+44 (0)203 88 020 88

Menu

Search

Vulnerabilities

SQLite remote code execution vulnerability

A remote code execution vulnerability has been discovered in SQLite, dubbed Magellan 2.0 by the research team that discovered it. Tencent’s Blade security research team has published some details of a remote code execution vulnerability that affects all version of SQLite prior to the latest patch issued on 13 December 2019.   SQLite is a widely used […]

SQLite remote code execution vulnerability Read More »

Citrix users face attack as RCE vulnerability is probed

When Positive Technologies reported a serious flaw in a core element of the Citrix architecture just before Christmas, they predicted up to 80,000 businesses could be at risk. If that vulnerability is exploited, attackers obtain direct access to the company’s local network from the Internet. This attack does not require access to any accounts, and therefore

Citrix users face attack as RCE vulnerability is probed Read More »

Critical Oracle EBS vulnerabilities remain unpatched

Flaws in the Oracle Thin Client Framework API used in the General Ledger and Work in Progress modules of Oracle EBS leave thousands of firms vulnerable to financial fraud. Specialist Oracle security firm Onapsis has released a summary of exploits based on these vulnerabilities which they name Payday. One proof of concept demonstration shows how an

Critical Oracle EBS vulnerabilities remain unpatched Read More »

PDF encryption broken by researchers

Security researchers from two German universities have published details of flaws in document PDF encryption Digitally signed and encrypted PDF documents are widely used: to execute contracts, meet statutory reporting obligations and to protect commercially sensitive information transmitted as email attachment. Breaking PDF digital signatures PDF digital signatures use asymmetric cryptography; that is the signer

PDF encryption broken by researchers Read More »

0

No products in the basket.

No products in the basket.