CVE-2020-11858
Summary: Code execution with escalated privileges vulnerability in Micro Focus products Operation Bridge Manager and Operation Bridge (containerized). The vulneravility...
Summary: Code execution with escalated privileges vulnerability in Micro Focus products Operation Bridge Manager and Operation Bridge (containerized). The vulneravility...
Summary: An unrestricted file upload vulnerability in keywordsImport.php in TestLink 1.9.20 allows remote attackers to execute arbitrary code by uploading...
Summary: Mechanize is an open-source ruby library that makes automated web interaction easy. In Mechanize from version 2.0.0 and before...
Summary: In p2p_copy_client_info of p2p.c, there is a possible out of bounds write due to a missing bounds check. This...
Summary: A vulnerability has been identified in SINEC NMS (All versions < V1.0 SP1 Update 1), SINEMA Server (All versions...
In May 2017, the file sharing platform Ge.tt suffered a data breach. The data was subsequently put up for sale...
This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the...
The UK’s National Crime Agency (NCA)—working alongside the US Secret Service, Homeland Security, the FBI, Europol, and the District Attorney’s...
Russian internet and search organization Yandex declared on Friday that one of its system administrators had enabled unapproved access to...
A court in the United States has sentenced Ukrainian citizen Alexander Musienko to more than seven years in prison for...
Mutuelle Nationale des Hospitaliers (MNH), a French health insurance company has been hit by a ransomware attack that has severely...
The PayPal currency converter functionality was damaged by severe cross-site scripting (XSS) vulnerability. An attacker might be able to run...
The FBI issued this week a Private Industry Notification (PIN) caution to warn organizations about the dangers of utilizing obsolete...
Figures of the year In 2020: The share of spam in email traffic amounted to 50.37%, down by 6.14 p.p....
GitLab Watchman is an application that uses the GitLab API to audit GitLab for sensitive data and credentials exposed internally....
OSV is a vulnerability database and triage infrastructure for open source projects aimed at helping both open source maintainers and...
Microsoft says it found 1,000-plus developers’ fingerprints on the SolarWinds attack Microsoft’s analysis of the SolarWinds supply chain attack revealed...
An international operation conducted in Ukraine and France lead to the arrest of criminals believed to be affiliated with the...
The administrators of the most popular carding marketplace on the dark web Joker’s Stash announced his retirement. Cybercriminal behind the...
Summary: The optional ActiveMQ LDAP login module can be configured to use anonymous access to the LDAP server. In this...
Summary: Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via "sudoedit -s" and a command-line...
Summary: Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via "sudoedit -s" and a command-line...
Summary: Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via "sudoedit -s" and a command-line...
Summary: Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via "sudoedit -s" and a command-line...