Aggregator
Submit #397221: MiniCMS 1.11 RCE [Duplicate]
CVE-2007-2154 | Cabron Connector 1.1.0 inclusionService.php CabronServiceFolder file inclusion (EDB-3756 / XFDB-33716)
Submit #397220: MiniCMS 1.11 Arbitrary url jump [Duplicate]
GitHub Actions Vulnerable to Typosquatting, Exposing Developers to Hidden Malicious Code
Adventures in Shellcode Obfuscation! Part 12: Jigsaw
FreeBSD Gets €686,400 to Boost Security Features
CVE-2017-12989 | tcpdump up to 4.9.1 RESP Parser print-resp.c resp_get_length resource management (Nessus ID 103257 / ID 370625)
CVE-2024-25741 | Linux Kernel up to 6.7.4 f_printer.c printer_write Privilege Escalation
CVE-2024-25744 | Linux Kernel up to 6.6.6 VMM arch/x86/coco/tdx/tdx.c tdx_early_init/sme_early_init Privilege Escalation
CVE-2024-7211 | 1E Platform 8.4.1.229/23.7.1.80/23.11.1.15/24.7 redirect
CVE-2024-42252 | Linux Kernel up to 6.9.10 closures lib/closure.c denial of service (5d85f2ab79d5/339b84ab6b1d)
CVE-2024-42255 | Linux Kernel up to 6.10.0 tpm_buf_check_hmac_response null pointer dereference (b9afbb9a0c73/7dc357d343f1)
CVE-2024-42257 | Linux Kernel up to 6.10.0 ext4.h memtostr_pad null termination (4378be89ddb7/be27cd64461c)
CVE-2024-42254 | Linux Kernel up to 6.10.0 io_uring io_alloc_pbuf_ring null pointer dereference (68d19af95a35/bcc87d978b83)
CVE-2024-42256 | Linux Kernel up to 6.10.0 fs/smb/client/smb2ops.c cifs_prepare_write information disclosure (b1d0a566769b/de40579b9038)
BBTok Abuses Legitimate Windows Utility Command Tool to Stay Undetected
Cybercriminals in Latin America have increased their use of phishing scams targeting business transactions and judicial-related matters. By leveraging trust and fear, respectively, these attacks often involve malicious links or file attachments that lead to malware infections, which include common tactics like embedded links in emails directing users to fake websites and malicious PDF and […]
The post BBTok Abuses Legitimate Windows Utility Command Tool to Stay Undetected appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Predator Spyware Exploiting “one-click” & “zero-click” Flaws
Recent research indicates that the Predator spyware, once thought to be inactive due to US sanctions, has resurfaced with enhanced evasion techniques. Despite efforts to curb its use, Predator continues to be employed in countries like the DRC and Angola, targeting high-profile individuals. The spyware’s new infrastructure makes it harder to track victims, emphasizing the […]
The post Predator Spyware Exploiting “one-click” & “zero-click” Flaws appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.