[![](https://blogger.googleusercontent.com/img/a/AVvXsEhjTayZlPb6iJTaFuvS67_58lpU1-HTXZ6RgNNu4ufeETtb47TqydYCoerWh0c4zUH2yauB9rSeE3hRO3BkZGs2ilX9pZLliPk1iFzI-IxYT2uKAyCIr6uJKt5Rj8_bck8nNEWBBhCCBsVOS-U ...
Continue Reading08 июня, 2022
GPAC version before commit 71460d72ec07df766dab0a4d52687529f3efcf0a (version v1.0.1 onwards) contains loop with unreachable exit condition ('infinite loop') vulnerability in ISOBMFF reader filter, iso ...
Continue Reading08 июня, 2022
The keep for python, as distributed on PyPI, included a code-execution backdoor inserted by a third party. The current version, without this backdoor, is 1.2.Read More ...
Continue Reading08 июня, 2022
ZAngband zangband-data 2.7.5 is affected by an integer underflow vulnerability in src/tk/plat.c through the variable fileheader.bfOffBits.Read More ...
Continue Reading08 июня, 2022
An issue was discovered in certain Verbatim drives through 2022-03-31. The security feature for lockout (e.g., requiring a reformat of the drive after 20 failed unlock attempts) does not work as speci ...
Continue Reading08 июня, 2022
An issue was discovered in certain Verbatim drives through 2022-03-31. Due to insufficient firmware validation, an attacker can store malicious firmware code for the USB-to-SATA bridge controller on t ...
Continue Reading08 июня, 2022
An issue was discovered in certain Verbatim drives through 2022-03-31. Due to the use of an insecure encryption AES mode (Electronic Codebook, aka ECB), an attacker may be able to extract information ...
Continue Reading08 июня, 2022
As a result of an observable discrepancy in returned messages, OPSWAT MetaDefender Core (MDCore) before 5.1.2 could allow an authenticated user to enumerate filenames on the server.Read More ...
Continue Reading08 июня, 2022
Back to Main