Microsoft Security Bulletin Summary for March 2014
In this Patch Tuesday Microsoft released Five bulletins addressing a total of 23 vulnerabilities. Two are rated as Critical (addressing 19…
Stay aware of the latest security updates and prevent your network from vulnerability exploits.
In this Patch Tuesday Microsoft released Five bulletins addressing a total of 23 vulnerabilities. Two are rated as Critical (addressing 19…
SecPod Research Team member (Prabhu S Angadi) has found Multiple Cross-Site Scripting Vulnerability in BarracudaDrive. The vulnerability is caused by…
A use-after-free vulnerability is present in Microsoft Internet Explorer 10 ( CVE-2014-0322 ), which allows remote attackers to execute arbitrary…
A new zero-day vulnerability (CVE-2014-0502) in Adobe Flash Player is being exploited in the wild. A double free vulnerability exists…
IBM Platform Symphony Developer Edition is a free software to develop and test High-performance computing (HPC) and Grid Computing SDK,…
RealPlayer is vulnerable to multiple stack-based buffer overflow vulnerabilities (CVE-2013-7260). This flaw allows attackers to execute arbitrary code and take…
XXE attack is an attack on an application that parses XML input from untrusted sources using an incorrectly configured XML…
Exploit kits are automated malicious software programs which target client-side application vulnerabilities like Web Browsers, Add-ons, Adobe Flash Player, Adobe…
A bit of a background on buffer overflow to begin with. A buffer overflow occurs when a program tries to…
IDA Pro is primarily a multi-platform, multi-processor disassembler that translates machine executable code into assembly language source code for the…