Data Breaches

Vulnerabilities

Information

Cyber Writeups

Latest Posts

View All Posts
CVE

AT Software Solutions ATSVD Login Endpoint login.aspx s...

A vulnerability was found in AT Software Solutions ATSVD up to 3.4.1. It has bee...

CVE

zj1983 zz SuperZ.java GetUserOrg sql injectionA vulnera...

A vulnerability classified as critical has been found in zj1983 zz up to 2024-08...

CVE

zj1983 zz cross-site request forgeryA vulnerability cla...

A vulnerability classified as problematic was found in zj1983 zz up to 2024-08. ...

CVE

Tenda AC6 WifiExtraSet stack-based overflowA vulnerabil...

A vulnerability, which was classified as critical, has been found in Tenda AC6 1...

CVE

pbrong hrms resource.go HrmsDB improper authorizationA ...

A vulnerability, which was classified as critical, was found in pbrong hrms up t...

CVE

FFmpeg IAMF File iamf_parse.c audio_element_obu memory ...

A vulnerability classified as problematic has been found in FFmpeg up to 6e26f57...

Cyber Attacks

Skype is Shutting Down on May 5th

In a move that could have been seen coming from at least a decade away, Microsof...

Cyber Attacks

“Some Assembly Required” Makes Us Love Things More

For the maker looking to turn their project into a business, trying to price you...

Malware

Wireshark 4.4.5 Released, (Sun, Mar 2nd)

Wireshark release 4.4.5 was released soon after 4.4.4 : it fixes a bug that make...

CVE

Pixsoft Sol Login Endpoint servlet sql injectionA vulne...

A vulnerability was found in Pixsoft Sol up to 7.6.6c and classified as critical...

CVE

Pixsoft Vivaz Login Endpoint servlet cross site scripti...

A vulnerability was found in Pixsoft Vivaz 6.0.11. It has been classified as pro...

Cyber Attacks

Using Four Rolls Of Film To Make One Big Photo

Typically, if you’re shooting 35 mm film, you’re using it in an old point-and-sh...

12

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.