CVE-2021-3673
Summary: A vulnerability was found in Radare2 in version 5.3.1. Improper input validation when reading a crafted LE binary can...
Summary: A vulnerability was found in Radare2 in version 5.3.1. Improper input validation when reading a crafted LE binary can...
Summary: Elastic Enterprise Search App Search versions before 7.14.0 was vulnerable to an issue where API keys were not bound...
Summary: Elastic Enterprise Search App Search versions before 7.14.0 are vulnerable to an issue where API keys were missing authorization...
This morning Malwarebytes Labs received a scam masquerading as a security alert from Uber. The alert was pretty convincing and...
SonicWall has issued a security notice about its SMA 100 series of appliances. The vulnerability could potentially allow a remote...
Schools in the US have been using surveillance software to keep an eye on their students, and such software has...
A new study from security firm Tessian highlights the sophisticated techniques employed by threat actors to evade detection and trick...
A zero-day security flaw in the macOS Finder system in Apple might enable remote attackers to deceive users to perform...
Marcus & Millichap, a publicly-traded real estate investment corporation became the victim of a recent cyberattack that may have been...
About 60% of information leaks and 85% of hacks in corporate computer networks are related to unaccounted-for digital assets.According to...
Turns any junk text into a usable wordlist for brute-forcing.Installationgo install github.com/hakluke/haklistgen@latest Usage ExamplesScrape all words out of an HTTP...
Reconky is a script written in bash to automate the task of recon and information gathering.This Bash Script allows you...
Researcher release PoC exploit code for three iOS zero-day flaws after Apple delayed addressing them and did not credit him....
Cisco fixed three critical flaws impacting IOS XE operating system powering some of its devices, such as routers and wireless...
A user on a popular hacker forum is selling a database that purportedly contains 3.8 billion Clubhouse and Facebook user...
Researchers spotted a new cyberespionage group, dubbed FamousSparrow, that used ProxyLogon exploits to target hotels worldwide. Researchers from ESET discovered a...
Apple has addressed three zero-day vulnerabilities exploited by threat actors in attacks in the wild to take over iPhones and...
A flaw in the Microsoft Exchange Autodiscover feature can be exploited to harvest Windows domain and app credentials. Security researchers...
Summary: A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML external entity vulnerabilities similar CVE-2016-3720 also affects codehaus jackson-mapper-asl libraries but...
Summary: A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML external entity vulnerabilities similar CVE-2016-3720 also affects codehaus jackson-mapper-asl libraries but...
Summary: Affected versions of Atlassian Jira Server and Data Center allow unauthenticated remote attackers to impact the application's availability via...
Summary: tftpd_file.c in atftp through 0.7.4 has a buffer overflow because buffer-size handling does not properly consider the combination of...
Summary: A directory traversal vulnerability in Trend Micro Apex One, OfficeScan (versions XG and 11.0), and Worry-Free Business Security (versions...
Summary: On BIG-IP version 16.0.x before 16.0.1.2, 15.1.x before 15.1.3.1, 14.1.x before 14.1.4.3, 13.1.x before 13.1.4.1, and all versions of...