An integer overflow vulnerability exists in Adobe Acrobat Reader. The vulnerability is due to improper validation of the parameters for a certain function. A remote attacker could exploit this vulnerability by enticing a user to open a maliciously crafted document. Successful exploitation of the vulnerability can possibly lead to remote code execution.
Monthly Archives: July 2016
Adobe Acrobat and Reader Memory Corruption (APSB16-14: CVE-2016-1064; CVE-2016-1064)
A memory corruption vulnerability exists in Adobe Reader and Acrobat. The vulnerability is due to an error in Adobe Reader and Acrobat while parsing a corrupted file. A remote attacker may exploit this vulnerability by enticing a target user to open a specially crafted file.
Beats By Dre Cross Site Request Forgery
Beats By Dre suffered from a cross site request forgery vulnerability.
DSA-3637 chromium-browser – security update
Several vulnerabilities have been discovered in the chromium web browser.
Bugtraq: [SYSS-2016-032] CHERRY B.UNLIMITED AES – Insufficient Protection of Code (Firmware) and Data (Cryptographic Key)
[SYSS-2016-032] CHERRY B.UNLIMITED AES – Insufficient Protection of Code (Firmware) and Data (Cryptographic Key)
Bugtraq: [SYSS-2016-038] CHERRY B.UNLIMITED AES – Keystroke Injection Vulnerability
[SYSS-2016-038] CHERRY B.UNLIMITED AES – Keystroke Injection Vulnerability
Bugtraq: CVE-2016-5672: Intel Crosswalk SSL Prompt Issue
CVE-2016-5672: Intel Crosswalk SSL Prompt Issue
Bugtraq: [SECURITY] [DSA 3635-1] libdbd-mysql-perl security update
[SECURITY] [DSA 3635-1] libdbd-mysql-perl security update
Best Password Manager — For Windows, Linux, Mac, Android, iOS and Enterprise
When it comes to safeguarding your Internet security, installing an antivirus software or running a Secure Linux OS on your system does not mean you are safe enough from all kinds of cyber-threats.
Today majority of Internet users are vulnerable to cyber attacks, not because they aren’t using any best antivirus software or other security measures, but because they are using weak passwords to