CVE-2021-25923
Summary: In OpenEMR, versions 5.0.0 to 6.0.0.1 are vulnerable to weak password requirements as it does not enforce a maximum...
Summary: In OpenEMR, versions 5.0.0 to 6.0.0.1 are vulnerable to weak password requirements as it does not enforce a maximum...
Summary: In Weidmueller Industrial WLAN devices in multiple versions an exploitable remote code execution vulnerability exists in the iw_webs configuration...
Summary: The vgacon subsystem in the Linux kernel before 5.8.10 mishandles software scrollback. There is a vgacon_scrolldelta out-of-bounds read, aka...
Black Mirror meets 1984. Imagine that your employer uses a bot to keep track of your “production level.” And when...
Summary: CVE-2021-1675 is a remote code execution (RCE) vulnerability impacting multiple products and versions of Microsoft Windows. A proof of...
As 5G private networks become more widely available in the next years, security may become a major concern for businesses....
Aditi Singh, a 20-year-old Delhi-based ethical hacker, was awarded $30,000 (Rs 22 lakh roughly) for detecting a bug in the...
A massive breach has purportedly compromised the data of over 700 million LinkedIn users. LinkedIn has a total of 756...
Deputy Secretary of the Security Council of the Russian Federation Oleg Khramov named several countries with which Moscow plans to...
Earlier this month, Microsoft signed a driver called Netfilter that turned out to be a malicious network filter rootkit. Krasten...
The pandemic and the restrictions that came with it have led to an increase in the popularity of dating apps....
This tool lets you find the account id an S3 bucket belongs too. For this to work you need to...
A guided mutation-based fuzzer for ML-based Web Application Firewalls, inspired by AFL and based on the FuzzingBook by Andreas Zeller...
The REvil ransomware operators added a Linux encryptor to their arsenal to encrypt Vmware ESXi virtual machines. The REvil ransomware...
Researchers analyzed a recently discovered threat, the Lorenz ransomware, and developed a free decryptor for the victims of this new...
Code repository hosting service GitHub announced that it has paid out more than $1.5 million through its bug bounty program since...
Summary: An XXE issue in SAXBuilder in JDOM through 2.0.6 allows attackers to cause a denial of service via a...
Summary: Improper Certificate Validation vulnerability in the Online Threat Prevention module as used in Bitdefender Total Security allows an attacker...
Summary: A Write to Arbitrary Location in Disk vulnerability exists in PRTG Network Monitor 19.1.49 and below that allows attackers...
Summary: PRTG Network Monitor before 18.3.44.2054 allows a remote authenticated attacker (with read-write privileges) to execute arbitrary code and OS...
Summary: PRTG Network Monitor before 18.2.41.1652 allows remote unauthenticated attackers to terminate the PRTG Core Server Service via a special...
Binance, the world’s largest and most popular cryptocurrency exchange network, has had a rough few days. First, Japan’s financial regulator,...
In layman’s terms, a VPN uses encryption to create a private online connection between a device and a VPN server....
This blog post was authored by Jérôme Segura A very common practice among criminals consists of mimicking legitimate infrastructure when...