CVE-2021-38380
Summary: Live555 through 1.08 mishandles huge requests for the same MP3 stream, leading to recursion and s stack-based buffer over-read....
Summary: Live555 through 1.08 mishandles huge requests for the same MP3 stream, leading to recursion and s stack-based buffer over-read....
Summary: CVE-2020-7246 is an unrestricted file upload vulnerability impacting qdPM versions 9.1 and earlier. An exploit was observed in open...
In a security advisory, Cisco has informed users that a vulnerability in the Universal Plug-and-Play (UPnP) service of Cisco Small...
At the end of last week, T-Mobile was investigating reports of a “massive” customer data breach. A hacker claimed to stolen 100...
You’ve likely seen fake parcel delivery texts in the news recently, and we’ve covered a few of these ourselves. SMS...
Since the beginning of the year, Kaspersky Lab has detected more than 1,500 fraudulent resources around the world aimed at...
Researchers at Tencent have issued a warning regarding a HolesWarm cryptominer malware campaign that has exploited more than 20 known...
According to the FBI, hackers are hacking online accounts at grocery shops, restaurants, and food delivery services using credential stuffing...
Representatives of Roskomnadzor accused the American corporation Google of blackmail after its statement about possible risks for Russia associated with...
To mask their actual objectives, hackers affiliated with the government of Iran have concentrated their offensive efforts on IT and...
REW-sploitThe tool has been presented at Black-Hat Arsenal USA 2021 https://www.blackhat.com/us-21/arsenal/schedule/index.html#rew-sploit-dissecting-metasploit-attacks-24086 Slides of presentation are available at https://github.com/REW-sploit/REW-sploit_docs Need help...
Allstar is a GitHub App installed on organizations or repositories to set and enforce security policies. Its goal is to...
Threat actors breached the servers of US Census Bureau on January 11, 2020, exploiting an unpatched Citrix ADC zero-day vulnerability,...
North Korea-linked InkySquid group leverages two Internet Explorer exploits to deliver a custom implant in attacks aimed at a South...
Researchers conducted a new analysis of the Diavol ransomware and found new evidence of the link with the gang behind...
T-Mobile has confirmed that hackers have stolen records belonging to 48.6 million of current and former customers. Recently T-Mobile has...
Summary: think-helper defines a set of helper functions for ThinkJS. In versions of think-helper prior to 1.1.3, the software receives...
Summary: An improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG, and Worry-Free...
Summary: chatwoot is vulnerable to Inefficient Regular Expression Complexity Reference Links(if available): https://github.com/chatwoot/chatwoot/commit/aa7db90cd2d23dbcf22a94f1e4c100dd909e2172 https://huntr.dev/bounties/1625088985607-chatwoot/chatwoot CVSS Score (if available) v2: /...
Summary: TensorFlow is an end-to-end open source platform for machine learning. In affected versions due to incomplete validation in `tf.raw_ops.QuantizeV2`,...
Summary: TensorFlow is an end-to-end open source platform for machine learning. In affected versions due to incomplete validation in MKL...
Following an announcement by Blackberry the U.S. Food & Drug Administration (FDA) and the Cybersecurity & Infrastructure Security Agency (CISA)...
Phishing scammers love well known brand names, because people trust them, and their email designs are easy to rip off....
A deep dive into macOS 11’s internals reveals some security surprises that deserve to be more widely known. Contents IntroductionDisclaimersmacOS...