Monday, October 19, 2020
Linux USB

Multiple Denial of Service Vulnerabilities Discovered in Linux kernel USB Subsystem

Multiple vulnerabilities found in Linux USB drivers that included with Linux kernel USB subsystem. It can be triggered by an attacker who has a physical access to the machine. These bugs allow attackers to induce a denial of service and...
MS Office Zero-day

All Versions of MS Office Affected with Critical Zero-day Vulnerability Allows Attackers Take Full...

A Critical MS Office Zero-day Remote Code Execution Vulnerability discovered in Microsoft Office that could allow attacker to take complete control of infected Windows Operating System and this vulnerability has been affected with all version of Microsoft Office. This Zero-day...

Critical BlueBorne Vulnerability Puts More Than 5 Billion Bluetooth Enabled Devices Under Attack

Bluetooth is the leading and most widespread protocol for short-range communications.It is the backbone of short range connectivity in the vast majority of devices in the market. If you are having Bluetooth enabled devices then you are vulnerable to BlueBorne...
Cloak & Dagger

Beware!! All Android Versions Up to 7.0 are Vulnerable to Toast Overlay Attack

Cloak & Dagger is a new class of potential attacks affecting Android devices. These attacks allow a malicious app to completely control the UI feedback loop and take over the device — without giving the user a chance to...
Apache

New Apache Struts Vulnerability Allows Attackers to Take Control Over Web Servers

Apache Struts is a free and open-source framework used to build Java web applications.This is not the first remote code execution vulnerability discovered on Apache Struts. Security Expert from Man Yue Mo from lgtm found a remote code execution vulnerability...
ethicalhackersacademy