Aggregator
CVE-2023-29942 | llvm-project a0138390 LLVMVoidType memory corruption (Issue 59990)
CVE-2023-29963 | S-CMS 5.0 /admin/ajax.php Privilege Escalation
CVE-2023-30185 | Zhong Bang CRMEB up to 4.6.0 SystemAttachmentServices.php unrestricted upload
CVE-2023-30257 | FiiO M6 1.0.4 /proc/ftxxxx-debug buffer overflow
CVE-2023-30092 | SourceCodester Online Pizza Ordering System 1.0 QTY sql injection
Апдейт на $10000000: код DogWifTools стал ключом к кошелькам пользователей
Военные США и DeepSeek: запрет использования на фоне успехов R1
Операция Талант: полиция обезглавила сразу 4 хакерских форума
Italy’s Data Protection Authority Garante requested information from Deepseek
Italy’s Data Protection Authority Garante requested information from Deepseek
CVE-2020-29607 | Pluck CMS up to 4.7.13 unrestricted upload (EDB-49909)
125 000 багетов за непубликацию данных: как Hellcat глумится над своими жертвами
Cybercriminals Hijack Government Sites to Lauch Phishing Attacks
Cybersecurity researchers have identified a persistent trend in which threat actors exploit vulnerabilities in government websites to further phishing campaigns. Based on data spanning November 2022 through November 2024, malicious actors have misused numerous .gov top-level domains (TLDs) across more than 20 countries. Exploitation of Legitimate .Gov Domains While .gov domains are generally trusted by […]
The post Cybercriminals Hijack Government Sites to Lauch Phishing Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-0871 | Maybecms 1.2 Add Article index.php?u=article-edit data_info[content] cross site scripting
Hackers Can Exploit AI Platform to Achieve Root Access via RCE Vulnerability
In a critical development within the AI industry, researchers at Noma Security have disclosed the discovery of a high-severity Remote Code Execution (RCE) vulnerability in Lightning AI Studio, a widely adopted AI development platform. The vulnerability, assigned a CVSS score of 9.4, was found to enable attackers to execute arbitrary commands with root privileges, posing […]
The post Hackers Can Exploit AI Platform to Achieve Root Access via RCE Vulnerability appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.