CVE-2021-22173
Summary: Memory leak in USB HID dissector in Wireshark 3.4.0 to 3.4.2 allows denial of service via packet injection or...
Summary: Memory leak in USB HID dissector in Wireshark 3.4.0 to 3.4.2 allows denial of service via packet injection or...
Summary: EMQ X Broker versions prior to 4.2.8 are vulnerable to a denial of service attack as a result of...
Summary: In BinderDiedCallback of MediaCodec.cpp, there is a possible memory corruption due to a use after free. This could lead...
Summary: Invision Community (aka IPS Community Suite) before 4.6.0 allows eval-based PHP code injection by a moderator because the IPS\cms\modules\front\pages\_builder::previewBlock...
Summary: HashiCorp Vault and Vault Enterprise allowed the renewal of nearly-expired token leases and dynamic secret leases (specifically, those within...
Microsoft will terminate support for Windows 10 Home and Pro on 14 October 2025, a decade after the original Windows...
Apple has fixed two vulnerabilities in Safari’s WebKit component, announcing it is aware of a report that they may have...
According to the Times of Israel, an Iranian cybercriminal targeted the computer of a former IDF chief of staff and...
Solar JSOC spoke about a series of cyber attacks on Russian government systems in 2020. According to the American Company...
According to new research, the SIP communications protocol can be exploited to conduct cross-site scripting (XSS) assaults. In a blog post...
Researchers at Rapid7 have unearthed three highly critical security flaws in Akkadian Provisioning Manager, a third-party provisioning tool within Cisco...
The epidemic resulted in a 341 percent spike year-over-year in distributed denial of services (DDoS) attacks as per Nexusguard's Annual...
Executive summary In April 2021, we observed a suspicious Word document with a Korean file name and decoy. It revealed...
New technique I have discovered recently and give it a nickname (Chop chop) to perform lateral movement using windows services...
Automated Attack Path Planning and Validation (A2P2V) is a planning and cyber-attack tool that provides the capability for users to...
Reality Winner, a former NSA contractor who leaked classified documents to the press in 2017, has been released from prison...
Instagram has addressed a new flaw that allowed anyone to access private accounts viewing archived posts and stories without having...
The MASQ tool could be used by attackers to emulate device fingerprints thus allowing them to bypass fraud protection controls The...
The REvil ransomware gang made the headlines again, the group hit the US nuclear weapons contractor Sol Oriens and stole...
Apple released an out-of-band iOS update for older iPhones and iPads and warned that threat actors are actively exploiting two...
Microsoft disrupted a large-scale business email compromise (BEC) campaign that used forwarding rules to access messages related to financial transactions....
In December 2018, the photo sharing social network Fotolog suffered a data breach that exposed 16.7 million unique email addresses....
Are you seeing some pattern here? In what could be a called “shocking news” on Friday, BleepingComputer revealed that the...
One year ago, as countless employees settled into new routines for working from home (WFH), a Reddit user shared a...