MatrixSSL ASN.1 Handling Out-of-Bounds Read Vulnerability [CVE-2019-13470]

CVE Number – CVE-2019-13470 A vulnerability in MatrixSSL could allow an unauthenticated, remote attacker to execute arbitrary code or cause

Read more

Anubis Android Malware

Security researchers at Trend Micro have provided details about numerous malicious apps they discovered abusing Google short links for command

Read more

Apple disables Walkie-Talkie app on the Apple Watch due to vulnerability

Apple has disabled the Walkie-Talkie app on the Apple Watch, because of a vulnerability that lets users eavesdrop on other

Read more

Jenkins Token Macro Plug-In XML External Entities Vulnerability [CVE-2019-10337]

CVE Number – CVE-2019-10337 A vulnerability in the Jenkins Token Macro plug-in could allow an unauthenticated, remote attacker to cause a denial

Read more

Jenkins Credentials Plug-In Sensitive Information Disclosure Vulnerability [CVE-2019-10320]

CVE Number – CVE-2019-10320 A vulnerability in the Jenkins Credentials plug-in could allow an authenticated, remote attacker to access sensitive information on

Read more

Linux Kernel modify_ldt() Memory Protection Extensions Bounds Violation Use-After-Free Vulnerability [CVE-2019-13233]

CVE Number – CVE-2019-13233 A vulnerability in the Linux Kernel could allow a local attacker to execute arbitrary code on

Read more

Jenkins Pipeline Remote Loader Plug-In Arbitrary Methods Vulnerability [CVE-2019-10328]

CVE Number – CVE-2019-10328 A vulnerability in the Jenkins Pipeline Loader plug-in could allow an authenticated, remote attacker to execute arbitrary methods

Read more

Golang Mining Worm Targeting Linux Servers

A new form of malware has been spotted, the code’s main focus is the fraudulent mining of the Monero (XMR)

Read more

Foxit Reader AcroForm Use-After-Free Remote Code Execution Vulnerability [CVE-2019-13320]

CVE Number – CVE-2019-13320 This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader. User

Read more

LooCipher Ransomware

Researchers from Cybaze-Yoroi Z-LAB have published an analysis of a new family of ransomware named LooCipher. The researchers note that

Read more
%d bloggers like this: