Aggregator
CVE-2024-30282 | Adobe Animate up to 23.0.5/24.0.2 out-of-bounds write (apsb24-36)
CVE-2024-2361 | parisneo lollms-webui binding.py install_model path traversal
CVE-2024-30293 | Adobe Animate up to 23.0.5/24.0.2 stack-based overflow (apsb24-36)
CVE-2024-30294 | Adobe Animate up to 23.0.5/24.0.2 heap-based overflow (apsb24-36)
CVE-2024-30295 | Adobe Animate up to 23.0.5/24.0.2 null pointer dereference (apsb24-36)
CVE-2024-30297 | Adobe Animate up to 23.0.5/24.0.2 out-of-bounds write (apsb24-36)
CVE-2024-3851 | imartinez privategpt cross site scripting
CVE-2024-30283 | Adobe Framemaker up to 2020.5/2022.3 out-of-bounds (apsb24-37)
CVE-2024-30287 | Adobe Framemaker up to 2020.5/2022.3 out-of-bounds (apsb24-37)
CVE-2024-30286 | Adobe Framemaker up to 2020.5/2022.3 out-of-bounds (apsb24-37)
CVE-2002-0928 | Pirch IRC Client 98 Hyperlink memory corruption (EDB-21574 / XFDB-9409)
Phishing attacks & device code authentication abuse
CVE-2024-30288 | Adobe Framemaker up to 2020.5/2022.3 heap-based overflow (apsb24-37)
CVE-2024-30289 | Adobe Framemaker up to 2020.5/2022.3 stack-based overflow (apsb24-37)
FBI and DOJ seize $8.2 Million in romance baiting crypto fraud scheme
Lotus Blossom APT Exploits WMI for Post-Exploitation Activities
The Lotus Blossom Advanced Persistent Threat (APT) group, also known as Lotus Panda, Billbug, and Spring Dragon, has intensified its cyberespionage efforts with new variants of the Sagerunex backdoor. These developments highlight the group’s evolving tactics, including leveraging Windows Management Instrumentation (WMI) for post-exploitation activities and employing legitimate cloud services for command-and-control (C2) communications. The […]
The post Lotus Blossom APT Exploits WMI for Post-Exploitation Activities appeared first on Cyber Security News.
Experts warn of the new sophisticate Crocodilus mobile banking Trojan
Canadian Hacktivist and Alleged Anonymous Co-Founder Arrested for 2021 Texas GOP Website Hack
CISA Warns of ESURGE Malware Exploiting Ivanti RCE Vulnerability
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a Malware Analysis Report (MAR-25993211-r1.v1) detailing the exploitation of a critical vulnerability in Ivanti Connect Secure devices (CVE-2025-0282). This vulnerability allows attackers to gain unauthorized access and deploy sophisticated malware variants, including the newly identified RESURGE and SPAWNSLOTH. CISA’s analysis revealed that RESURGE operates as a […]
The post CISA Warns of ESURGE Malware Exploiting Ivanti RCE Vulnerability appeared first on Cyber Security News.