Google has released urgent updates for 4 vulnerabilities. One of the vulnerability is rated Critical and the other three are rated High in severity. As per the Chrome advisory, the vulnerabilities are : CVE-2019-13685 : A critical Use-after-free issue in UI. CVE-2019-13688 :  A Use-after-free issue in media. CVE-2019-13687 :  A Use-after-free issue in media. […]

Read More →

  phpMyAdmin is a free tool used by millions around the world to manage MySQL and MariaDB databases over the web. Joomla, WordPress, etc are some of the popular products which use phpMyAdmin. Manuel Garcia Cardenas, a security researcher, discovered a CSRF vulnerability which can meddle with the server configurations in phpMyAdmin. An attacker can […]

Read More →

Exim is a message transfer agent (MTA) which runs on Unix-like systems. Exim is a widely used mail server. According to search results on Shodan, there are 5 milllion servers running Exim. A critical remote code execution vulnerability was discovered in Exim Server by Zerons. All the Exim servers accepting TLS connections are deemed to […]

Read More →

What is HTTP/2 ? HTTP/2 is an updated version of the HTTP protocol and was released in 2015. After the changes in HTTP specifications in 1999, this was the next major update that was issued for HTTP. HTTP/2 is based on SPDY protocol which is used in popular products like Google Chrome , Mozilla Firefox, […]

Read More →

Adobe released its monthly set of security updates to address the vulnerabilities in its products. This month’s release consists of 119 vulnerabilities addressed in 8 advisories. 25 vulnerabilities are rated critical and 94 vulnerabilities are rated important. These vulnerabilities impact Adobe After Effects CC, Adobe Character Animator CC, Adobe Premiere Pro CC, Adobe Prelude CC, […]

Read More →

Microsoft is back with its monthly set of security updates, addressing a total of 96 vulnerabilities with 29 rated critical and 68 rated important. 36 vulnerabilities lead to remote code execution. 24 vulnerabilities can allow an attacker gain elevated privileges on your system. There are no reported zero-days this month and no publicly disclosed vulnerabilities. […]

Read More →