Aggregator
CWE top 25 most dangerous software weaknesses
The CWE list of the 25 most dangerous software weaknesses demonstrates the currently most common and impactful software flaws. Identifying the root causes of these vulnerabilities provides insights to shape investments, policies, and practices that proactively prevent their occurrence. The CWE top 25 most dangerous software weaknesses list was calculated by analyzing public vulnerability information in Common Vulnerabilities and Exposures (CVE) Records for CWE root cause mappings. This year’s dataset included 31,770 CVE Records for … More →
The post CWE top 25 most dangerous software weaknesses appeared first on Help Net Security.
CVE-2024-48533 | eSoft Planner 3.24.08271-USA information disclosure
Resilient Internet connectivity in Europe mitigates impact from multiple cable cuts
CVE-2024-48981 | MBed OS 6.16.0 HCI Packet buffer overflow
CVE-2024-48985 | MBed OS 6.16.0 HCI Packet buffer overflow
CVE-2024-48982 | MBed OS 6.16.0 HCI Parsing buffer overflow
CVE-2024-48983 | MBed OS up to 6.16.0 HCI Packet WsfMsgAlloc buffer overflow
CVE-2024-52702 | MyBB 1.8.38 install\index.php Website Name cross site scripting (Issue 4859)
悬赏400万美元,全球最大规模”零日探索”计划启动;墨西哥政府网站被勒索软件组织攻陷,313GB敏感政务数据或被公开 | 牛览
27天!揭秘身份管理中凭证修复为何如此艰难?
CVE-2024-10796 | ifso If-So Dynamic Content Personalization Plugin up to 1.9.2.1 on WordPress Shortcode ifso-show-post information disclosure
CVE-2024-10623 | EngineThemes ForumEngine Theme up to 1.8 on WordPress cross site scripting
CVE-2024-48986 | Mbed OS 6.16.0 HCI Parsing buffer overflow
CVE-2024-45663 | IBM DB2/DB2 Connect Server 11.1/11.5 Query denial of service
中国银联执行副总裁涂晓军:深耕行业、促进融合 共谱数字金融新乐章
Ford data breach involved a third-party supplier
Five members of Scattered Spider cybercrime group charged for breaches, theft of $11 million
Phobos ransomware indictment sheds light on long-running, quietly successful scheme
Ghost Tap Attack, Hackers Stolen Credit Card Linked To Google Pay Or Apple Pay
Threat actors are exploiting a new cash-out tactic called “Ghost Tap” to siphon funds from stolen credit card details linked to mobile payment services like Google Pay or Apple Pay, which involves relaying NFC traffic, enabling unauthorized transactions without physical access to the victim’s device. By understanding this emerging threat, financial institutions can enhance their […]
The post Ghost Tap Attack, Hackers Stolen Credit Card Linked To Google Pay Or Apple Pay appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.