CVE-2019-0193
Summary: In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources,...
Summary: In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources,...
Summary: In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources,...
Summary: In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources,...
In December 2020, the University of California, Berkeley suffered a data breach due to vulnerability in in a third-party provider,...
 Scientists have unearthed one of the most abnormal findings in the malware chronicles. It is a booby trap file that...
 Carnival Corporation one of the biggest cruise ship operators in the world, and another major firm that reveals it is...
 Researchers have investigated on how LockBit, one of the more recent ransomware organisations, operates. As per the instances this year, ransomware...
 In bogus extortion emails sent to firms in the energy and food industries, threat actors impersonate the now-defunct DarkSide Ransomware...
FalconEye is a windows endpoint detection software for real-time process injections. It is a kernel-mode driver that aims to catch...
AboutRustcat is a port listener that can be used for different purposes. It is basically like netcat but with fewer...
North Korea-linked APT group Kimsuky allegedly breached South Korea’s atomic research agency KAERI by exploiting a VPN vulnerability. South Korean...
Experts attribute a series of cyber-espionage campaigns dating back to 2014, and focused on gathering military intelligence, to China-linked Unit...
This strange malware stops you from visiting pirate websites Sophos researchers uncovered a malware campaign that aims at blocking infected users’ from...
The supermarket chain Wegmans US Wegmans discloses a data breach, customers information was exposed on the Internet due to a...
A researcher discovered multiple vulnerabilities in smart switches of Cisco’s Small Business 220 series, including some issues rated as high...
Summary: A flaw was found in the Linux kernel in versions before 5.12. The value of internal.ndata, in the KVM...
Summary: SQLite 3.30.1 mishandles certain SELECT statements with a nonexistent VIEW, leading to an application crash. Reference Links(if available): https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13...
Summary: A flaw was discovered in OpenLDAP before 2.4.57 leading to a memch->bv_len miscalculation and slapd crash in the saslAuthzTo...
Summary: In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources,...
Summary: In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources,...
Summary: A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA...
Recently Google announced that it will fund the further development of Rust. Rust is a low-level programming language that is...
 The lower house of the bicameral parliament of Poland (Sejm) will hold a closed session on hacking attacks against representatives...
 On Thursday, researchers at email and collaboration security firm Avanan revealed that attackers are using standard tools within Google Docs/Drive...