CVE-2020-15816
Summary: In Western Digital WD Discovery before 4.0.251.0, a malicious application running with standard user permissions could potentially execute code...
Summary: In Western Digital WD Discovery before 4.0.251.0, a malicious application running with standard user permissions could potentially execute code...
Summary: An XXE issue in SAXBuilder in JDOM through 2.0.6 allows attackers to cause a denial of service via a...
Summary: ** UNSUPPORTED WHEN ASSIGNED ** Polipo through 1.1.1 allows denial of service via a reachable assertion during parsing of...
Summary: An issue in RAONWIZ K Editor v2018.0.0.10 allows attackers to perform a DLL hijacking attack when the service or...
Summary: Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34501. Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34518 CVSS Score...
This blog post was authored by Erika Noerenberg Introduction Over the past months, Malwarebytes researchers have been tracking a unique...
We’ve observed a 419-style scam (also known as an advance fee scam) which combines the promise of cryptocurrency riches with...
The US Department of Homeland Security (DHS) and the US Department of Justice (DOJ)—along with other federal partners—have launched a...
Last week on Malwarebytes Labs: DNS-over-HTTPS takes another small step towards global dominationNope, that isn’t Elon Musk, and he isn’t...
Juniper Networks' Steel-Belted Radius (SBR) Carrier Edition has a severe remote code-execution vulnerability that leaves wireless carrier and fixed operator...
Experts believe that screenshots of work correspondence sent by company employees to third parties may fall into the hands of...
Romanian threat actors are employing a new brute-forcer “Diicot brute” to crack the passwords on Linux-based machines and install cryptominer...
Microsoft as part of its Patch on Tuesday fixed two of the zero-day Windows flaws weaponized by Candiru, an Israeli...
In Vinnytsia city located along the Southern Bug river, a large-scale electricity theft was revealed and recorded by the SBU....
Crawl SMB shares for juicy information. File content searching + regex is supported! File types supported:PDF DOCX XLSX PPTX any...
A simple multi-threaded distributed SSH brute-forcing tool written in Python.How it WorksWhen the script is executed without the --proxies switch,...
A hacker claims to have stolen 1 TB of sensitive data from the Saudi Arabian petroleum and natural gas giant,...
Pegasus Project investigation into the leak of 50,000 phone numbers of potential surveillance targets revealed the abuse of NSO Group’s...
Security researchers demonstrated how to bypass the Windows Hello facial recognition that is used in Windows 10 as a login...
Summary: A vulnerability has been identified in JT2Go (All versions < V13.2), Solid Edge SE2021 (All Versions < SE2021MP5), Teamcenter...
Summary: A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualization (All versions < V13.2). The Jt981.dll...
Summary: A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualization (All versions < V13.2). The Jt981.dll...
Summary: Out of bounds write in ANGLE in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially perform...
Summary: The Lexmark Printer Software G2, G3 and G4 Installation Packages have a local escalation of privilege vulnerability due to...