Tag
The APT used DNS poisoning to install the Macma backdoor on targeted networks and then deliver malware to steal data via post-exploitation activity.
Linux DRM has drm_file_update_pid() call to get_pid() too late, which creates a race condition that can lead to use-after-free issue of a struct pid.
Devika version 1 suffers from a path traversal vulnerability.
e107 version 2.3.3 suffers from a cross site scripting vulnerability.
Codeprojects E-Commerce version 1.0 suffers from an ignored default credential vulnerability.
Blog Site version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Best Courier Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Appointment Scheduler version 4.0 suffers from an insecure direct object reference vulnerability.
Organizations in Kazakhstan are the target of a threat activity cluster dubbed Bloody Wolf that delivers a commodity malware called STRRAT (aka Strigoi Master). "The program selling for as little as $80 on underground resources allows the adversaries to take control of corporate computers and hijack restricted data," cybersecurity vendor BI.ZONE said in a new analysis. The cyber attacks employ
A list of topics we covered in the week of July 29 to August 4 of 2024