CVE-2019-14923
Summary: EyesOfNetwork 5.1 allows Remote Command Execution via shell metacharacters in the module/tool_all/ host field. Reference Links(if available): https://www.eyesofnetwork.com/?p=2072 https://www.exploit-db.com/exploits/47280...
Summary: EyesOfNetwork 5.1 allows Remote Command Execution via shell metacharacters in the module/tool_all/ host field. Reference Links(if available): https://www.eyesofnetwork.com/?p=2072 https://www.exploit-db.com/exploits/47280...
Summary: Any git operation is passed through Jetty and a session is created. No expiry is set for the session...
In approximately 2019 or 2020, the Lithuanian movie streaming service Filmai.in suffered a data breach exposing 645k email addresses, usernames...
In February 2021, a series of egregiously bad security flaws were identified in the NurseryCam system designed for parents to...
In December 2020, the UK power company People's Energy suffered a data breach. The breach exposed almost 7GB of files...
In December 2020, the book promotion site NetGalley suffered a data breach. The incident exposed 1.4 million unique email addresses...
Last week on Malwarebytes Labs, the spotlight fell on the State of Malware 2021 report, wherein we have seen cyberthreats...
 Threat actors are using a novel approach to steal the credit card details of e-commerce shoppers by exploiting Google’s Apps...
 The Federal Bureau of Investigation (FBI) jointly with the Cybersecurity and Infrastructure Security Agency (CISA), and the Department of the...
remote-method-guesser (rmg) is a command line utility written in Java and can be used to identify security vulnerabilities on Java...
Horusec is an open source tool that performs static code analysis to identify security flaws during the development process. Currently,...
Today’s security teams are facing more complexity than ever before. IT environments are changing and expanding rapidly, resulting in proliferating...
The Chinese APT group had access to an NSA Equation Group, NSA hacking tool and used it years before it...
An attacker demonstrated this week that Clubhouse chats are not secure, he was able to siphon audio feeds from “multiple...
Researchers spotted a new Office malware builder, tracked as APOMacroSploit, that was employed in a campaign targeting more than 80...
Experts warn of threat actors using Google Alerts to promote a fake Adobe Flash Player updater that delivers unwanted programs....
A white hat hacker has earned a $5,000 reward from Apple for reporting a stored cross-site scripting (XSS) vulnerability on...
Summary: Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior...
Summary: SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer overflow in MS_ADPCM_decode in audio/SDL_wave.c....
Summary: SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a buffer over-read in SDL_LoadWAV_RW in audio/SDL_wave.c. Reference...
Summary: SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in BlitNtoN in video/SDL_blit_N.c...
Summary: SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c....
We start with a page showing "Site still under construction" landing page We can try adding something like /index.html and...
 The administrator behind Joker's Stash professes to have formally closed down the operation on 15th February. Meanwhile, criminal gangs offering...