Specialists of the company Juniper have identified a sequence of unauthorized code within the source code of the operating system ScreenOS, which can allow a potential attacker to gain access and control over the devices NetScreen, respectively decrypting the connection type VPN. Description & ... Read more ->
Qualys researchers have recently discovered a security vulnerability affecting library glibc (GNU C Library) LINUX operating systems that allows attackers to remotely connect and take control of affected systems without the need to authenticate them beforehand. The vulnerability has been named by t ... Read more ->
Mobile devices running a version of the operating system Android, from îbetween version 2.2 and version 5.1.1_r4, contain multiple vulnerabilities of the engine of the multimedia playback Stagefright. Exploitation of these vulnerabilities may allow an attacker to access your multimed ... Read more ->
Introduction BIND is the software open-source DNS (en. Domain Name System) most used in the Internet. „Berkeley Internet Name Domain” was developed at the University of California, Berkeley, at îthe beginning of the 1980s. În present, the application of large volume, which im ... Read more ->
UPDATE 15.07.2015 Adobe has published updates that addresses the problems arising within the last period as well : - Vulnerabilities in Adobe Flash use-after-free and corruption of memory (CVE-2015-5119, CVE-2015-5122, CVE-2015-5123) determined by the grades ActionScript 3 ... Read more ->