Sinclair TV stations downtime allegedly caused by a ransomware attack
A ransomware attack is likely the cause of the recent downtime for TV stations owned by the Sinclair Broadcast Group...
A ransomware attack is likely the cause of the recent downtime for TV stations owned by the Sinclair Broadcast Group...
C# based tool which automates the process of discovering and 4. Examples:Target Executable: OneDrive.exeStage: DiscoveryStage: ExploitationSuccessful DLL Hijacks:Â Unsuccessful DLL Hijacks:Â DLL...
It seems that the REvil ransomware operation has shut down once again after a threat actor has hijacked their Tor...
Researchers warn of an Ad-Blocking Chrome extension that was abused by threat actors to Injecting Ads in Google search pages....
FaPro is a Fake Protocol Server tool, Can easily start or stop multiple network services.The goal is to support as...
White hat hackers earned $1.88 million at the Tianfu Cup hacking contest by finding vulnerabilities in popular software. The Tianfu...
Summary: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could...
Summary: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could...
Summary: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could...
Summary: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could...
Summary: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could...
Summary: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could...
Summary: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could...
Summary: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could...
Summary: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could...
Summary: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could...
Summary: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could...
Summary: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could...
Summary: vim is vulnerable to Heap-based Buffer Overflow Reference Links(if available): https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273 http://www.openwall.com/lists/oss-security/2021/10/01/1 https://lists.fedoraproject.org/archives/list/[email protected]/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/ CVSS Score (if available) v2:...
Summary: vim is vulnerable to Heap-based Buffer Overflow Reference Links(if available): https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273 http://www.openwall.com/lists/oss-security/2021/10/01/1 https://lists.fedoraproject.org/archives/list/[email protected]/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/ CVSS Score (if available) v2:...
Summary: vim is vulnerable to Use After Free Reference Links(if available): https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3 https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d http://www.openwall.com/lists/oss-security/2021/10/01/1 https://lists.fedoraproject.org/archives/list/[email protected]/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/ CVSS Score (if available) v2:...
Summary: vim is vulnerable to Use After Free Reference Links(if available): https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3 https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d http://www.openwall.com/lists/oss-security/2021/10/01/1 https://lists.fedoraproject.org/archives/list/[email protected]/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/ CVSS Score (if available) v2:...
Summary: nghttp2 version >= 1.10.0 and nghttp2 = 1.31.1. Reference Links(if available): https://nghttp2.org/blog/2018/04/12/nghttp2-v1-31-1/ https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/ http://www.securityfocus.com/bid/103952 https://access.redhat.com/errata/RHSA-2019:0367 https://access.redhat.com/errata/RHSA-2019:0366 CVSS Score (if...
Summary: In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of...