The VPN service in AVAST SecureLine before 5.6.4982.470 allows local users to write to arbitrary files via an Object Manager symbolic link …
Pligg 2.0.3 allows remote authenticated users to execute arbitrary commands because the template editor can edit any file, as demonstrated …
In wp-includes/comment-template.php in WordPress before 5.4.2, comments from a post or page could sometimes be seen in the latest comments …
A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to …
The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd …
These days just about everybody takes Bluetooth for granted. Manufacturers phase out useful physical ports like headset jacks in high end …
Remote working’s rapid growth is making endpoint security an urgent priority for all organizations today. Cloud-first deployment …
How to bypass censorship? It’s not as simple as it seems but researchers from the University of Maryland’s Computer Science Department …
Clockwise from top left: …
As the presidential election looms, Microsoft said on Thursday that Russia’s military intelligence hackers, often called Fancy Bear or …
130 accounts of high profile individuals were hacked resulting in attackers siphoning large amounts of cryptocurrencies from innocent …
Recently, the representatives of the ETERBASE has reported on the official Telegram channel of the portal that they have become a victim of …
●●●
NVD
EXPLOITS
SECURELIST