CVE-2021-21159 – Google / Chrome – Heap-based buffer overflow
Summary: CVE-2021-21159 is a heap-based buffer overflow vulnerability impacting Google Chrome versions 88.0.4324.182 and earlier. A proof of concept (PoC)...
Summary: CVE-2021-21159 is a heap-based buffer overflow vulnerability impacting Google Chrome versions 88.0.4324.182 and earlier. A proof of concept (PoC)...
Summary: CVE-2021-21106 is a use after free vulnerability impacting Google Chrome versions 87.0.4280.88 and earlier. A proof of concept (PoC)...
Had I known this season of Microsoft Exchange was going to be so long I’d have binge watched. Does anyone...
 A vulnerability in Sudo, open-source software used within HP's Aruba AirWave management platform, can enable any unprivileged and unauthorized local...
 An organisation called Marketo is selling data from Fujitsu on the dark web, although the firm claims the information "appears...
Fast discharge of the smartphone, the appearance of strange notifications or spam when the screen is locked, blocking antivirus programs...
 Mike Sievert, CEO of T-Mobile, is in a spot of bother after a major data breach of the carrier’s servers....
 Cyberattacks employing a type of ransomware that appeared nearly two years ago have increased in number lately. The ransomware known...
LockBit 2.0 Ransomware NOTE: The information on this page is automated and scraped directly from the LockBit 2.0 Onion Dark...
marketocloud_logo NOTE: The information on this page is automated and scraped directly from the marketocloud Blog page and reposted here...
marketocloud_logo NOTE: The information on this page is automated and scraped directly from the marketocloud Blog page and reposted here...
BlackMatter Ransomware NOTE: The information on this page is automated and scraped directly from the BlackMatter Onion Dark Web Tor...
fpicker is a Frida-based fuzzing suite that offers a variety of fuzzing modes for in-process fuzzing, such as an AFL++...
KeyHacks shows ways in which particular API keys found on a Bug Bounty Program can be used, to check if...
continews NOTE: The information on this page is automated and scraped directly from the Conti .onion Dark Web Tor Blog...
continews NOTE: The information on this page is automated and scraped directly from the Conti .onion Dark Web Tor Blog...
continews NOTE: The information on this page is automated and scraped directly from the Conti .onion Dark Web Tor Blog...
Hewlett Packard Enterprise (HPE) warns of a vulnerability in Sudo open-source program used in its Aruba AirWave management platform. Hewlett Packard...
Crooks have stolen more than $19 million in cryptocurrency assets from Cream Finance, a decentralized finance (DeFi) platform. Threat actors...
ProxyToken is a serious vulnerability in Microsoft Exchange Server that could allow unauthentication attackers to access emails from a target...
LockBit 2.0 Ransomware NOTE: The information on this page is automated and scraped directly from the LockBit 2.0 Onion Dark...
BlackMatter Ransomware NOTE: The information on this page is automated and scraped directly from the BlackMatter Onion Dark Web Tor...
BlackMatter Ransomware NOTE: The information on this page is automated and scraped directly from the BlackMatter Onion Dark Web Tor...
Summary: XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may...