Threat actors already hacked thousands of Palo Alto Networks firewalls exploiting recently patched zero-day vulnerabilities. Thousands of Palo Alto Networks firewalls have reportedly been compromised in attacks exploiting recently patched zero-day vulnerabilities (CVE-2024-0012 and CVE-2024-9474) in PAN-OS. CVE-2024-0012 is a vulnerability in Palo Alto Networks PAN-OS that allows unauthenticated attackers with network access to the management […]
由于微软修改了 Windows 11 的硬件需求,现有的 Windows 10 用户基本上无法直接升级到 Windows 11,而 Windows 10 即将于 2025 年 10 月终止支持,用户除非更换电脑,那么只剩下继续使用不再支持的操作系统(另一选择是安装 Linux 发行版),这将会增加他们的安全风险。微软对此的做法是用全屏广告不断轰炸用户,督促他们购买新 PC。
A vulnerability was found in techfyd Sky Addons for Elementor Plugin up to 2.6.1 on WordPress and classified as problematic. Affected by this issue is the function save_options. The manipulation leads to missing authorization.
This vulnerability is handled as CVE-2024-11601. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in AIPHONE IXG-2C7 and IXG-2C7-L up to 2.03 and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to insufficiently protected credentials.
This vulnerability is known as CVE-2024-47142. Access to the local network is required for this attack. There is no exploit available.
A vulnerability classified as problematic was found in bplugins Easy Twitter Feed Plugin up to 1.2.6 on WordPress. This vulnerability affects the function etf of the component Shortcode Handler. The manipulation leads to authorization bypass.
This vulnerability was named CVE-2024-10666. The attack can be initiated remotely. There is no exploit available.
A vulnerability classified as problematic has been found in techfyd Sky Addons for Elementor Plugin up to 2.6.2 on WordPress. This affects the function save_options. The manipulation leads to missing authorization.
This vulnerability is uniquely identified as CVE-2024-11104. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Palantir sls-oracle-sidecar up to 0.543.0. It has been rated as critical. Affected by this issue is some unknown functionality of the component Endpoint. The manipulation leads to sql injection.
This vulnerability is handled as CVE-2024-49588. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
Cybersecurity researchers have discovered two malicious packages uploaded to the Python Package Index (PyPI) repository that impersonated popular artificial intelligence (AI) models like OpenAI ChatGPT and Anthropic Claude to deliver an information stealer called JarkaStealer.
The packages, named gptplus and claudeai-eng, were uploaded by a user named "Xeroline" in November 2023, attracting