Category: Vulnerability

Adobe August Security Update

Adobe December Security Update fix 87 sescurity flaws

Recently, Adobe officially released the December security update, which fixes multiple vulnerabilities in Acrobat and Reader. Vulnerability Overview Vulnerability Impact Severity CVE Number Arbitrary Code Execution Critical CVE-2018-15998CVE-2018-15987 Arbitrary Code Execution Critical CVE-2018-16004CVE-2018-19720 Privilege...

SQLite Remote Code Execution Vulnerability

SQLite Remote Code Execution Vulnerability Alert

SQLite released 3.26.0 on 2018-12-01 to fix a remote code execution vulnerability. This vulnerability was found by Tencent Blade Team and the details of the specific vulnerability have not been made public. It is currently named Magellan....

SplitSpectre

Researchers find a new class Spectre attack, SplitSpectre

Researchers at Northeastern University and IBM Research have discovered a new variant of the Spectre CPU vulnerability that can be leveraged through browser-based code. An important difference between the new vulnerability known as SplitSpectre and other Spectre variants is...

Rowhammer attacks

New Rowhammer attacks may bypass ECC protection

Row hammer (also written as rowhammer) is an unintended side effect in dynamic random-access memory (DRAM) that causes memory cells to leak their charges and interact electrically between themselves, possibly leaking or changing the contents of nearby memory rows that were not addressed in...