Perfusion – Exploit For The RpcEptMapper Registry Key Permissions Vulnerability (Windows 7 / 2088R2 / 8 / 2012)
On Windows 7, Windows Server 2008R2, Windows 8, and Windows Server 2012, the registry key of the RpcEptMapper and DnsCache...
On Windows 7, Windows Server 2008R2, Windows 8, and Windows Server 2012, the registry key of the RpcEptMapper and DnsCache...
PE-Packer is a simple packer for Windows PE files. The new PE file after packing can obstruct the process of...
The Federal Bureau of Investigation (FBI) has issued a warning about the risks of telephony denial-of-service (TDoS) attacks on call centers....
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
The US is going to respond to the SolarWinds supply chain attack within weeks, national security adviser Jake Sullivan told...
Sequoia Capital, one of the most prominent venture capital firms, told its investors that an unauthorized third party had access to...
Summary: A flaw was found in dnsmasq before version 2.83. A heap-based buffer overflow was discovered in the way RRSets...
Summary: A flaw was found in dnsmasq before version 2.83. A heap-based buffer overflow was discovered in the way RRSets...
Summary: A flaw was found in dnsmasq before 2.83. A buffer overflow vulnerability was discovered in the way dnsmasq extract...
Summary: A flaw was found in dnsmasq before 2.83. A buffer overflow vulnerability was discovered in the way dnsmasq extract...
Summary: In Eclipse Jetty versions 1.0 thru 9.4.32.v20200930, 10.0.0.alpha1 thru 10.0.0.beta2, and 11.0.0.alpha1 thru 11.0.0.beta2O, on Unix like systems, the...
Summary: In Eclipse Jetty versions 1.0 thru 9.4.32.v20200930, 10.0.0.alpha1 thru 10.0.0.beta2, and 11.0.0.alpha1 thru 11.0.0.beta2O, on Unix like systems, the...
Summary: Heap buffer overflow in V8 in Google Chrome prior to 88.0.4324.150 allowed a remote attacker to potentially exploit heap...
Summary: Heap buffer overflow in V8 in Google Chrome prior to 88.0.4324.150 allowed a remote attacker to potentially exploit heap...
Summary: Heap buffer overflow in V8 in Google Chrome prior to 88.0.4324.150 allowed a remote attacker to potentially exploit heap...
Summary: Heap buffer overflow in V8 in Google Chrome prior to 88.0.4324.150 allowed a remote attacker to potentially exploit heap...
Summary: Heap buffer overflow in V8 in Google Chrome prior to 88.0.4324.150 allowed a remote attacker to potentially exploit heap...
Summary: Heap buffer overflow in V8 in Google Chrome prior to 88.0.4324.150 allowed a remote attacker to potentially exploit heap...
Social media site Omegle is under fire after an investigation found boys using the platform to expose themselves on camera,...
Elon Musk, who's currently the richest man on the earth –can his single tweet about investing or trading can affect...
A dispute has broken out over the provenance of stolen information between US law firm Jones Day and the CLoP...
MAC malware has relatively been a less popular choice than its equivalents for Windows attacks, but the vulnerability to Apple...
Secure Shell Bruteforcer — A faster & simpler way to bruteforce SSH server.Installationfrom BinaryDownload a pre-built binary from releases page,...
bypass forbidden directories - find and identify dir listing - you can use it as directory brute-forcer as well CompatabilyThis...