arbitrary code

Read more

Multiple HTTP/2 implementations are vulnerable to denial-of-service attacks

Multiple HTTP/2 implementations are vulnerable to a variety of denial-of-service (DoS) attacks. Netflix discovered several resource exhaustion vectors affecting a

Read more

New boost to increase diversity in nation’s cyber security industry

The third round of funding through the Cyber Skills Immediate Impact Fund (CSIIF) has been launched today by the UK’s

Read more

Augeas Escaped Strings Handling Heap-Based Buffer Overflow Vulnerability [CVE-2017-7555]

CVE number – CVE-2017-7555 A vulnerability in Augeas could allow an unauthenticated, remote attacker to execute arbitrary code or cause

Read more

Product Recall – Viparspectra LED greenhouse lamp

Product:  LED greenhouse lamp Name: LED Light Batch number / Barcode:  Unknown Type of alert: Serious Category: Electrical appliances and equipment Brand: Viparspectra Type / number

Read more

New Vulnerabilities In Microsoft Remote Desktop Services [DejaBlue] [CVE-2019-1181/1182]

Microsoft have just released a set of fixes for it’s Remote Desktop Services that include two critical Remote Code Execution

Read more

Siemens SCALANCE X Switches Vulnerability [CVE-2019-10942]

CVE number – CVE-2019-10942 An attacker may send large message packages repeatedly to the telnet service, which may allow a

Read more

Hazelcast Cluster Join Procedure Remote Code Execution Vulnerability [CVE-2016-10750]

CVE number – CVE-2016-10750 A vulnerability in Hazelcast could allow an unauthenticated, remote attacker to execute arbitrary code on a

Read more

ProFTPD mod_copy Arbitrary File Copy Vulnerability [CVE-2019-12815]

CVE number – CVE-2019-12815 A vulnerability in ProFTPD could allow an unauthenticated, remote attacker to execute arbitrary code or access

Read more

DocuSign Themed Phishing Using Cloud Storage

Researchers at Proofpoint have published their analysis of an ongoing observed phishing campaign targeting specific individuals, using DocuSign-themed lures and

Read more
%d bloggers like this: