Experts found critical authentication bypass flaw in HPE Edgeline Infrastructure Manager
Researchers found a critical vulnerability in HPE Edgeline Infrastructure Manager that could be exploited by a remote attacker to bypass...
Researchers found a critical vulnerability in HPE Edgeline Infrastructure Manager that could be exploited by a remote attacker to bypass...
A massive distributed denial of service (DDoS) attack shut down Belgiums’ government websites, internal networks were also impacted. A massive...
The maintainers of the Exim email server software addressed a collection of 21 issues, dubbed 21Nails, that can allow attackers...
Summary: CiphertextHeader.java in Cryptacular 1.2.3, as used in Apereo CAS and other products, allows attackers to trigger excessive memory allocation...
Summary: An out-of-bounds buffer read flaw was found in the pluto daemon of libreswan from versions 3.27 till 3.31 where,...
Summary: A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute...
Summary: Git is an open-source distributed revision control system. In affected versions of Git a specially crafted repository that contains...
Summary: GNU wget before 1.18 allows remote servers to write to arbitrary files by redirecting a request from HTTP to...
Spectre is the name for a whole class of vulnerabilities discovered in January 2018 that affected huge numbers of modern...
 Around 7:20 a.m. on Monday, May 3, 2021, the database was first made public on a prominent Russian hacker website....
UK cybersecurity organization TurgenSec has reported over 345,000 important credential files were leaked from the Filipino solicitor-general office including information...
 Swiss Cloud, a Switzerland-based cloud hosting provider, suffered a ransomware attack that seriously impacted its server infrastructure. The incident took...
Cybersecurity agency Group-IB and UNICC carried out a joint venture where they took down 134 websites handled by hacking group...
 Two researchers have shown how a Tesla and probably other cars can be remotely hacked without the involvement of the...
Pystinger implements SOCK4 proxy and port mapping through webshell. It can be directly used by metasploit-framework, viper, cobalt strike for...
Advanced Fuzzing Library - Slot your own fuzzers together and extend their features using Rust. LibAFL is written and maintained...
American multinational computer technology giant Dell addresses a 12-year-old driver flaw, tracked as CVE-2021-21551, impacting millions of computers. Hundreds of...
Iran-linked ATP group carried out a ransomware operation through a contracting company based in the country, Flashpoint researchers warn. Researchers...
Apple has released security updates to patch three zero-days in the WebKit, the Apple’s browser engine, and fixed a zero-day...
Security researcher released technical details and a PoC code for a high-severity vulnerability in Microsoft Exchange Server reported by the...
Pulse Secure has fixed a zero-day flaw in the Pulse Connect Secure (PCS) SSL VPN appliance that threat actors are...
Summary: An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.1,...
Summary: sopel-channelmgnt is a channelmgnt plugin for sopel. In versions prior to 2.0.1, on some IRC servers, restrictions around the...
Summary: Windows Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26863, CVE-2021-26875, CVE-2021-26900. Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27077...