CVE-2019-5086
Summary: An exploitable integer overflow vulnerability exists in the flattenIncrementally function in the xcf2png and xcf2pnm binaries of xcftools, version...
Summary: An exploitable integer overflow vulnerability exists in the flattenIncrementally function in the xcf2png and xcf2pnm binaries of xcftools, version...
Summary: An exploitable integer overflow vulnerability exists in the flattenIncrementally function in the xcf2png and xcf2pnm binaries of xcftools 1.0.7....
Summary: Go before 1.12.16 and 1.13.x before 1.13.7 (and the crypto/cryptobyte package before 0.0.0-20200124225646-8b5121be2f68 for Go) allows attacks on clients...
 As the popularity of food delivery apps is increasing with each passing day so is the revenue, as a consequence, these apps...
 Common vulnerabilities and exposures, or CVEs, are seemingly increasing at a faster rate as a proportion of the overall number...
 PrivatBank is the biggest commercial bank in Ukraine, as far as the number of customers, assets value, loan portfolio, and...
Project iKy is a tool that collects information from an email and shows results in a nice visual interface.Visit the...
Darkdump is a simple script written in Python3.9 in which it allows users to enter a search term (query) in...
Personal and Corporate data is now regularly targeted and traded by unscrupulous actors, protect it with a proactive Cyber Defense...
Google revealed that Gmail users from the United States are the most targeted by email-based phishing and malware. A joint...
Russian internet and search company Yandex discloses a data breach, a system administrator was selling access to thousands of user...
Summary: Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a...
Summary: Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a...
Summary: In Foxit Reader 10.1.0.37527, a specially crafted PDF document can trigger reuse of previously free memory which can lead...
Summary: Apache Solr 5.0.0 to Apache Solr 8.3.1 are vulnerable to a Remote Code Execution through the VelocityResponseWriter. A Velocity...
Summary: Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via "sudoedit -s" and a command-line...
Summary: Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via "sudoedit -s" and a command-line...
Summary: Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via "sudoedit -s" and a command-line...
Summary: Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via "sudoedit -s" and a command-line...
Summary: Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via "sudoedit -s" and a command-line...
Microsoft’s Detection and Response and 365 Defender teams are sounding the alarm that the number of observed attacks using web...
In our last blog, Barcode Scanner app on Google Play infects 10 million users with one update, we wrote about...
Threat actors involved in tech support scams have been running a browser locker campaign from November 2020 until February 2021...
Two former college graduates are in a lot of trouble after breaking into other students’ accounts and stealing sensitive personal...