Aggregator
Лягушонок Пепе и 20 млн сюрпризов: ловушка для криптокошельков
1 year 3 months ago
NFT-дрейнеры похищают криптовалюту через коллекционные подарки.
AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV
1 year 3 months ago
Amazon Web Services (AWS) has issued a critical security advisory highlighting vulnerabilities in specific versions of its native clients for Amazon WorkSpaces, Amazon AppStream 2.0, and Amazon NICE DCV. Identified as CVE-2025-0500 and CVE-2025-0501, these vulnerabilities present significant risks, compelling AWS to recommend urgent updates to protect user data. Overview of the Vulnerabilities CVE-2025-0500 CVE-2025-0500 […]
The post AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Divya
Microsoft estende Administrator Protection agli utenti Insider
1 year 3 months ago
Komt er oorlog dan moét Defensie kunnen rekenen op maatschappij
1 year 3 months ago
“Wat kunt u doen voor de krijgsmacht?” Dat is volgens minister Ruben Brekelmans de vraag waar het nu om draait. Terwijl dit nog niet zo lang geleden juist andersom was “wat kan de krijgsmacht voor u doen”. Brekelmans zei dit vandaag via video op het zogeheten Mauritssymposium in Utrecht. Dat ging over de noodzaak van een weerbare samenleving. Overheid en bedrijfsleven bespraken hoe die samen te vergroten.
CVE-2011-5074 | Sitracker Support Incident Tracker up to 3.62 user_profile_edit.php cross-site request forgery (EDB-18444 / SA46019)
1 year 3 months ago
A vulnerability, which was classified as problematic, was found in Sitracker Support Incident Tracker up to 3.62. This affects an unknown part of the file user_profile_edit.php. The manipulation leads to cross-site request forgery.
This vulnerability is uniquely identified as CVE-2011-5074. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
vuldb.com
Python-Based Bots Exploiting PHP Servers Fuel Gambling Platform Proliferation
1 year 3 months ago
Cybersecurity researchers have exposed a new campaign that targets web servers running PHP-based applications to promote gambling platforms in Indonesia.
"Over the past two months, a significant volume of attacks from Python-based bots has been observed, suggesting a coordinated effort to exploit thousands of web apps," Imperva researcher Daniel Johnston said in an analysis. "These attacks
The Hacker News
Python-Based Bots Exploiting PHP Servers Fuel Gambling Platform Proliferation
1 year 3 months ago
Cybersecurity researchers have exposed a new campaign that targets web servers running PHP-based ap
Yahoo Japan Enforces DMARC Adoption for Users in 2025
1 year 3 months ago
As the new year kicks off, it brings in positive news in the email security industry from aroun
CVE-2003-1162 | Tritanium Bulletin Board 1.2.3 index.php thread_id/forum_id/sid privileges management (EDB-23319 / XFDB-13587)
1 year 3 months ago
A vulnerability was found in Tritanium Bulletin Board 1.2.3 and classified as critical. Affected by this issue is some unknown functionality of the file index.php. The manipulation of the argument thread_id/forum_id/sid leads to improper privilege management.
This vulnerability is handled as CVE-2003-1162. The attack may be launched remotely. Furthermore, there is an exploit available.
vuldb.com
李宗仁回忆录
1 year 3 months ago
为完成国家最后统一作出有用的贡献
李宗仁回忆录
1 year 3 months ago
2025.1.17八十年代还是开明得多,广西人民出版社未加删改地公开出版了《李宗仁回忆录》。摘录1981年再版前言如下:《李宗仁回忆录》是李宗仁先生寄居美国期间,与唐德刚博士合作,由李宗仁口述、唐德刚
Weekly IT Vulnerability Report: Critical Updates for SAP, Microsoft, Fortinet, and Others
1 year 3 months ago
This week, key vulnerabilities in SAP, Microsoft, Fortinet, Ivanti, and others demand imm
Abandoned Online Domains Unlock Services With Google OAuth
1 year 3 months ago
Google Says Platforms Shouldn't Use Emails as Unique Identifiers
A security researcher purchased abandoned online domains belonging to failed startups and found he could recreate email addresses and access third party services containing sensitive information collected by the shuttered companies by signing onto the platforms using "Sign in with Google."
A security researcher purchased abandoned online domains belonging to failed startups and found he could recreate email addresses and access third party services containing sensitive information collected by the shuttered companies by signing onto the platforms using "Sign in with Google."
i finally knew how to gin access a scammer's computer, but how to get every single info about then, like the name, there ip address, there personal phone number, you name it
1 year 3 months ago
CVE-2024-12142 | Schneider Electric Modicon M340 Processors information disclosure (SEVD-2025-014-05)
1 year 3 months ago
A vulnerability, which was classified as critical, was found in Schneider Electric Modicon M340 Processors, BMXNOE0100, BMXNOE0110 and BMXNOR0200H. Affected is an unknown function. The manipulation leads to information disclosure.
This vulnerability is traded as CVE-2024-12142. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
vuldb.com
CVE-2024-12703 | Schneider Electric RemoteConnect and SCADAPack x70 Utilities deserialization (SEVD-2025-014-06)
1 year 3 months ago
A vulnerability has been found in Schneider Electric RemoteConnect and SCADAPack x70 Utilities and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to deserialization.
This vulnerability is known as CVE-2024-12703. An attack has to be approached locally. There is no exploit available.
It is recommended to apply a patch to fix this issue.
vuldb.com
CVE-2024-10498 | Schneider Electric PowerLogic HDPM6000 up to 0.62.7 memory corruption (SEVD-2025-014-08)
1 year 3 months ago
A vulnerability was found in Schneider Electric PowerLogic HDPM6000 up to 0.62.7 and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to memory corruption.
This vulnerability is handled as CVE-2024-10498. The attack may be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
vuldb.com
CVE-2024-10497 | Schneider Electric PowerLogic HDPM6000 0.62.7 authorization (SEVD-2025-014-08)
1 year 3 months ago
A vulnerability was found in Schneider Electric PowerLogic HDPM6000 0.62.7. It has been classified as very critical. This affects an unknown part. The manipulation leads to authorization bypass.
This vulnerability is uniquely identified as CVE-2024-10497. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
vuldb.com
Help me see a private account !!
1 year 3 months ago