CVE-2020-28384
Summary: A vulnerability has been identified in Solid Edge (All Versions < SE2021MP2). Affected applications lack proper validation of user-supplied...
Summary: A vulnerability has been identified in Solid Edge (All Versions < SE2021MP2). Affected applications lack proper validation of user-supplied...
Summary: The Python "Flask-Security-Too" package is used for adding security features to your Flask application. It is an is a...
Summary: A vulnerability has been identified in Solid Edge (All Versions < SE2021MP2). Affected applications lack proper validation of user-supplied...
Summary: A vulnerability has been identified in Solid Edge (All Versions < SE2021MP2). Affected applications lack proper validation of user-supplied...
Summary: A vulnerability has been identified in Solid Edge (All Versions < SE2021MP2). Affected applications lack proper validation of user-supplied...
On January 13 the Cybersecurity and Infrastructure Security Agency (CISA) issued a warning about several recent successful cyberattacks on various...
The development teams of Google and Mozilla shared their progression regarding the minimization of classic web security attack vectors such...
FBI officers began checking the JetBrains company. So far, there are no specific accusations, but the special services are investigating...
A German multinational software corporation SAP ( Systems Applications and Products in Data Processing ) is known for developing software...
PINEAPPLE MK7 REST CLIENTThe leading rogue access point and WiFi pentest toolkit for close access operations. Passive and active attacks...
(pronounced: "kay fifty-five") The K55 payload injection tool is used for injecting x86_64 shellcode payloads into running processes. The utility...
Capcom revealed that the recent ransomware attack has potentially impacted 390,000 people, an increase of approximately 40,000 people from the...
Russian-speaking scammers started targeting users of European marketplaces and classifieds is a criminal scheme dubbed Classiscam. Group-IB, a global threat...
Cisco addressed tens of high-severity flaws, including some flaws in the AnyConnect Secure Mobility Client and in its small business...
The US CISA revealed that several recent successful cyberattacks against various organizations’ cloud services. The Cybersecurity and Infrastructure Security Agency...
The root cause for the hack of the New Zealand Central Bank was the Accellion FTA (File Transfer Application) file...
Experts discovered an Android Remote Access Trojan, dubbed Rogue, that can allow to take over infected devices and steal user...
Summary: The NDN-210 has a web administration panel which is made available over https. There is a command injection issue...
Summary: NVIDIA GPU Display Driver for Windows and Linux, all versions, contains a vulnerability in the kernel mode layer (nvlddmkm.sys)...
Summary: SAP NetWeaver AS ABAP, versions 740, 750, 751, 752, 753, 754, 755, allows an unauthenticated attacker to prevent legitimate...
Summary: An issue was discovered in Cacti 1.2.x through 1.2.16. A SQL injection vulnerability in data_debug.php allows remote authenticated attackers...
Summary: SAP Business Warehouse, versions 700, 701, 702, 711, 730, 731, 740, 750, 782 and SAP BW/4HANA, versions 100, 200,...
A malware program used in the SolarWinds supply-chain attack seeks out developers’ builds of the SolarWinds Orion IT management platform...
Every second Tuesday of the month it’s ‘Patch Tuesday’. On Patch Tuesday Microsoft habitually issues a lot of patches for...