Aggregator
CVE-2024-42272 | Linux Kernel up to 6.1.103/6.6.44/6.10.3 rhashtable.h rhashtable_lookup initialization (Nessus ID 208245)
CVE-2024-38577 | Linux Kernel up to 6.1.92/6.6.32/6.8.11/6.9.2 rcu-tasks show_rcu_tasks_trace_gp_kthread buffer overflow (Nessus ID 208245)
CVE-2024-42259 | Linux Kernel up to 6.6.45/6.10.4 i915 memory corruption (4b09513ce93b/ead9289a51ea/8bdd9ef7e9b1 / Nessus ID 208245)
CVE-2024-41011 | Linux Kernel up to 6.1.90/6.6.30/6.8.9 amdkfd calculation (Nessus ID 208245)
CVE-2021-3669 | Linux Kernel Shared Memory Page resource consumption (Nessus ID 208245)
CVE-2024-9114 | FastStone Image Viewer GIF File Parser out-of-bounds write (ZDI-24-1275 / Nessus ID 208256)
CVE-2021-26236 | FastStone Image Viewer up to 7.5 CUR File BitCount buffer overflow (EDB-49660 / Nessus ID 208258)
CVE-2021-26237 | FastStone Image Viewer up to 7.5 CUR File FSViewer.exe memory corruption (Nessus ID 208258)
CVE-2022-36947 | FastStone Image Viewer up to 7.5 PNG tRNS Chunk Parser stack-based overflow (WID-SEC-2022-0883 / Nessus ID 208258)
Likho Hackers Using MeshCentral For Remotely Managing Victim Systems
The Awaken Likho APT group launched a new campaign in June of 2024 with the intention of targeting Russian government agencies and businesses by targeting them. The group has abandoned its previous use of the UltraVNC module for remote access and adopted the MeshCentral agent instead, which highlights its adaptability and continuous efforts to evade […]
The post Likho Hackers Using MeshCentral For Remotely Managing Victim Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
人工智能生成和人为制造的错误信息扭曲气象灾害真实情况
美国最大的上市水务公司 American Water 遭遇网络攻击,门户和计费业务受到干扰
CVE-2003-0831 | ProFTPD up to 1.2.9 Rc2 ASCII Mode data_xfer memory corruption (EDB-107 / Nessus ID 14077)
CVE-2022-29727 | Survey Sparrow Enterprise Survey Software 2022 Signup cross site scripting (EDB-50937)
怎么正确安装vgcore.dll以解决程序崩溃?vgcore.dll安装步骤详解
Java 代码审计工具推荐
Cloud Security Assessment: Checklist to Ensure Data Protection
The adoption of cloud computing has become a cornerstone of modern business operations today. However, this shift brings forth significant concerns about data protection and security. Cloud security assessment plays a crucial role in safeguarding sensitive information and ensuring compliance with industry regulations. Organizations must prioritize this process to identify vulnerabilities, mitigate risks, and establish […]
The post Cloud Security Assessment: Checklist to Ensure Data Protection appeared first on Security Boulevard.