cybrmonk

cybrmonk

Last seen: 21 days ago

Member since Oct 9, 2023
 monk@cybrmonk.com

WP Directorybox Manager <= 2.5 - Authentication BypassT...

The WP Directorybox Manager plugin for WordPress is vulnerable to authentication...

DWT - Directory & Listing WordPress Theme <=3.3.4 - Aut...

The DWT - Directory & Listing WordPress Theme is vulnerable to Stored Cross-Site...

Jeff Dunham Finds A NOS 1958 Philco Predicta

When you see a ventriloquist like [Jeff Dunham], you probably expect to see him ...

Turn Your Phone into a POV Hologram Display

It seems obvious once you think about it, but if you can spin your cell phone an...

Crypto Wallet Scam: Not For Free, (Sat, Feb 8th)

I did some research into multisig wallets (cfr “Crypto Wallet Scam”), and discov...

IBM UrbanCode Deploy missing authenticationIBM DevOps D...

IBM DevOps Deploy 8.0 through 8.0.1.4, 8.1 through 8.1.0.0 and IBM UrbanCode Dep...

Software in Progress

Open source software can be fantastic. I run almost exclusively open software, a...

Freed At Last From Patents, Does Anyone Still Care Abou...

The MP3 file format was always encumbered with patents, but as of 2017, the last...

What Happens if this Hazardous Asteroid Hits Earth?

A 1,600-foot-wide asteroid has a 0.037% chance of impacting Earth on September 2...

RT-Thread lwp_syscall.c sys_thread_create information d...

A vulnerability classified as problematic was found in RT-Thread up to 5.1.0. Af...

Dreamvention Live AJAX Search Free live_search.searchre...

A vulnerability, which was classified as critical, has been found in Dreamventio...

Simple add pages or posts <= 2.0.0 - Authenticated (Adm...

The Simple add pages or posts plugin for WordPress is vulnerable to Stored Cross...

CoinRemitter sql injectionA vulnerability, which was cl...

A vulnerability, which was classified as critical, was found in CoinRemitter 0.0...

Retrotechtacular: Point-of-Sale Through the Years

In days gone by, a common retail hack used by some of the less honorable of our ...

A Programming Language for Building NES Games

Generally speaking, writing your own games for retro consoles starts with C code...

Malicious ML Models on Hugging Face Leverage Broken Pic...

Cybersecurity researchers have uncovered two malicious machine learning (ML) mod...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.