Vulnerabilities
3 Critical Zero-Day Flaws Found in PHP 7 That Should Not Be Ignored
Programming languages play an important role in our modern-day lives. Without these languages, building software, games and webpages would be much different than it is today. While many sites and companies use different languages, one of the most popular is the PHP language. PHP is used by nearly 80% of all websites where the language…
ASPEED AST2400 & AST2500 Security Vulnerabilities
GIGABYTE is aware of a recently security vulnerability, CVE-2019-6260 , which affects GIGABYTE server motherboards and systems using ASPEED AST2400 or AST2500 SOC to implement BMC functionality. According to the National Vulnerability Database, the ASPEED AST2400 and AST2500 BMC hardware and firmware implement Advanced High-performance Bus bridges, which can allow arbitrary read and write access to…
Vulnerabilities Discovered in OpenPGP and S/MIME Email Encryption Systems
—
in ComputerIf you use your email for sending sensitive information and want to protect it, the OpenPGP and S/MIME standards used for end-to-end encryption have been broken. Security researchers have discovered two means of getting the decrypted information out of the message, and all they require is a copy of the encrypted message. The first method…
Cheat Sheet: Addressing OWASP Top 10 Vulnerabilities in MuleSoft APIs
—
in SoftwareGenerally, when we talk about ensuring security in an IT context, it is about ensuring three essential goals – Confidentiality, Integrity, and Availability. Quick Word on OWASP The OWASP Foundation typically publishes a list of the top 10 security threats on an annual basis (2017 being an exception where RC1 was rejected and revised based…