ethicalhackersacademy
Apache Solr

Linux Servers With Apache Solr Default Configurations Let Hackers Execute Arbitrary Code Remotely

Linux servers that using Apache Solr versions 8.1.1 and 8.2.0 with a default configuration are vulnerable to Remote Code Execution. The vulnerability...
Adobe Security Patch

Adobe Security Patch – Critical Security Issues Fixed With Adobe Illustrator & Media Encoder

Adobe released security patches that fix critical and  important vulnerabilities with Adobe Bridge CC, Adobe Media Encoder, Adobe Illustrator and Adobe Animate...
Magento

Magento Warns Users to Apply Security Updates to Fix Critical RCE, XSS & Other...

Magento is a leading open-source e-commerce platform written in PHP, it was introduced in 2008, Magento has a 1.9% percentage share of...

Apple Email Client Stores S/MIME Encrypted Emails as Plain Text in Database

Apple email client stores the S/MIME encrypted emails as a plain text with the database file even though Siri is disabled on...
tvm

Microsoft Build a New Threat & Vulnerability Management Features to Prevent Advanced Cyber Attacks

Microsoft Defender ATP is an add-on with Windows Defender Antivirus aimed to combat cyber attacks and to secure your environment. The threat...
Samsung Galaxy S10

Samsung Galaxy S10 Fingerprint can be Hacked by Anyone Using $3.41 Worth Screen Protector

A couple in the UK accidentally found a security flaw in Samsung Galaxy S10 fingerprint that allows anyone can unlock the phone...
Credits: Trend Micro

Exploiting an Exim Email Server Vulnerability Using EHLO Strings

In September end, the researcher discovered a critical vulnerability in the Exim email server that allows attackers to perform DoS attack and...

High Severity Vulnerability Found in Intel Software Let Hackers Perform Escalation of Privilege, DoS...

Intel released a security update for multiple vulnerabilities that affected Intel software products, including Intel Smart Connect Technology, Active System Console and...
iTerm2

7 Year-old RCE Vulnerability in macOS Terminal Emulator iTerm2 Let Hackers Execute Remote Command...

Mozilla Researchers discovered a critical vulnerability in macOS Terminal Emulator iTerm2 allows attackers to connect with the SSH server to execute a command...
Signal App

A Vulnerability in Signal App Let Attacker Force a Call to be Answered At...

Google project zero Team researcher discovered a vulnerability in Signal Messanger App lets a malicious attacker force an incoming call to be...
ethicalhackersacademy

Recent News