CVE-2021-1335
Summary: Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers...
Summary: Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers...
Summary: Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers...
Russian President Vladimir Putin instructed his administration and the government to develop proposals for additional requirements for foreign IT companies...
A dark web market handled by a cybercrime group, Valid CC has been hacking online merchants and stealing payment credentials...
Currently, it is safe to say that Singapore’s government and non-government departments are safe from the adverse effects of SolarWinds...
Magento is an open-source code e-commerce site that supplies online traders with a scalable shopping cart system, and managing their...
Luan Herrera, a cybersecurity expert committed to vulnerability reporting, detailed another approach to performing a side-channel assault variant known as...
Due to the pandemic situation in late 2020, street festivities got canceled worldwide. For many families, get-togethers with grandparents over...
Satellite is an web payload hosting service which filters requests to ensure the correct target is getting a payload. This...
phpvuln is an open source OWASP penetration testing tool written in Python 3, that can speed up the the process...
The “sudo” advisory is officially presented as “Sudo Privilege Escalation Vulnerability Affecting Cisco Products: January 2021” and affects pretty much...
The provider of network security products Stormshield discloses data breach, threat actors stole information on some of its clients. Stormshield...
SonicWall has released a security patch to address the zero-day flaw actively exploited in attacks against the SMA 100 series...
Cisco addressed multiple pre-auth remote code execution (RCE) flaws in small business VPN routers that allow executing arbitrary code as...
Researchers from TIM’s Red Team Research (RTR) discovered 2 new zero-day vulnerabilities in WordPress Plugin Limit Login Attempts Reloaded Italy...
Alleged China-linked hackers have exploited a flaw in the SolarWinds Orion software to hack systems at the U.S. National Finance...
Summary: An issue was discovered on Mofi Network MOFI4500-4GXeLTE 4.1.5-std devices. The wireless network password is exposed in a QR...
Summary: An issue was discovered on Mofi Network MOFI4500-4GXeLTE 4.1.5-std devices. The poof.cgi script contains undocumented code that provides the...
Summary: An issue was discovered on Mofi Network MOFI4500-4GXeLTE 4.0.8-std devices. The one-time password algorithm for the undocumented system account...
Summary: _gcry_md_block_write in cipher/hash-common.c in Libgcrypt version 1.9.0 has a heap-based buffer overflow when the digest final function sets a...
Summary: An issue was discovered on Mofi Network MOFI4500-4GXeLTE 3.6.1-std and 4.0.8-std devices. They can be rebooted by sending an...
“Use real identities to reduce abuse online” is a talking point you’ve almost certainly seen down the years. It also...
Modern browsers include synchronization features (like Google Chrome’s Sync) so that all your browsers, on all your devices, share the...
Last year, 510.4 thousand crimes committed using information and telecommunications technologies were registered in Russia. According to the data of...