
White Papers
Video
Cartoon Contest
Latest Comment: Whatever you do, make sure you don’t run over
Ctrl – Alt – Del
at the same time!
Current Issue
Flash Poll
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Bug Report
From DHS/US-CERT’s National Vulnerability Database
CVE-2021-32624
PUBLISHED: 2021-05-24
Keystone 5 is an open source CMS platform to build Node.js applications. This security advisory relates to a newly discovered capability in our query infrastructure to directly or indirectly expose the values of private fields, bypassing the configured access control. This is an access control relat…
CVE-2021-29300
PUBLISHED: 2021-05-24
The @ronomon/opened library before 1.5.2 is vulnerable to a command injection vulnerability which would allow a remote attacker to execute commands on the system if the library was used with untrusted input.
CVE-2021-32629
PUBLISHED: 2021-05-24
Cranelift is an open-source code generator maintained by Bytecode Alliance. It translates a target-independent intermediate representation into executable machine code. There is a bug in 0.73 of the Cranelift x64 backend that can create a scenario that could result in a potential sandbox escape in a…
CVE-2021-33502
PUBLISHED: 2021-05-24
The normalize-url package before 4.5.1, 5.x before 5.3.1, and 6.x before 6.0.1 for Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data: URLs.
CVE-2019-12348
PUBLISHED: 2021-05-24
An issue was discovered in zzcms 2019. SQL Injection exists in user/ztconfig.php via the daohang or img POST parameter.
The post Air India Confirms Data of 4.5M Travelers Compromised appeared first on Malware Devil.
https://malwaredevil.com/2021/05/24/air-india-confirms-data-of-4-5m-travelers-compromised/?utm_source=rss&utm_medium=rss&utm_campaign=air-india-confirms-data-of-4-5m-travelers-compromised
No comments:
Post a Comment