CVE-2021-28375
Summary: An issue was discovered in the Linux kernel through 5.11.6. fastrpc_internal_invoke in drivers/misc/fastrpc.c does not prevent user applications from...
Summary: An issue was discovered in the Linux kernel through 5.11.6. fastrpc_internal_invoke in drivers/misc/fastrpc.c does not prevent user applications from...
Summary: Apache OFBiz 17.12.01 is vulnerable to Host header injection by accepting arbitrary host Reference Links(if available): https://s.apache.org/7sr1x https://lists.apache.org/thread.html/r5181b36218225447d3ce70891eeccfb6d6885309dffd7e0e59091817@%3Cuser.ofbiz.apache.org%3E https://lists.apache.org/thread.html/r907ce90745b52d2d5b6a815de03fd1d5f3831ab579a81d70cfda6f3d@%3Cuser.ofbiz.apache.org%3E...
Researchers discovered a certain malware that was so far unidentified which silently hijacked Facebook, Apple, Amazon, Google, and other web...
Some mobile service providers have eSIM-enabled cell phones which don't need an actual SIM card. They have a little chip...
Two Polish government websites were hacked to spread false information about a nuclear waste "leak" in neighboring Lithuania.The incident took...
The ransomware gang known as ‘REvil’ stole confidential files from computer giant Acer and demanded an unprecedented ransom of US$50...
Wales Police have warned residents of a new phone fraud in which criminals try to trick customers for hundreds of...
Creates a local or "reverse" Socks proxy using powershell. The local proxy is a simple Socks 4/5 proxy. The reverse...
Hosted Reverse Shell generator with a ton of functionality -- (great for CTFs) Hosted Instancehttps://revshells.com FeaturesGenerate common listeners and reverse...
Taiwanese multinational hardware and electronics corporation Acer was victim of a REvil ransomware attack, the gang demanded a $50,000,000 ransom. Taiwanese computer giant...
The Russian national who attempted to convince a Tesla employee to plant malware on Tesla systems has pleaded guilty. The U.S. Justice...
Cybersecurity experts warn of ongoing attacks aimed at exploiting a recently patched critical vulnerability in F5 BIG-IP and BIG-IQ networking...
Amazon Elastic Kubernetes Service (EKS), a platform which gives customers the ability to run Kubernetes apps in the AWS cloud...
Summary: Use after free in tab search in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit...
Summary: Use after free in Blink in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap...
Summary: Uninitialized data in PDFium in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to obtain potentially sensitive information...
Summary: An issue was discovered in the Linux kernel through 5.11.6. fastrpc_internal_invoke in drivers/misc/fastrpc.c does not prevent user applications from...
Summary: A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML external entity vulnerabilities similar CVE-2016-3720 also affects codehaus jackson-mapper-asl libraries but...
Researchers disrupted a newly documented Chinese-based malware called CopperStealer that, since significant countermeasures started in late January, infected up to...
There’s been a number of scams targeting fans of major upcoming video game releases over the last week or two....
Internet crime is ever present, and with the ongoing pandemic, levels of scams and fraud were exceptionally high in 2020....
Insider trading can be done more effectively now than ever before, due to a great extent to the continuing proliferation...
In the last decade, a promising trend - the Internet of Things - has been actively developing in the world....
Security researchers at Trend Micro found proof of malicious activity by ‘MuddyWater’ automatically programmed tool (APT) that has aimed at...