CVE-2021-21021
Summary: Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a...
Summary: Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a...
Summary: In Foxit Reader 10.1.0.37527, a specially crafted PDF document can trigger reuse of previously free memory which can lead...
Summary: Apache Solr 5.0.0 to Apache Solr 8.3.1 are vulnerable to a Remote Code Execution through the VelocityResponseWriter. A Velocity...
Summary: Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via "sudoedit -s" and a command-line...
Summary: Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via "sudoedit -s" and a command-line...
Summary: Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via "sudoedit -s" and a command-line...
Summary: Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via "sudoedit -s" and a command-line...
Summary: Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via "sudoedit -s" and a command-line...
Microsoft’s Detection and Response and 365 Defender teams are sounding the alarm that the number of observed attacks using web...
In our last blog, Barcode Scanner app on Google Play infects 10 million users with one update, we wrote about...
Threat actors involved in tech support scams have been running a browser locker campaign from November 2020 until February 2021...
Two former college graduates are in a lot of trouble after breaking into other students’ accounts and stealing sensitive personal...
Koo, a home-grown microblogging platform has come under the scanner after a French ethical hacker known by the moniker Elliot...
In recent years, the threat from Ransomware has grown enormously. The ransomware attacks have started to threaten more web applications,...
Please Note - This Program Do Not Store Passwords In Any Form And All The Passwords Are Generated Locally Inside...
With this proyect we will be able to handle the data of the victims we obtain with Baphomet Ransomware. BaphoDashBoard...
Researchers at TIM’s Red Team Research discovered a zero-day vulnerability in IBM InfoSphere Information Server. Today, TIM’s Red Team Research...
Researchers from Microsoft are warning that the number of monthly web shell attacks has doubled since last year. Microsoft reported...
Security expert Dhiraj Mishra analyzed the popular instant messaging app Telegram and identified some failures in terms of handling the...
The fresh release of the Latin American Lampion trojan was updated with a new C2 address. Lampion trojan disseminated in...
An expert released a free decryption tool for the Avaddon ransomware, but operators quickly updated malware code to make it...
Lookout researchers provided details about two Android spyware families employed by an APT group tracked as Confucius. Researchers at mobile...
Summary: In onCreate of BluetoothPermissionActivity.java, there is a possible permissions bypass due to a tapjacking overlay that obscures the phonebook...
Summary: Use after free in Blink in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap...