Aggregator
CVE-2004-1018 | PHP up to 4.3.10/5.0.3 Safe-Mode realpath memory corruption (EDB-24854 / Nessus ID 18091)
White House Considers Oracle-Led Takeover of TikTok with U.S. Investors
In a significant development, the Trump administration is reportedly formulating a plan to prevent a nationwide ban on TikTok, involving Oracle and a consortium of private investors. Under the proposed arrangement, ByteDance, TikTok’s Chinese parent company, would retain a minority stake, while Oracle would oversee critical operations, including algorithm management, data collection, and software updates. […]
The post White House Considers Oracle-Led Takeover of TikTok with U.S. Investors appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
A Threat Actor Claims to have Leaked Sensitive Information of Pirelli Tire LLC
Finding the Right Partner for PCI DSS 4.0.1 Compliance: Requirements 6.4.3 and 11.6.1
by Source Defense Ensuring compliance with PCI DSS 4.0, specifically requirements 6.4.3 and 11.6.1, is not just about meeting regulations—it’s about securing your customers’ trust and protecting your brand from emerging threats like Magecart and eSkimming. Achieving this requires more than just technology; it requires a trusted partner who can navigate the complexities of compliance.
The post Finding the Right Partner for PCI DSS 4.0.1 Compliance: Requirements 6.4.3 and 11.6.1 appeared first on Source Defense.
The post Finding the Right Partner for PCI DSS 4.0.1 Compliance: Requirements 6.4.3 and 11.6.1 appeared first on Security Boulevard.
Clone2Leak attacks exploit Git flaws to steal credentials
Hidden Text Salting Disrupts Brand Name Detection Systems
Counter Claims to have Leaked the Data of Pt. Deen Dayal Upadhyay Management College (DDUMC)
CVE-2023-52292 | IBM Sterling File Gateway up to 6.1.2.5/6.2.0.3 Web UI cross site scripting
Critical Vulnerability in IBM Security Directory Enables Session Cookie Theft
IBM has announced the resolution of several security vulnerabilities affecting its IBM Security Directory Integrator and IBM Security Verify Directory Integrator products. The vulnerabilities, identified through the Common Vulnerabilities and Exposures (CVE) system, expose users to various risks, including sensitive data disclosure and potential cookie theft. The company urges customers to update to the latest […]
The post Critical Vulnerability in IBM Security Directory Enables Session Cookie Theft appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2024-22316 | IBM Sterling File Gateway up to 6.1.2.5/6.2.0.1 access control
CVE-2023-47159 | IBM Sterling File Gateway up to 6.1.2.5/6.2.0.1 observable response discrepancy
INC
CVE-2025-0754 | Red Hat OpenShift Service Mesh 2.5.6/2.6.3 Envoy Header Hander injection
Akira
CVE-2024-53263 | git-lfs Git LFS up to 3.6.0 URL injection (GHSA-q6r2-x2cc-vrp7 / Nessus ID 214502)
CVE-2024-45598 | Cacti up to 1.2.28 Setting Poller Standard Error Log Path path traversal
CVE-2024-37527 | IBM OpenPages with Watson 8.3/9.0 cross site scripting
CVE-2024-38325 | IBM Storage Defender up to 2.0.7 defender-sensor-cmd CLI missing encryption
Critical Apache Solr Vulnerability Grants Write Access to Attackers on Windows
A new security vulnerability has been uncovered in Apache Solr, affecting versions 6.6 through 9.7.0. The issue, classified as a Relative Path Traversal vulnerability, exposes Solr instances running on Windows to potential risks of arbitrary file path manipulation and write-access. Tracked as SOLR-17543, this vulnerability could permit attackers to exploit the “configset upload” API through […]
The post Critical Apache Solr Vulnerability Grants Write Access to Attackers on Windows appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.