CVE-2021-33601
Summary: A vulnerability was discovered in the web user interface of F-Secure Internet Gatekeeper. An authenticated user can modify settings...
Summary: A vulnerability was discovered in the web user interface of F-Secure Internet Gatekeeper. An authenticated user can modify settings...
Summary: The Alias feature in SnakeYAML 1.18 allows entity expansion during a load operation, a related issue to CVE-2003-1564. Reference...
Summary: Kingdee KIS Professional Edition has a privilege escalation vulnerability. Attackers can use the vulnerability to gain computer administrator rights...
The Dutch government will not tolerate ransomware attacks that could threaten national security, it will use intelligence or military services...
A program to control systems remotely by uploading videos to Youtube using Python to create the videos and the listener,...
If you hadn’t noticed by now, we are in the first week of National Cybersecurity Awareness Month, which, according to...
Summary: CVE-2021-1810 is an unspecified vulnerability impacting Apple macOS Big Sur versions 11.2.3 and earlier and Apple macOS Catalina. A...
Google warned more than 14,000 Gmail users that they have been the target of nation-state spear-phishing campaigns. On Wednesday, Google...
A number of bogus offers are doing the rounds in Discord land at the moment. Discord, a group text chat/VoiP...
Despite advance warnings that a root certificate provided by Let’s Encrypt would expire on September 30, users reported issues with...
Apache Software Foundation has released HTTP Web Server 2.4.51 to completely address a vulnerability that has been actively exploited in...
Introduction These days, when speaking of cyberthreats, most people have in mind ransomware, specifically cryptomalware. In 2020–2021, with the outbreak...
Researchers detailed the activities of the FIN12 ransomware group that earned million of dollars over the past years. Researchers from...
ASF aims to protect organizations acting as an attack surface watchdog, provided an “Object” which might be a: Domain, IP...
The official Facebook page of the US Navy’s destroyer-class warship, USS Kidd, has been hijacked. According to Task & Purpose,...
A proof of concept exploit for two authentication bypass vulnerabilities in Dahua cameras is available online, users are recommended to...
Summary: Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free...
Summary: Multiple vulnerabilities in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol processing of Cisco IOS XE Software...
Summary: A Denial of Service issue exists in China Telecom Corporation EPON Tianyi Gateway ZXHN F450(EPON ONU) 3.0. Tianyi Gateway...
Summary: SupportAssist Client version 3.8 and 3.9 contains an Untrusted search path vulnerability that allows attackers to load an arbitrary...
Summary: ESPHome is a system to control the ESP8266/ESP32. Anyone with web_server enabled and HTTP basic auth configured on version...
In October 2021, the fantasy premier league (soccer) website Fantasy Football Hub suffered a data breach that exposed 66 thousand...
A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.SummarySpoolSploit is a collection of Windows print...
The last few years have seen a mushrooming of the number and type of security tools that organizations can use...