Skip to main content

Posts

Showing posts with the label code execution

Mozilla Patched Multiple Vulnerabilities In Thunderbird 60.2.1

Mozilla’s email client Thunderbird exhibited several security flaws that posed a threat to users’ security. As reported, upon discovering these vulnerabilities in Thunderbird,  Mozilla  released patches in version 60.2.1. Critical Vulnerability Discovered In Thunderbird Mozilla has recently found multiple security vulnerabilities of varying severity degrees in its email client Thunderbird. As disclosed in their  security advisory , Mozilla patched seven different vulnerabilities in Thunderbird 60.2.1. This includes a critical security vulnerability (CVE-2018-12376) that could allow an attacker to execute arbitrary codes after gaining remote access to the target system. This vulnerability previously affected the Firefox 62 and Firefox ESR 60.2 browsers. As described regarding this flaw in their advisory, “Mozilla developers and community members […] reported memory safety bugs present in Firefox 61 and Firefox ESR 60.1. Some of these bugs showed evidence of memory corruptio

Yoast SEO 9.1 Vulnerability Could Allow Command Execution

A few days ago, a researcher discovered a serious security flaw in Yoast plugin. This Yoast SEO 9.1 Vulnerability could allow an attacker to execute arbitrary commands. Fortunately, Yoast has patched the flaw in the recent release 9.2. Therefore, the users should ensure upgrading to the latest version to stay protected from potential attacks. Yoast SEO 9.1 Vulnerability Discovered As disclosed by Search Engine Journal in a  blog post , a security researcher has discovered a Yoast SEO 9.1 vulnerability that remained unannounced. As per his findings, the flaw could an attacker to execute  arbitrary commands  on the target system. The researcher Dimopoulos Ilias, with alias  gweeperx  on Twitter, first disclosed his findings in his tweet. He allegedly broke the news after the fix. According to SEJ, Ilias found a race condition vulnerability in Yoast SEO 9.1 (CVE-2018-19370). To exploit this vulnerability, an attacker could simply convince the victim to open a specially crafted