Category: Vulnerabilities

Top Software Testing Services

Any Unprivileged User Can Gain Root Privileges On A Linux System Using A Default Sudo Configuration

The research team of Qualys, recently found a vulnerability in sudo, dubbed as the heap overflow vulnerability. Sudo is an omnipresent and powerful open-source utility that is mainly utilized on operating systems like Unix and Linux. This vulnerability has been registered as CVE-2021-3156. Exploiting this vulnerability can allow any unauthorized user, without any permissions, to…
Read more

Exploited In The Wild, 3 iOS Zero-Day Vulnerabilities Revealed By Apple

Updates of iOS, iPadOs, and tvOS have been released by Apple, on Tuesday, which includes patches/fixes for three vulnerabilities, that Apple believes, which could have been exploited in the wild quite often. The three vulnerabilities have been registered, as CVE-2021-1782, CVE-2021-1870, and CVE-2021-1871, and were capable of serving a hacker/attacker to escalate privileges and gain…
Read more

A Vulnerability Of TikTok May Have Leaked User’s Personal Profile Information Including Phone Numbers

On Tuesday, cybersecurity analysts unveiled a presently fixed security imperfection in TikTok that might have conceivably empowered a hacker to construct an information base of the application’s clients and their related mobile numbers for future noxious actions. Albeit this blemish just affects those clients who may have connected a mobile number with their record or…
Read more

A New Android Malware Capable Of Spreading Itself Via WhatsApp

A newfound malware targeting Android has been found to spread itself through WhatsApp messages to different contacts to grow what gives off an impression of being an adware crusade. ESET analyst Lukas Stefanko explains that this malware spreads through casualty’s WhatsApp via consequently answering to any WhatsApp message received with a connection (a link) to…
Read more

SAP Solution Manager Vulnerability Hits With A Full-Featured Exploit Published Online

SAP Solution Manager is an enterprise software developed by the software company SAP SE (where SAP stands for Systems, Applications, and Products for data processing), to which a full-featured exploit has been published publicly online, notified by cybersecurity researchers. The exploit that is publicly available utilizes a vulnerability that has been registered as CVE-2020-6207 and…
Read more

A New Recently Discovered Windows Vulnerability, Remotely Exploitable, Specialists Explain

A vulnerability of security feature bypass, in Windows NT LAN Manager (NTLM) which was pointed out by Microsoft, earlier in the month, in its monthly Patch updates on Tuesday, has received updates regarding more details about the vulnerability. The vulnerability has been registered as the CVE-2021-1678 and had a 4.3 of CVSS (Common Vulnerability Scoring…
Read more

Windows-Native PDF Viewers Extremely Vulnerable

A group of cybersecurity researchers found and unveiled that by far most of the most well-known Windows-local PDF viewers were defenseless (or vulnerable) against numerous assault strategies abusing standard PDF services. A few PDF software brands were defenseless against the most genuine assaults, which brought about leaking of local files, file write access, and remote…
Read more

NPM Packages Intruded By The Malware That Steals Discord User Data

NPM (Node Package Manager) is a code repository (a code repository is where snippets and patches of source code for software programs are archived in an organized way) where sharing and reusing of code blocks is done by Javascript developers, has been added with three malevolent software packages. These packages may have been used as…
Read more

DNSpooq Vulnerabilities Allow DNS Cache Poisoning Of Millions of Devices

As per JSOF which is an Israel-based cybersecurity company, that discovered the security issues, explaining that hundreds of thousands of devices, because of seven security defects in dnsmasq, may be vulnerable to DNS cache poisoning (DNS caching and forwarding softwares that are commonly used in various IoT devices, routers, servers, desktop, and mobile phones) and…
Read more

Linux Device Vulnerabilities Being Exploited By FreakOut Malware

Specialists are cautioning about a novel malware version that is focusing on Linux gadgets, to add endpoints to a botnet to be used in DDoS (distributed-denial-of-service) assaults and crypto mining. The malware variation, called FreakOut, has an assortment of abilities. Those incorporate port filtering, data gathering, and data packet and network sniffing. It is effectively…
Read more