Type Confusion vulnerability in V8 in Google Chrome Desktop
Severity:Critical Date of Publish: 30th-Aug’24 Affected System Google Chrome prior to 128.0.6613.113 Summary A remote...
Severity:Critical Date of Publish: 30th-Aug’24 Affected System Google Chrome prior to 128.0.6613.113 Summary A remote...
Date of Publish:22nd Aug,2024 Severity : Critical Affected versions GHES include 3.13.0 to 3.13.2, 3.10.0...
Date of Publish:22nd Aug,2024 Severity : Critical Affected versions It impacts all versions of the...
What is Threat Modeling? It provides the software development team an attacker’s or hostile user’s...
OWASP Live CD Project https://www.owasp.org/index.php/Category:OWASP_Live_CD_Project Hiren Boot CD http://www.hiren.info/pages/bootcd BackTrack http://www.backtrack-linux.org/downloads/ Sumurai Live CD Project...
A PKI (public key infrastructure) enables users of a basically unsecure public network such as...
DNS is one of the fundamental building blocks of the Internet. It’s used any time you...
Severity- Critical Date of Publish: 21’Aug 2024 Title Product CVE-Details .Net .NET 6.0 CVE-2023-35390 CVE-2023-35391...
Introduction The Google Android mobile phone platform is one of the most anticipated smartphone operating...
Date of Publish :12-Aug-24 Severity: Zero Day Affected system: Chromium, Firefox, and Safari Non Affected...