
White Papers
Video

Latest Comment: “The truth behind Stonehenge….”

Current Issue


Flash Poll

Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.

Twitter Feed

Bug Report
From DHS/US-CERT’s National Vulnerability Database
CVE-2021-22114
PUBLISHED: 2021-03-01
Addresses partial fix in CVE-2018-1263. Spring-integration-zip, versions prior to 1.0.4, exposes an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So …
CVE-2021-25914
PUBLISHED: 2021-03-01
Prototype pollution vulnerability in ‘object-collider’ versions 1.0.0 through 1.0.3 allows attacker to cause a denial of service and may lead to remote code execution.
CVE-2020-36240
PUBLISHED: 2021-03-01
The ResourceDownloadRewriteRule class in Crowd before version 4.0.4, and from version 4.1.0 before 4.1.2 allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check.
CVE-2018-25004
PUBLISHED: 2021-03-01
A user authorized to performing a specific type of query may trigger a denial of service by issuing a generic explain command on a find query. This issue affects: MongoDB Inc. MongoDB Server v4.0 versions prior to 4.0.6; MongoDB Server v3.6 versions prior to 3.6.11.
CVE-2021-25829
PUBLISHED: 2021-03-01
An improper binary stream data handling issue was found in the [core] module of ONLYOFFICE DocumentServer v4.0.0-9-v5.6.3. Using this bug, an attacker is able to produce a denial of service attack that can eventually shut down the target server.
The post New Jailbreak Tool Works on Most iPhones appeared first on Malware Devil.
https://malwaredevil.com/2021/03/01/new-jailbreak-tool-works-on-most-iphones/?utm_source=rss&utm_medium=rss&utm_campaign=new-jailbreak-tool-works-on-most-iphones
No comments:
Post a Comment