Browsing Category: Vulnerabilities

Schneider Electric Fixes Remotely Exploitable Flaw in 22 Different Products

There’s a remotely exploitable directory traversal vulnerability in more than 20 individual products from Schneider Electric that can enable an attacker to gain control of an affected machine. The flaw allows attackers to bypass the authentication mechanism on the server and get access to resources that should be protected. Security researcher Billy Rios, a frequent[...]

Read more...

Google Ups Chrome Bug Bounty, Offers More Money For Exploits

Google is again increasing the amount of money it offers to researchers who report vulnerabilities in Chrome as part of the company’s bug bounty program. Now, researchers will be able to earn $15,000 at the high end of the scale, and Google also is offering more cash for researchers who can submit a working exploit for[...]

Read more...