CVE-2017-3085
Summary: Adobe Flash Player versions 26.0.0.137 and earlier have a security bypass vulnerability that leads to information disclosure when performing...
Summary: Adobe Flash Player versions 26.0.0.137 and earlier have a security bypass vulnerability that leads to information disclosure when performing...
Summary: Adobe Flash Player versions 26.0.0.137 and earlier have an exploitable type confusion vulnerability when parsing SWF files. Successful exploitation...
Summary: Adobe Flash Player version 27.0.0.159 and earlier has a flawed bytecode verification procedure, which allows for an untrusted value...
Summary: A regression affecting Adobe Flash Player version 27.0.0.187 (and earlier versions) causes the unintended reset of the global settings...
continews NOTE: The information on this page is automated and scraped directly from the Conti .onion Dark Web Tor Blog...
continews NOTE: The information on this page is automated and scraped directly from the Conti .onion Dark Web Tor Blog...
When it comes to picking a new device for your child, it’s often difficult to know where to start. Whether...
Last week, security researcher Patrick Wardle released details of a new piece of malware masquerading as the legitimate app iTerm2....
 After a 9-day trial, a California jury that held two distributed denial of service (DDoS) operations administrators, found him guilty....
 AT&T, the world’s largest telecommunications firm, lost over $200 million after a Pakistani scammer and his partners coordinated a seven-year...
 Researchers discovered API security flaws impacting several apps, potentially exposing the personal and financial information of millions of consumers. According to...
 Google recently announced a $100 million donation to organizations that manage open-source security priorities and assist with vulnerability fixes, and...
In terms of costs, the age-old battle that pits attacker versus defender has become very one sided in recent years....
PyHook is the python implementation of my SharpHook project, It uses various API hooks in order to give us the...
The tool generates a wordlist based on a set of words entered by the user.For example, during penetration testing, you...
Your SMTP checker / SMTP cracker for mailpass combolists including features like: proxy-support (SOCKS4 / SOCKS5) with automatic proxy-scraper and...
Apache OpenOffice (AOO) is currently impacted by a remote code execution flaw, tracked as CVE-2021-33035, that has yet to be...
U.S. The farmers cooperative NEW Cooperative was hit by Black Matter ransomware gang that is demanding a $5.9 million ransom....
Security researchers discovered an unsecured database exposed online containing the personal information of millions of visitors to Thailand. The popular...
Security researchers uncovered a large phishing campaign targeting multiple government departments in APAC and EMEA countries. Researchers from cybersecurity firm...
BlackMatter Ransomware NOTE: The information on this page is automated and scraped directly from the BlackMatter Onion Dark Web Tor...
Summary: A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges...
Summary: fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to...
Summary: fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to...