Aggregator
CVE-2024-8269 | MStore API Plugin up to 4.15.3 on WordPress User Registration improper authorization
CVE-2024-6544 | Custom Post Limits Plugin up to 4.4.1 on WordPress information disclosure
CVE-2024-8242 | MStore API Plugin up to 4.15.3 on WordPress unrestricted upload
Espionage Alert: Google Sheets Exploit For Malware Control
A Google Sheets exploit has recently been discovered by cybersecurity experts Proofpoint. As per the initial information, the platform is being leveraged as a command-and-control (C2) mechanism. In this article, we’ll look at what the Google Sheets exploit is about, which sectors are being targeted, and more. Let’s begin! Google Sheets Exploit: Initial Discovery The […]
The post Espionage Alert: Google Sheets Exploit For Malware Control appeared first on TuxCare.
The post Espionage Alert: Google Sheets Exploit For Malware Control appeared first on Security Boulevard.
CVE-2024-46711 | Linux Kernel up to 6.1.108/6.6.48/6.10.7 local_addr_used/add_addr_accepted Privilege Escalation
CVE-2024-46706 | Linux Kernel up to 6.6.47/6.10.6 fsl_lpuart serial_ctrl.c information disclosure (8eb92cfca6c2/3ecf625d4acb/dc98d76a15bc)
CVE-2024-46705 | Linux Kernel up to 6.10.6 DRM Privilege Escalation (b1c9fbed3884/c7117419784f)
CVE-2024-46704 | Linux Kernel up to 6.10.6 workqueue __flush_work information disclosure (91d09642127a/8bc35475ef1a)
CVE-2024-46710 | Linux Kernel up to 6.10.7 vmwgfx comparison (d5228d158e4c/aba07b9a0587)
CVE-2024-46709 | Linux Kernel up to 6.6.48/6.10.7 dma_buf buffer overflow (9a9716bbbf3d/5c12391ee1ab/50f119925091)
CVE-2024-46708 | Linux Kernel up to 6.10.7 x1e80100 state issue (0197bf772f65/d3692d95cc4d)
CVE-2024-46703 | Linux Kernel up to 6.10.6 8250_omap denial of service (321aecb079e9/0863bffda113)
CVE-2024-46702 | Linux Kernel up to 5.10.224/5.15.165/6.1.106/6.6.47/6.10.6 thunderbolt tb_disconnect_xdomain_paths Privilege Escalation
CVE-2024-46701 | Linux Kernel up to 6.10.6 libfs simple_dir_operations Privilege Escalation (308b4fc2403b/64a7ce76fb90)
Docker Desktop Vulnerabilities Let Attackers Execute Remote Code
Docker has addressed critical vulnerabilities in Docker Desktop that could allow attackers to execute remote code. These vulnerabilities, identified as CVE-2024-8695 and CVE-2024-8696, highlight the ongoing risks associated with software extensions and the importance of timely updates. CVE-2024-8695: Crafted Extension Description Vulnerability The first vulnerability, CVE-2024-8695, involves a flaw in handling crafted extension descriptions or […]
The post Docker Desktop Vulnerabilities Let Attackers Execute Remote Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.