CVE-2021-21180
Summary: Use after free in tab search in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit...
Summary: Use after free in tab search in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit...
Summary: Use after free in Blink in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap...
Summary: Uninitialized data in PDFium in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to obtain potentially sensitive information...
Summary: An issue was discovered in the Linux kernel through 5.11.6. fastrpc_internal_invoke in drivers/misc/fastrpc.c does not prevent user applications from...
Summary: A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML external entity vulnerabilities similar CVE-2016-3720 also affects codehaus jackson-mapper-asl libraries but...
Researchers disrupted a newly documented Chinese-based malware called CopperStealer that, since significant countermeasures started in late January, infected up to...
There’s been a number of scams targeting fans of major upcoming video game releases over the last week or two....
Internet crime is ever present, and with the ongoing pandemic, levels of scams and fraud were exceptionally high in 2020....
 Insider trading can be done more effectively now than ever before, due to a great extent to the continuing proliferation...
In the last decade, a promising trend - the Internet of Things - has been actively developing in the world....
 Security researchers at Trend Micro found proof of malicious activity by ‘MuddyWater’ automatically programmed tool (APT) that has aimed at...
 Smartphone users are facing a new confidentiality and security risk as text messaging services are currently misused to secretly divert...
OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises. OffensivePipeline downloads the tool...
Rafel is Remote Access Tool Used to Control Victims Using WebPanel With More Advance Features.Main FeaturesAdmin Permission Add App To...
Experts found vulnerabilities in two WordPress plugins that could be exploited to run arbitrary code and potentially take over a...
CISA and FBI are warning of ongoing TrickBot attacks despite security firms took down the C2 infrastructure of the infamous botnet...
According to a report published by researchers at PrivacySavvy, many travel companies expose users’ data through their booking apps. In...
Unknown threat actors have been using a new XcodeSpy Mac malware to target software developers who use Apple’s Xcode integrated...
Summary: An attacker that is able to modify Velocity templates may execute arbitrary Java code or run arbitrary system commands...
Summary: An issue was discovered in Quadbase EspressReports ES 7 Update 9. An unauthenticated attacker can create a malicious HTML...
Summary: Dell SupportAssist Client for Consumer PCs versions 3.7.x, 3.6.x, 3.4.x, 3.3.x, Dell SupportAssist Client for Business PCs versions 2.0.x,...
Summary: Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In Flatpack since version 0.9.4...
Summary: Internet Explorer Remote Code Execution Vulnerability Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27085 CVSS Score (if available) v2: / HIGH v3: /...
A man stands in front of Apple store in Berlin, Germany. Threat actors have abused the Run Script feature in...