CVE-2020-9490
Summary: Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request...
Summary: Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request...
Summary: The UX360CA BIOS through 303 on ASUS laptops allow an attacker (with the ring 0 privilege) to overwrite nearly...
Summary: In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large...
Summary: In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large...
Summary: In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large...
Summary: In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large...
Summary: In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large...
Summary: In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large...
Summary: In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large...
Summary: In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large...
Summary: In Eclipse Jetty 7.2.2 to 9.4.38, 10.0.0.alpha0 to 10.0.1, and 11.0.0.alpha0 to 11.0.1, CPU usage can reach 100% upon...
Summary: The Data::Validate::IP module through 0.29 for Perl does not properly consider extraneous zero characters at the beginning of an...
Several users of Trezor, a small hardware device that acts as a cryptocurrency wallet, have been duped by a fake...
Users primarily located in Germany are experiencing malware that downloads and installs on their Gigaset mobile devices—right out of the...
This post was authored by Hossein Jazi As tensions between Azerbaijan and Armenia continue, we are still seeing a number...
Unless you keep your social media at a pole’s distance, you have probably heard that an absolutely enormous dataset—containing over...
If you’re an Android phone user, now might be a good time to invest in a good pair of ear...
 The United Kingdom, like every other country, runs a census every ten years. The census asks residents a number of...
 The Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA) have released a Joint Cybersecurity Advisory (CSA)...
 By now you must have heard that the social network giant ‘Facebook’ has witnessed a very large-scale user data breach...
 The data was obtained as a result of a leak. A representative of the bank explained its vulnerability in the...
 It is somewhat usual for tools and methodologies to be allowed to share throughout the nebula of Chinese threat actors....
The extension adds a context menu to BurpSuite that allows you to copy multiple requests as Javascript's XmlHttpRequest, which simplifies...
Scylla is an OSINT tool developed in Python 3.6. Scylla lets users perform advanced searches on Instagram & Twitter accounts,...