CVE-2022-1993

This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will b ...

Continue Reading
CVE-2022-31038

This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will b ...

Continue Reading
CVE-2022-1992

This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will b ...

Continue Reading
CVE-2022-1986

This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will b ...

Continue Reading
CVE-2022-30882

pyanxdns package in PyPI version 0.2 is vulnerable to code execution backdoor. The impact is: execute arbitrary code (remote). When installing the pyanxdns package of version 0.2, the request package ...

Continue Reading
AutoPWN Suite – Project For Scanning Vulnerabilities And Exploiting Systems Automatically

[![](https://blogger.googleusercontent.com/img/a/AVvXsEhjTayZlPb6iJTaFuvS67_58lpU1-HTXZ6RgNNu4ufeETtb47TqydYCoerWh0c4zUH2yauB9rSeE3hRO3BkZGs2ilX9pZLliPk1iFzI-IxYT2uKAyCIr6uJKt5Rj8_bck8nNEWBBhCCBsVOS-U ...

Continue Reading
CVE-2021-40592

GPAC version before commit 71460d72ec07df766dab0a4d52687529f3efcf0a (version v1.0.1 onwards) contains loop with unreachable exit condition ('infinite loop') vulnerability in ISOBMFF reader filter, iso ...

Continue Reading
CVE-2022-30877

The keep for python, as distributed on PyPI, included a code-execution backdoor inserted by a third party. The current version, without this backdoor, is 1.2.Read More ...

Continue Reading

Back to Main

Subscribe for the latest news: