CVE-2018-20506
Summary: SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3...
Summary: SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3...
Summary: ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that...
Summary: A heap buffer overflow vulnerability in msadpcm_decode_block of libsndfile 1.0.30 allows attackers to execute arbitrary code via a crafted...
Summary: Redis is an in-memory database that persists on disk. A vulnerability involving out-of-bounds read and integer overflow to buffer...
In the latest study, researchers at Positive Technologies have documented the evolution of hacker-placed ads on the Dark Web from...
The Copilot service developed by Microsoft and GitHub specialists, designed to simplify the work of programmers, can be used by...
The cyber-attack that crippled Iran's national railway system at the beginning of the month was caused by a disk-wiping malware...
The Polish authorities have detained two individuals committing so-called ‘Black Box’ attacks, targeting ATMs, whereby criminal offenders attach electronic devices...
After a ransomware cyberattack on its internal information-technology systems, D-BOX Technologies Inc. says it is progressively resuming operations, with restoration...
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future...
Mobile camera-based application that attempts to alter photos to preserve their utility to humans while making them unusable for facial...
Experts spotted a new strain of Android banking Trojan dubbed Vultur that uses screen recording and keylogging for the capturing...
Researcher published an exploit code for a high-severity privilege escalation flaw (CVE-2021-3490) in Linux kernel eBPF on Ubuntu machines. The...
Summary: contrib/slapd-modules/nops/nops.c in OpenLDAP through 2.4.45, when both the nops module and the memberof overlay are enabled, attempts to free...
Summary: SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3...
Summary: SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3...
Summary: ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that...
Summary: A heap buffer overflow vulnerability in msadpcm_decode_block of libsndfile 1.0.30 allows attackers to execute arbitrary code via a crafted...
LemonDuck has evolved from a Monero cryptominer into LemonCat, a Trojan that specializes in backdoor installation, credential and data theft,...
Social engineering attacks have been a longstanding concern for both individuals and organizations alike. The trend, as we know it,...
Computer science student Augusto Zanellato has earned a $50,000 payday following the discovery of a publicly available GitHub Personal Access...
RiskIQ's research team has evaluated the familiar fingerprints campaign in dangerous infrastructure from famous malware families. Their examination of Agent...
Attackers' evasive methods stretch back to the times when base64 and other popular encoding schemes were utilized. New Linux shell script...
As part of a fresh campaign that began in May 2021, an Android malware that was discovered misusing accessibility features...