CVE-2019-17543
Summary: LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4_write32 (related to LZ4_compress_destSize), affecting applications that call LZ4_compress_fast with...
Summary: LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4_write32 (related to LZ4_compress_destSize), affecting applications that call LZ4_compress_fast with...
Summary: Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When...
Summary: curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS...
In August 2019, Audio USA suffered a data breach after a vendor left data unsecured and exposed on the internet....
Doxing (or doxxing) is in the news again, for an absolutely shocking story that ended with a man’s death caused...
A very serious security flaw in immensely popular printer drivers has been disclosed and it could affect many millions of...
On July 18, a group of 17 newspaper and media organizations—aided by Amnesty International’s Security Lab and the research group...
A citizen of Sweden was sentenced to 15 years in prison for manipulating a cryptocurrency scam claiming to pay investors...
On Saturday 10th of July, just after a cyber interruption in IRNA's computing devices, the official IRNA media outlet announced...
Smartphones, unlike PCs, involve a range of radios – generally cellular, Wi-Fi, Bluetooth, and Near Field Communication (NFC) – that...
The case of the infamous spyware Pegasus has taken the world by storm, with news revealing its unlawful use infringing...
Have you ever wanted a simple, easy and stealth bypass for multiple classes of security products? pstf^2 (pronounced pstf-square) is...
Beanshooter is a command line tool written in Java, which helps to identify common vulnerabilities on JMX endpoints.IntroductionJMX stands for...
Researchers from threat intelligence firm Group-IB helps Dutch police identify members of phishing developer gang known as Fraud Family. Group-IB,...
U.S. CISA released an alert today about several stealth malware samples that were found on compromised Pulse Secure devices. The...
A database belonging to TicketClub Italy, a company providing coupons platform for offline purchases, is available for sale on darkweb...
Experts found a DB containing sensitive health insurance data belonging to customers of US insurance giant Humana. An SQL database...
French cyber-security agency ANSSI warned of an ongoing cyberespionage campaign aimed at French organizations carried out by China-linked APT31 group....
Summary: Raw Image Extension Remote Code Execution Vulnerability Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34521 CVSS Score (if available) v2: / MEDIUM v3:...
Summary: Microsoft Defender Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34464. Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34522 CVSS Score...
Summary: Windows DNS Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-33746, CVE-2021-33754, CVE-2021-33780, CVE-2021-34494. Reference Links(if...
Summary: Visual Studio Code Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34528. Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34529 https://www.zerodayinitiative.com/advisories/ZDI-21-827/...
In July 2021, the United Kingdom based website Guntrader suffered a data breach that exposed 112k unique email addresses. Extensive...
Whether you’ve read up on Greek mythology or you’re simply a big fan of Marvel comics, the name “Zeus” should...