Aggregator
CVE-2022-49286 | Linux Kernel up to 5.4.187/5.10.108/5.15.31/5.16.17/5.17.0 tpm-space.c try_get_ops tpm_mutex privilege escalation (Nessus ID 234545)
CVE-2022-49292 | Linux Kernel up to 5.17.0 vmalloc allocation of resources (Nessus ID 234545)
CVE-2022-49120 | Linux Kernel up to 5.10.110/5.15.33/5.16.19/5.17.2 pm8001_send_abort_all allocation of resources (Nessus ID 234545)
CVE-2022-49209 | Linux Kernel up to 5.4.188/5.10.109/5.15.32/5.16.18/5.17.1 net/core/stream.c tcp_bpf_sendmsg memory leak (Nessus ID 234545)
Node.js malvertising campaign targets crypto users
10.0 по шкале CVSS: как получить доступ к серверу Erlang без входа
CVE-2024-54808 | Netgear WNR854T 1.5.2 SetDefaultConnectionService stack-based overflow
CVE-2024-54809 | Netgear WNR854T 1.5.2 Header Parameter parse_st_header stack-based overflow
CVE-2025-3453 | Password Protected Plugin up to 2.7.7 on WordPress password_protected_cookie improper authentication
CVE-2025-3015 | Open Asset Import Library Assimp 5.4.3 ASE File ASELoader.cpp BuildUniqueRepresentation mIndices out-of-bounds (Issue 6021 / Nessus ID 233803)
CVE-2025-3016 | Open Asset Import Library Assimp 5.4.3 MDL File MDLMaterialLoader.cpp ParseTextureColorData mWidth/mHeight resource consumption (Issue 6022 / Nessus ID 233803)
八大年度奖项揭晓!2024 BSRC年度盛典沙龙圆满举办
八大年度奖项揭晓!2024 BSRC年度盛典沙龙圆满举办
Business Edge Observability Is the Rx
Model Context Protocol Flaw Allows Attackers to Compromise Victim Systems
A critical vulnerability in the widely adopted Model Context Protocol (MCP), an open standard for integrating generative AI (GenAI) tools with external systems, has exposed organizations to risks of data theft, ransomware, and unauthorized access. Security researchers demonstrated two proof-of-concept (PoC) attacks exploiting the flaw, raising alarms about emerging GenAI security challenges. What is MCP? […]
The post Model Context Protocol Flaw Allows Attackers to Compromise Victim Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
SafeLine Bot Management: Self-hosted alternative to Cloudflare
Modern websites are under constant pressure from automated traffic: scraping, credential stuffing, inventory hoarding, and other malicious bot behaviors. While Cloudflare Bot Management is a powerful cloud-native solution that leverages massive data and machine learning, not every organization wants to rely on a cloud proxy. For teams seeking data autonomy, self-hosted control, and enterprise-grade protection, SafeLine offers a compelling alternative. Cloudflare Bot Management: Cloud power with centralized control Cloudflare manages around 20% of all global … More →
The post SafeLine Bot Management: Self-hosted alternative to Cloudflare appeared first on Help Net Security.
China Plans Expanded Cybersecurity Cooperation with Russia
China has announced a significant step forward in its partnership with Russia, with plans to expand their cooperation in the field of cybersecurity. In an article published by Sputnik News, Chinese Ambassador to Russia Zhang Hanhui outlined Beijing’s intention to deepen its collaboration, emphasizing the shared importance both countries place on digital security and the […]
The post China Plans Expanded Cybersecurity Cooperation with Russia appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Submit #553722: Sourcecodester Web-based Pharmacy Product Management System v1.0 Unrestricted Upload [Accepted]
Ghost Ransomware Targets Organizations Across 70+ Countries
A new ransomware variant known as “Ghost” (also referred to as Cring) has emerged as a significant danger. Since its first appearance in 2021, the FBI and CISA have issued a joint advisory on February 2025, highlighting its growing menace, particularly after a sharp increase in attacks on critical infrastructure, healthcarbe facilities, and financial institutions […]
The post Ghost Ransomware Targets Organizations Across 70+ Countries appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.