TeamsUserEnum – User Enumeration With Microsoft Teams API
Sometimes user enumeration could be sometimes useful during the reconnaissance of an assessment. This tool will determine if an email...
Sometimes user enumeration could be sometimes useful during the reconnaissance of an assessment. This tool will determine if an email...
Summary: Exim 4 before 4.94.2 allows Out-of-bounds Write because the main function, while setuid root, copies the current working directory...
Summary: There's a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file...
Summary: LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4_write32 (related to LZ4_compress_destSize), affecting applications that call LZ4_compress_fast with...
Summary: Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When...
Summary: curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS...
In August 2019, Audio USA suffered a data breach after a vendor left data unsecured and exposed on the internet....
Doxing (or doxxing) is in the news again, for an absolutely shocking story that ended with a man’s death caused...
A very serious security flaw in immensely popular printer drivers has been disclosed and it could affect many millions of...
On July 18, a group of 17 newspaper and media organizations—aided by Amnesty International’s Security Lab and the research group...
A citizen of Sweden was sentenced to 15 years in prison for manipulating a cryptocurrency scam claiming to pay investors...
On Saturday 10th of July, just after a cyber interruption in IRNA's computing devices, the official IRNA media outlet announced...
Smartphones, unlike PCs, involve a range of radios – generally cellular, Wi-Fi, Bluetooth, and Near Field Communication (NFC) – that...
The case of the infamous spyware Pegasus has taken the world by storm, with news revealing its unlawful use infringing...
Have you ever wanted a simple, easy and stealth bypass for multiple classes of security products? pstf^2 (pronounced pstf-square) is...
Beanshooter is a command line tool written in Java, which helps to identify common vulnerabilities on JMX endpoints.IntroductionJMX stands for...
Researchers from threat intelligence firm Group-IB helps Dutch police identify members of phishing developer gang known as Fraud Family. Group-IB,...
U.S. CISA released an alert today about several stealth malware samples that were found on compromised Pulse Secure devices. The...
A database belonging to TicketClub Italy, a company providing coupons platform for offline purchases, is available for sale on darkweb...
Experts found a DB containing sensitive health insurance data belonging to customers of US insurance giant Humana. An SQL database...
French cyber-security agency ANSSI warned of an ongoing cyberespionage campaign aimed at French organizations carried out by China-linked APT31 group....
Summary: Raw Image Extension Remote Code Execution Vulnerability Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34521 CVSS Score (if available) v2: / MEDIUM v3:...
Summary: Microsoft Defender Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34464. Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34522 CVSS Score...
Summary: Windows DNS Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-33746, CVE-2021-33754, CVE-2021-33780, CVE-2021-34494. Reference Links(if...