CALL US

+91 9116117170

Tag: vulnerability

Vulnerability Of LibreOffice Can Hack Your System, Just By Opening a Document In LibreOffice

By Mohammed Tahir 0 Comment August 3, 2019

If you are using LibreOffice, “Be extra careful”. By opening a document file in LibreOffice, can hack your system. That’s because LibreOffice comprises an extreme unpatched code execution vulnerability that would execute malware into your system as swiftly as you open a maliciously formed doc file. LibreOffice is one the most usable and open source […]

OXID eShop

eCommerce Sites Exposed Due To New Vulnerability found on ‘OXID eShop’ Software

By Mohammed Tahir 0 Comment August 2, 2019

An e-commerce website with  OXID eShop platform can be compromised because of some critical flaws, to prevent your e-commerce site immediately you need to update it. As we know OXID eShop is one of the top e-commerce shop software solutions from Germany whose enterprise edition is being used by industry superiors including Mercedes, BitBurger, and […]

SQL Injection

Owasp Top 10: A1: Injection Vulnerability (Impact & Mitigation)

By Mohammed Tahir 0 Comment July 9, 2019

What is an Injection ? An injection is a type of attack which usually occurs when an attacker sends some suspicious data as part of a query or command into the input fields of any website. By this attacker can lead to data theft, data loss, or accessing data without any authorization. Different Types of […]

Creator of Satori uses Vulnerability in D-Link to organize a new Botnet

By Shaurya Sharma 0 Comment January 25, 2018

Creator of Satori uses Vulnerability in D-Link to organize a new Botnet – The researchers found two new variants of Mirai – Masuta and PureMasuta. The malware developer Satori (also known as Mirai Okiru) and the creator of the eponymous botnet once again set to work, this time attacking the D-Link routers with the goal […]

Tor Found a Dangerous Vulnerability to Leak User’s Original IP

By Shaurya Sharma 0 Comment November 6, 2017

Tor found a dangerous vulnerability to leak user’s original IP- In Italy, cybersecurity specialists found a vulnerability in Tor’s anonymous network, which could lead to De-anonymization of service users. The VAPT was confronted by the employee of the company We Are Segment Filippo. The Venetian expert on IT security found a gap in the protocols of the […]

error: Content is protected by Cyberops !!