CVE-2021-36754
Summary: PowerDNS Authoritative Server 4.5.0 before 4.5.1 allows anybody to crash the process by sending a specific query (QTYPE 65535)...
Summary: PowerDNS Authoritative Server 4.5.0 before 4.5.1 allows anybody to crash the process by sending a specific query (QTYPE 65535)...
Summary: replay-sorcery-kms in Replay Sorcery 0.6.0 allows a local attacker to gain root privileges via a symlink attack on /tmp/replay-sorcery...
The Internet has been on fire since the August 4 discovery (disclosed publicly by Mathew Green) that Apple will be...
In an attempt to make Edge more secure, the Microsoft Vulnerability Research team has started to experiment with disabling Just-In-Time...
CaaS (Crime as a Service) is a practice where veteran hackers sell tools and knowledge required to perform a cybercrime....
New security flaws have emerged in the AWS’ Amazon Simple Storage Service (S3) buckets which are now exposed via additional...
Amazon has been fined 746 million ($880 million) Euros by the Luxembourg government over data protection rules. Despite its powerful...
A recently patched vulnerability in the Chromium project enabled malicious parties to inject code in embedded site pages, despite the...
StormWall, the provider of services for protecting networks from DDoS attacks, said that Russian companies have been attacked by one...
TwiTi, a tool for extracting IOCs from tweets, can collect a large number of fresh, accurate IOCs. TwiTi does classifying...
WARCannon was built to simplify and cheapify the process of 'grepping the internet'.With WARCannon, you can:Build and test regex patterns...
Security expert provided leak indicators for Conti ransomware operations that were recently disclosed by a disgruntled affiliate. An affiliate of...
VMware has addressed a critical vulnerability that affects multiple products that could be exploited to gain access to confidential information....
BlackMatter gang rapidly evolves, the group has developed a Linux version that allows operators to targets VMware’s ESXi VM platform....
An affiliate of the Conti RaaS has leaked the training material shared by the group with its network along with...
The Uptycs Threat Research Team recently observed Golang-based worm dropping cryptominer binaries which use the MSR (Model Specific Register) driver. By UPTYCS THREAT...
Summary: A vulnerability has been identified in SIMATIC PCS 7 V8.2 and earlier (All versions), SIMATIC PCS 7 V9.X (All...
Summary: A vulnerability has been identified in SIMATIC PCS 7 V8.2 and earlier (All versions), SIMATIC PCS 7 V9.0 (All...
Summary: isula-build before 0.9.5-6 can cause a program crash, when building container images, some functions for processing external data do...
Summary: A remote execution of arbitrary commands vulnerability was discovered in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series,...
Summary: The UAA reset password flow in Cloud Foundry release v236 and earlier versions, UAA release v3.3.0 and earlier versions,...
Retail giant Amazon recently offered to pay $10 USD for your palm prints. Would you offer them your hand? Many...
Tor, The Onion Router Tor (The Onion Router) is free software used to keep your online communications safe and secure...
Reposify, the leading external attack surface management platform published its Pharmaceutical Industry Attack Surface Exposures Report analyzing the security status...