Aggregator
CVE-2024-47582 | SAP NetWeaver AS JAVA 7.50 xml external entity reference
CVE-2024-47581 | SAP HCM S4GXX 101 Approve Timesheets authorization
CVE-2024-47576 | SAP Product Lifecycle Costing up to 4.7.0 uncontrolled search path
CVE-2024-32732 | SAP BusinessObjects Business Intelligence Platform 2025/ENTERPRISE 430 exposure of sensitive system information to an unauthorized control sphere
CVE-2024-37143 | Dell PowerFlex Appliance link following (dsa-2024-405)
CVE-2024-12174 | Tenable Security Center up to 6.4.x SMTP Server certificate validation (Nessus ID 212128)
CVE-2024-50625 | Digi ConnectPort LTS up to 1.4.11 HTTP POST Request unrestricted upload
CVE-2024-50628 | Digi ConnectPort LTS up to 1.4.11 improper authorization
Authorities Dismantled Hackers Who Stolen Millions Using AirBnB
An international cybercrime network responsible for stealing millions of euros across at least ten European countries has been dismantled in a joint operation by the Rotterdam Police Cybercrime Team and the Belgian police. The sophisticated criminal group employed phishing schemes and bank helpdesk fraud to exploit vulnerable victims, with call centers set up in luxury […]
The post Authorities Dismantled Hackers Who Stolen Millions Using AirBnB appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2024-10708 | System Dashboard Plugin up to 2.8.14 on WordPress path traversal
CVE-2024-54197 | SAP NetWeaver Administrator 7.50 System Overview server-side request forgery
CVE-2024-54151 | Directus up to 11.2.x information disclosure (GHSA-849r-qrwj-8rv4)
CVE-2024-47577 | SAP Commerce Cloud COM_CLOUD 2211/HY_COM 2205 Webservice API Endpoint cleartext transmission
CVE-2024-55638 | Drupal up to 7.101/10.2.10/10.3.8 dynamically-determined object attributes (sa-core-2024-008)
CVE-2024-55637 | Drupal up to 10.2.10/10.3.8/11.0.7 dynamically-determined object attributes (sa-core-2024-007)
CVE-2024-55636 | Drupal up to 10.2.10/10.3.8/11.0.7 dynamically-determined object attributes (sa-core-2024-006)
APT-C-53 Weaponizing LNK Files To Deploy Malware Into Target Systems
Gamaredon, a persistent threat actor since 2013, targets the government, defense, diplomacy, and media sectors of their victims, primarily through cyberattacks, to gain sensitive information and disrupt operations. It continues to employ sophisticated tactics, leveraging malicious LNK and XHTML files alongside intricate phishing schemes to carry out cyberattacks. Phishing emails with four distinct attack payloads […]
The post APT-C-53 Weaponizing LNK Files To Deploy Malware Into Target Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.