or

WhatsApp Axes COVID-19 Mass Message Forwarding




or

Linux/x86 Random Bytes Encoder + XOR/SUB/NOT/ROR execve(/bin/sh) Shellcode

114 bytes small Linux/x86 random bytes encoder and XOR/SUB/NOT/ROR execve(/bin/sh) shellcode.




or

Dynamic MessageBoxA||W PEB And Import Table Method Shellcode

232 bytes small Dynamic MessageBoxA||W PEB and Import Table Method shellcode.




or

Linux/x86 Reboot Polymorphic Shellcode

26 bytes small Linux/x86 reboot polymorphic shellcode.




or

Linux Password Protected Bindshell Shellcode

272 bytes small Linux/x86_64 null free password protected bindshell shellcode.











or

Google's Bug Bounty Program Just Had A Record-Breaking Year Of Payouts






or

Google Launches Coronavirus Website In The United States




or

Google Data Shines Light On Whether Coronavirus Lockdowns Worldwide Are Working





or

Huawei HG255 Directory Traversal

This Metasploit module exploits a directory traversal in Huawei HG255.




or

Lotus Core CMS 1.0.1 Local File Inclusion

Lotus Core CMS version 1.0.1 suffers from a local file inclusion vulnerability.




or

DotNetNuke CMS 9.4.4 Zip Directory Traversal

DotNetNuke CMS version 9.4.4 suffers from zip split issue where a directory traversal attack can be performed to overwrite files or execute malicious code.




or

PHPKB Multi-Language 9 Authenticated Directory Traversal

PHPKB Multi-Language 9 suffers from an authenticated directory traversal vulnerability.




or

Jinfornet Jreport 15.6 Directory Traversal

Jinfornet Jreport version 15.6 suffers from an unauthenticated directory traversal vulnerability.




or

Joomla Fabrik 3.9.11 Directory Traversal

Joomla Fabrik component version 3.9.11 suffers from a directory traversal vulnerability.




or

Zen Load Balancer 3.10.1 Directory Traversal

Zen Load Balancer version 3.10.1 suffers from a directory traversal vulnerability. This finding was originally discovered by Cody Sixteen.




or

TVT NVMS 1000 Directory Traversal

TVT NVMS 1000 suffers from a directory traversal vulnerability.




or

Booked Scheduler 2.7.7 Directory Traversal

Booked Scheduler version 2.7.7 suffers from an authenticated directory traversal vulnerability.




or

Angry Romanian Hackers Deface Telegraph For Top Gear Toss










or

Memorial Web Site Script Password Reset / Insecure Cookie

Memorial Web Site Script suffers from password reset and insecure cookie handling vulnerabilities.




or

Tornado 1.0 Insecure Cookie

Tornado version 1.0 suffers from an insecure cookie vulnerability.




or

Aleza Portal 1.6 Insecure Cookie

Aleza Portal version 1.6 suffers from an insecure cookie handling vulnerability that allows for SQL injection.




or

PHP Hosting Directory 2.0 Insecure Cookie

PHP Hosting Directory version 2.0 suffers from an insecure cookie vulnerability that allows for administrative bypass.




or

PHPDirector 0.30 Insecure Cookie Handling

PHPDirector version 0.30 suffers from an insecure cookie handling vulnerability that allows for privilege escalation.




or

NICE Recording eXpress 6.x Root Backdoor / XSS / Bypass

NICE Recording eXpress versions 6.0.x, 6.1.x, 6.2.x, 6.3.x, and 6.5.x suffer from cross site scripting, root backdoor, unauthenticated access, fail authorization, insecure cookie handling, and remote SQL injection vulnerabilities.




or

Red Hat Security Advisory 2020-1975-01

Red Hat Security Advisory 2020-1975-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability.




or

Red Hat Security Advisory 2020-1979-01

Red Hat Security Advisory 2020-1979-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability.




or

Red Hat Security Advisory 2020-1978-01

Red Hat Security Advisory 2020-1978-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability.




or

Red Hat Security Advisory 2020-1980-01

Red Hat Security Advisory 2020-1980-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability.




or

Red Hat Security Advisory 2020-1422-01

Red Hat Security Advisory 2020-1422-01 - This release of Red Hat build of Eclipse Vert.x 3.9.0 includes security updates, bug fixes, and enhancements. For more information, see the release notes page listed in the References section.