CVE-2020-5258
Summary: In affected versions of dojo (NPM package), the deepCopy method is vulnerable to Prototype Pollution. Prototype Pollution refers to...
Summary: In affected versions of dojo (NPM package), the deepCopy method is vulnerable to Prototype Pollution. Prototype Pollution refers to...
The latest iOS beta suggests that Apple’s next big update will include an iPhone feature that warns users about hidden,...
Expecting a delivery? Watch out for phishing attempts warning of held packages and bogus shipping fees. This Royal Mail delivery...
This week on Lock and Code, we discuss the top security headlines generated right here on Labs. In addition, we...
It's been over a long time since researchers uncovered a couple of security vulnerabilities, known as Spectre and Meltdown, that...
The authorities plan to oblige manufacturers of smartphones and tablets to install domestic search engines by default in the browser....
The severity of cyber-attacks has grown over the past year especially during the global pandemic. Threat actors are looking for...
On the 12th of February, FortiGuard Labs got a solicitation through email from an individual representing an organization called Packity...
One must pay attention to all Twitter advertisements that propagate all kinds of the falsified cryptocurrency scam. Tweeters can "promote"...
A year ago — everything changed. In an effort to stem the tide of a rapidly spreading pandemic, the world...
A tool for checking for lingering free namespaces for private package names referenced in dependency configuration for Python (pypi) requirements.txt,...
DLL Hijack SCanner - A tool to generate leads and automate the discovery of candidates for DLL Search Order HijackingContents...
A security researcher released a new PoC exploit for ProxyLogon issues that could be adapted to install web shells on...
The UK’s National Cyber Security Centre (NCSC) urges UK organizations to install the patches for the recently disclosed vulnerabilities in...
Google has addressed a new zero-day flaw in its Chrome browser that has been actively exploited in the wild, the...
Summary: A flaw was found in ansible-tower. The default installation is vulnerable to Job Isolation escape allowing an attacker to...
Summary: Windows Installer Elevation of Privilege Vulnerability Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26862 https://www.zerodayinitiative.com/advisories/ZDI-21-285/ CVSS Score (if available) v2: / MEDIUMAV:L/AC:L/Au:N/C:C/I:C/A:C v3:...
Summary: Windows Installer Elevation of Privilege Vulnerability Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26862 https://www.zerodayinitiative.com/advisories/ZDI-21-285/ CVSS Score (if available) v2: / MEDIUMAV:L/AC:L/Au:N/C:C/I:C/A:C v3:...
Summary: Windows Update Service Elevation of Privilege Vulnerability Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26866 https://www.zerodayinitiative.com/advisories/ZDI-21-286/ CVSS Score (if available) v2: / MEDIUMAV:L/AC:L/Au:N/C:P/I:P/A:P...
Summary: In CrossProfileAppsServiceImpl.java, there is the possibility of an application's INTERACT_ACROSS_PROFILES grant state not displaying properly in the setting UI...
Summary: In the crypt function, we attempt to null terminate a buffer using the size of the input salt without...
More than 6,000 surveillance cameras in Russia are open to the public, some of them are located at industrial enterprises...
The security researchers at 360 Netlab have discovered a new botnet that is targeting and converting the infected routers, DVRs,...
WeLeakInfo.com was an information breach notification service that was permitting its clients to check if their credentials have been compromised...