CVE-2020-36206
Summary: An issue was discovered in the rusb crate before 0.7.0 for Rust. Because of a lack of Send and...
Summary: An issue was discovered in the rusb crate before 0.7.0 for Rust. Because of a lack of Send and...
Summary: An issue was discovered in Legion of the Bouncy Castle BC Java 1.65 and 1.66. The OpenBSDBCrypt.checkPassword utility method...
Summary: Some parsing functions in the affected product do not check the return value of malloc and the thread handling...
Summary: The affected product has uncontrolled resource consumption issues, which may allow an attacker to cause a denial-of-service condition on...
Back in the fall of 2020 threat actors started to massively exploit a vulnerability in the no-longer maintained Magento 1...
 The community of British Mensa, which is popularly known for its people with high IQs, they have failed to...
Disconnecting Russia from the global network is possible, but the authorities have a plan of action in this case, said...
 Researchers at ESET found that NoxPlayer's latest updated mechanism, which is an android emulator for macOS and Windows, was attacked...
The outsourcing company responsible for NHS Test and Trace system in the UK confirmed this week that it was targeted...
 Recently the US FBI has noted an increase in phone calls that usually spoof the Bureau’s telephone number. The actors...
Uroboros is a GNU/Linux monitoring tool focused on single processes. While utilities like top, ps and htop provide great overall...
Burp Suite extension for extracting metadata from files Currently supported documents: PDF DOCX PPTX XLSX The project created at Jetbrains...
ESET experts uncovered a previously undocumented piece of malware that had been observed targeting high-performance computing clusters (HPC). ESET analyzed...
Ransomware operators are exploiting two VMWare ESXi vulnerabilities, CVE-2019-5544 and CVE-2020-3992, to encrypt virtual hard disks. Security experts are warning...
The U.S. CISA reveals that many of the victims of the SolarWinds hackers had no direct connection to SolarWinds. The...
Experts spotted a new Trickbot module that is used to scan local networks and make lateral movement inside the target...
Experts uncovered a new supply chain attack leveraging the update process of NoxPlayer, a free Android emulator for PCs and...
Summary: An exploitable code execution vulnerability exists in the multiple devices functionality of F2fs-Tools F2fs.Fsck 1.13. A specially crafted f2fs...
Summary: An issue was discovered in ClusterLabs crmsh through 4.2.1. Local attackers able to call "crm history" (when "crm" is...
Summary: packages/wekan-ldap/server/ldap.js in Wekan before 4.87 can process connections even though they are not authorized by the Certification Authority trust...
Summary: Weave Net is open source software which creates a virtual network that connects Docker containers across multiple hosts and...
Summary: ChurchRota 2.6.4 is vulnerable to authenticated remote code execution. The user does not need to have file upload permission...
In August 2015, the storytelling service StoryBird suffered a data breach exposing 4 million records with 1 million unique email...
Ransomware gangs deciding to pack their bags and leave their life of crime is not new, but it is a...