CVE-2020-13579
Summary: An exploitable integer overflow vulnerability exists in the PlanMaker document parsing functionality of SoftMaker Office 2021’s PlanMaker application. A...
Summary: An exploitable integer overflow vulnerability exists in the PlanMaker document parsing functionality of SoftMaker Office 2021’s PlanMaker application. A...
Summary: An issue has been discovered in mpruett Audio File Library (aka audiofile) 0.3.6, 0.3.5, 0.3.4, 0.3.3, 0.3.2, 0.3.1, 0.3.0....
Summary: Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due...
Summary: In Eclipse Californium version 2.3.0 to 2.6.0, the certificate based (x509 and RPK) DTLS handshakes accidentally fails, because the...
Summary: M&M Software fdtCONTAINER Component in versions below 3.5.20304.x and between 3.6 and 3.6.20304.x is vulnerable to deserialization of untrusted...
Researchers at Netlab have discovered a new botnet that re-uses the Mirai framework to pull vulnerable Android devices into DDoS...
The heated spat between Europe and AstraZeneca over a contract has segued into an unexpected blunder that left many of...
Last week on Malwarebytes Labs, we dug into a load of security events. We first peered into how Fonix ransomware...
 Check Point researchers as of late revealed the full degree of Domestic Kitten's broad surveillance operation against Iranian residents that...
 Chainalysis, a blockchain investment firm, recently published a report that confirms that ransomware operating cybercrime groups don't always work in...
 Polle Vanhoof, a Belgian cybersecurity researcher discovered there a flaw in the older Nespresso prepaid coffee machine smart cards and...
Research workers with NetScout's Atlas Security Engineering and Response Team have warned against the threat actors campaign, they said that...
 In recent times, during the attacks against the security and vulnerability researchers in North Korea, an Internet Explorer zero-day vulnerability...
Quickly fetch your WiFi password and if needed, generate a QR code of your WiFi to allow phones to easily...
Ditto is a small tool that accepts a domain name as input and generates all its variants for an homograph...
Iran-linked APT group Domestic Kitten, also tracked as APT-C-50, has been conducting widespread surveillance targeting over 1,000 individuals. Domestic Kitten,...
Cybercriminals devised a new phishing technique that leverages the Morse code to hide malicious URLs and bypass defense. Experts spotted...
The Ziggy ransomware gang has shut down its operations and released the decryption keys fearing the ongoing investigation of law enforcement....
The Largest compilation of emails and passwords (COMB), more than 3.2 billion login credentials, has been leaked on a popular...
Some commercial Nespresso machines that are used in Europe could be hacked to add unlimited funds to purchase coffee. Some...
Summary: A flaw was discovered in OpenLDAP before 2.4.57 leading to a double free and slapd crash in the saslAuthzTo...
Summary: A flaw was discovered in OpenLDAP before 2.4.57 leading to an invalid pointer free and slapd crash in the...
Summary: A flaw was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Values Return Filter control...
Summary: A flaw was discovered in OpenLDAP before 2.4.57 leading to an assertion failure in slapd in the saslAuthzTo validation,...