Aggregator
CVE-2024-57716 | trenoncourt AutoQueryable 1.7.0 Unselectable information disclosure
CVE-2025-26308 | libming 0.4.8 SWF File util/parser.c parseSWF_FILTERLIST memory leak (Issue 326)
CVE-2025-26309 | libming 0.4.8 SWF File util/parser.c parseSWF_DEFINESCENEANDFRAMEDATA memory leak (Issue 327)
CVE-2025-26305 | libming 0.4.8 SWF File util/parser.c parseSWF_SOUNDINFO memory leak (Issue 322)
CVE-2024-46869 | Linux Kernel up to 6.10.11/6.11.0 btintel_pcie allocation of resources (fa9e1c1b1f38/2b4545f08cc6/7ffaa2002518 / Nessus ID 216493)
CVE-2024-49862 | Linux Kernel up to 6.6.53/6.10.12/6.11.1 powercap get_rpi off-by-one (Nessus ID 216493)
CVE-2024-53069 | Linux Kernel up to 6.11.7 __scm null pointer dereference (3d36e2b1d803/ca61d6836e6f / Nessus ID 216493)
CVE-2024-50224 | Linux Kernel up to 6.6.59/6.11.6 spi_get_csgpiod null pointer dereference (e79c1f1c9100/89f74c968319/25f00a13dccf / Nessus ID 216493)
CVE-2024-53143 | Linux Kernel up to 6.11.10/6.12.1 fsnotify iput use after free (45a8f8232a49/83af1cfa10d9/21d1b618b6b9 / Nessus ID 216493)
CVE-2024-50221 | Linux Kernel up to 6.11.6 Vangogh vangogh_tables_init out-of-bounds write (f8fd9f0d57af/4aa923a6e640 / Nessus ID 216493)
CVE-2024-56674 | Linux Kernel up to 6.12.5 virtio_net dynamic_queue_limits.c netdev_tx_reset_queue use after free (Nessus ID 216493)
Guidance on securely configuring network protocols (ITSP.40.062)
Chinese Hackers Exploiting Check Point Firewall Vulnerability To Deploy Ransomware
A sophisticated cyber espionage campaign linked to Chinese state-aligned threat actors has targeted organizations across 15 countries using an updated variant of the Shadowpad malware to deploy previously undocumented ransomware. The attacks, analyzed by Trend Micro’s incident response team, exploit weak passwords and multi-factor authentication (MFA) bypass techniques to infiltrate Check Point firewall VPNs. Over […]
The post Chinese Hackers Exploiting Check Point Firewall Vulnerability To Deploy Ransomware appeared first on Cyber Security News.
Sophisticated Payment Card Skimming Campaign Conceals Itself by Leveraging Stripe API
by Source Defense A newly discovered payment card skimming campaign has emerged exhibiting a concerning level of sophistication and leveraging unique tactics that make detection highly challenging. The attack, identified by Source Defense researchers, employs an innovative technique that exploits Stripe’s deprecated API to verify card details before exfiltration – ensuring that only valid payment
The post Sophisticated Payment Card Skimming Campaign Conceals Itself by Leveraging Stripe API appeared first on Source Defense.
The post Sophisticated Payment Card Skimming Campaign Conceals Itself by Leveraging Stripe API appeared first on Security Boulevard.