CVE-2021-40490
Summary: A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel through 5.13.13....
Summary: A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel through 5.13.13....
Summary: A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel through 5.13.13....
Summary: rConfig 3.9.6 is affected by SQL Injection. A user must be authenticated to exploit the vulnerability. If --secure-file-priv in...
Summary: In Apache Hadoop 3.2.0 to 3.2.1, 3.0.0-alpha1 to 3.1.3, and 2.0.0-alpha to 2.10.0, WebHDFS client might send SPNEGO authorization...
Summary: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could...
Summary: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could...
Summary: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could...
Summary: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could...
Summary: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could...
Summary: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could...
A simple pure-Python network packet sniffer. Packets are disassembled as they arrive at a given network interface controller and their...
The U.S. Treasury Department’s Financial Crimes Enforcement Network (FinCEN) linked roughly $5.2 billion worth of Bitcoin transactions to ransomware. The...
IT and consulting giant Accenture confirmed a data breach after the ransomware attack conducted by LockBit operators in August 2021....
crawlergo is a browser crawler that uses chrome headless mode for URL collection. It hooks key positions of the whole...
Cybersecurity provider Juniper Networks released more than 40 security advisories to address over 70 vulnerabilities that affect its solutions. Cybersecurity...
Summary: ogs_fqdn_parse in Open5GS 1.0.0 through 2.3.3 inappropriately trusts a client-supplied length value, leading to a buffer overflow. The attacker...
Summary: PCI devices with RMRRs not deassigned correctly Certain PCI devices in a system might be assigned Reserved Memory Regions...
Summary: IBM Sterling File Gateway 2.2.0.0 through 6.1.1.0 could allow a remote attacker to upload arbitrary files, caused by improper...
Summary: A Cross-Site Request Forgery (CSRF) vulnerability in webTareas version 2.4 and earlier allows a remote attacker to create a...
Summary: webTareas version 2.4 and earlier allows an authenticated user to arbitrarily upload potentially dangerous files without restrictions. This is...
A group of researchers from the Graz University of Technology and CISPA Helmholtz Center for Information Security devised a new...
NetworKit is an open-source tool suite for high-performance network analysis. Its aim is to provide tools for the analysis of...
You may often see .exe files but you may not know what they are. Is it the same as an...
A joint cybersecurity advisory published by US agencies revealed that three ransomware attacks on wastewater systems this year. A joint cybersecurity advisory published...