CVE-2018-14576
Summary: The mintTokens function of a smart contract implementation for SunContract, an Ethereum token, has an integer overflow via the...
Summary: The mintTokens function of a smart contract implementation for SunContract, an Ethereum token, has an integer overflow via the...
Summary: Wind River VxWorks 6.6, 6.7, 6.8, 6.9.3, 6.9.4, and Vx7 has Incorrect Access Control in IPv4 assignment by the...
Summary: Wind River VxWorks 6.6, 6.7, 6.8, 6.9 and vx7 has an array index error in the IGMPv3 client component....
Summary: Wind River VxWorks 6.9.4 and vx7 has a Buffer Overflow in the TCP component (issue 4 of 4). There...
Summary: Wind River VxWorks 6.6 through vx7 has Session Fixation in the TCP component. This is a IPNET security vulnerability:...
Summary: CVE-2021-39608 is an unrestricted file upload vulnerability impacting FlatCore-CMS version 2.0.7. An exploit was observed in open source and...
Last week on Malwarebytes Labs ProxyToken: another nail-biter from Microsoft ExchangeMacs turn on apps signed by Symantec, treat them as...
The growing threat of ransomware has been highlighted by NCC Group's Research Intelligence and Fusion Team (RIFT) analysis. Between January-March...
A critical remote code execution (RCE) flaw has been fixed in the popular NPM package "pac-resolver." Developer Tim Perry discovered the...
Various zero day vulnerabilities in home baby monitor could be compromised that lets threat actors hack into camera feed and...
Cybersecurity researchers from the Chinese information security firm Netlab Qihoo 360 reported that at the beginning of this year the...
MarkMonitor, a domain registrar, had left over 60,000 parked domains susceptible to domain hijacking.MarkMonitor, now part of Clarivate, is a...
LockBit 2.0 Ransomware NOTE: The information on this page is automated and scraped directly from the LockBit 2.0 Onion Dark...
LockBit 2.0 Ransomware NOTE: The information on this page is automated and scraped directly from the LockBit 2.0 Onion Dark...
LockBit 2.0 Ransomware NOTE: The information on this page is automated and scraped directly from the LockBit 2.0 Onion Dark...
LockBit 2.0 Ransomware NOTE: The information on this page is automated and scraped directly from the LockBit 2.0 Onion Dark...
marketocloud_logo NOTE: The information on this page is automated and scraped directly from the marketocloud Blog page and reposted here...
marketocloud_logo NOTE: The information on this page is automated and scraped directly from the marketocloud Blog page and reposted here...
marketocloud_logo NOTE: The information on this page is automated and scraped directly from the marketocloud Blog page and reposted here...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
PacketSifter is a tool to perform batch processing of PCAP data to uncover potential IOCs.Simply initializePacketSifter with your desired integrations...
OWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services,...
Netgear has released security updates to address high-severity vulnerabilities affecting several of its smart switches used by businesses. Netgear has...
Security researcher ValdikSS found malware preinstalled in four low-budget push-button mobile phones available for sale on Russian e-stores. A Russian...