Browsing Category
Uncategorized
The Vulnerabilities of the Past Are the Vulnerabilities of the Future
Major software vulnerabilities are a fact of life, as illustrated by the fact that Microsoft has patched…
Necro Python Malware Upgrades Together with New Exploits and Crypto Mining…
New upgrades have been made to a new Python-based “self-replicating, polymorphic bot” called Necro in exactly…
The Vulnerabilities of the Past Are the Vulnerabilities of the Future
Major software vulnerabilities are a fact of life, as illustrated by the fact that Microsoft has patched…
Exim base64d Buffer Overflow
Exim versions prior to 4.90.1 remote buffer overflow proof of concept exploit. MD5 |…
Cisco SD-WAN vManage 19.2.2 Remote Root
Cisco SD-WAN vManage version 19.2.2 remote root shell proof of concept exploit that leverages multiple…
Gstreamer Matroska Demuxing Use-After-Free
Gstreamer suffers from a use-after-free vulnerability in Matroska demuxing. MD5 |…
Gitlab 13.9.3 Remote Code Execution
# Exploit Title: Gitlab 13.9.3 - Remote Code Execution (Authenticated)# Date: 02/06/2021# Exploit Author: enox#…
OneLogin Hack – Encrypted Data Compromised
The OneLogin hack is blowing up now it seems like whoever got access can also decrypt encrypted customer data…
Microsoft Azure Internet Utility Firewall (WAF) Launched
Not too lengthy after Amazon launched their cloud protection WAF the Microsoft Azure Internet Utility…