CVE-2021-20187
Summary: It was found in Moodle before version 3.10.1, 3.9.4, 3.8.7 and 3.5.16 that it was possible for site administrators...
Summary: It was found in Moodle before version 3.10.1, 3.9.4, 3.8.7 and 3.5.16 that it was possible for site administrators...
Summary: Sensitive information disclosure and weak encryption in Pyrescom Termod4 time management devices before 10.04k allows remote attackers to read...
Summary: HedgeDoc is open source software which lets you create real-time collaborative markdown notes. In HedgeDoc before version 1.7.2, an...
Summary: Arbitrary read and write to kernel addresses by temporarily overwriting ring buffer pointer and creating a race condition. in...
In October 2020, the online photo editing application Pixlr suffered a data breach exposing 1.9 million subscribers. Impacted data included...
January 28 was Data Privacy Day, but for Malwarebytes Labs, it was Data Privacy Week. As such, we’re packed with...
 Security expert Lucas Stefanko unearthed the malware known as ‘Android Worm’. Threat actors are using this malware as a weapon...
 Last year, Apple rolled out iOS 14 with many new features, tighter privacy laws, and elements that make the iPhone...
MOSE is a post exploitation tool that enables security professionals with little or no experience with configuration management (CM) technologies...
OpenCVE, formerly known as Saucs, is a platform used to locally import the list of CVEs and perform searches on...
Experts from Great Firewall Report analyzed recent upgrades to China’s Great Firewall and revealed that it can be circumvented. Members...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
The Rocke group is using a new piece of cryptojacking malware dubbed Pro-Ocean to target Apache ActiveMQ, Oracle WebLogic, and...
US wireless carrier UScellular discloses data breach, personal information of customers may have been exposed and their phone numbers ported....
A ransomware infected the systems at the UK Research and Innovation (UKRI), at leat two services were impacted. The UK...
Summary: There is a reachable assertion abort in the function jpc_dec_process_siz() in jpc/jpc_dec.c:1296 in JasPer 2.0.12 that will lead to...
Summary: There is a reachable assertion abort in the function calcstepsizes() in jpc/jpc_dec.c in JasPer 2.0.12 that will lead to...
Summary: There is a reachable assertion abort in the function jpc_dequantize() in jpc/jpc_dec.c in JasPer 2.0.12 that will lead to...
Summary: There's a flaw in jasper's jpc encoder in versions prior to 2.0.23. Crafted input provided to jasper by an...
Summary: decode_frame in libavcodec/exr.c in FFmpeg 4.3.1 has an out-of-bounds write because of errors in calculations of when to perform...
In August 2020, the clothing store Bonobos suffered a data breach that exposed almost 70GB of data containing 2.8 million...
 The domain Perl.com was made in 1994 and was the official site for the Perl programming language, it is enlisted...
 At the moment, Sberbank is more often than other institutions in Europe is subjected to hacker attacks, but successfully repels...
 Trickbot, a banking malware has resurged again with new phishing campaigns and attacks after the collaboration of cybersecurity and technology...