Home Tags Remote code execution

Tag: remote code execution

Google Project Zero researchers are warning of two critical remote code vulnerabilities in popular versions of uTorrent's web-based BitTorrent client and its uTorrent Classic desktop client.
The Quagga BGP daemon bgpd prior to version 1.2.3 may be vulnerable to multiple issues that may result in denial of service,information disclosure,or remote code execution.
The DHCP relay subsystem of Cisconbsp;IOS and Cisconbsp;IOS XE Software contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code and gain full control of an affected system.

The attacker could also c...
A vulnerability in the web interface of the Cisco RV132W ADSL2+ Wireless-N VPN and RV134W VDSL2 Wireless-AC VPN Routers could allow an unauthenticated, remote attacker to execute arbitrary code and gain full control of an affected system, including...
A search online lead me to a discovery I didnrsquo;t think was possible nowadays.
I realized almost immediately that critical security issues were probably involved.
I found that out of the many tens of thousands of gas stations the company claimed to have installed their product in, 1,000 are remotely hackable.
Researchers have discovered critical vulnerabilities in Zoho’s ManageEnging suite that can lead to data loss and possible remote code execution.
Update from February 5, 2018: After further investigation, Cisco has identified additional attack vectors and features that are affected by this vulnerability.
In addition, it was also found that the original fix was incomplete so new fixed code ve...
The team behind the popular open-source framework Electron warns a remote code execution flaw could compromise user privacy.
The team behind the popular open-source framework Electron warns a remote code execution flaw could compromise user privacy.
Devs, check your protocol handling, patch if necessary If you've built a Windows application on Electron, check to see if it's subject to a just-announced remote code execution vulnerability.…
A vulnerability in the web-based GUI of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to perform unauthorized remote command execution on the affected device. The vulnerability exists because the affe...
We confront hundreds of thousands of new threats every day and we can see that threat actors are on a constant lookout for new attack opportunities.

According to our research, connecting a software license management token to a computer may open a hidden remote access channel for an attacker.