Aggregator
CVE-2024-7150 | 10web Slider Plugin up to 1.2.57 on WordPress id sql injection
警惕量子计算基础设施成为网络攻击的目标
JFrog Artifactory 缺陷导致软件供应链易受缓存投毒攻击
奇安信中标某大型国有银行开源组件评估项目
CVE-2024-21302 | Microsoft Windows up to Server 2022 23H2 Secure Kernel Mode access control
CVE-2024-41912 | HP Poly Clariti Manager up to 10.10.2.2 access control
CVE-2024-38202 | Microsoft Windows up to Server 2022 23H2 Update Stack access control
NASA 考虑用 SpaceX 飞船搭救波音 Starliner 宇航员
CVE-2024-6890 | Journyx jtime 11.5.4 hard-coded key
CVE-2024-6892 | Journyx jtime 11.5.4 Link cross site scripting
CVE-2024-6707 | Open WebUI 0.1.105 path traversal
CVE-2024-6891 | Journyx jtime 11.5.4 Login Flow code injection
CVE-2024-6893 | Journyx jtime 11.5.4 API soap_cgi.pyc xml external entity reference
CVE-2024-6706 | Open WebUI 0.1.105 cross site scripting
Rhysida Ransomware group claims to have breached Bayhealth Hospital in Delaware
一站式方案!巡哨全面接入“两高一弱”专项风险监测
GhostWrite Vulnerability Let Hackers Read & Write Any Part of The Computer’s Memory
A group of cybersecurity researchers at CISPA Helmholtz Center for Information Security recently identified three major security vulnerabilities in five commercial RISC-V CPUs, including GhostWrite, which allows an attacker to write arbitrary data from unprivileged states into any physical memory location. GhostWrite is an unprivileged instruction sequence that allows attackers to write to chosen physical […]
The post GhostWrite Vulnerability Let Hackers Read & Write Any Part of The Computer’s Memory appeared first on Cyber Security News.
Windows Zero-day Flaw Let Hackers Downgrade Fully Updated Systems to Old Vulnerabilities
Every software and operating system vendor has been implementing security measures to protect their products. This is because threat actors require a lot of time to find a zero-day but less time to find a readily available exploit for vulnerable software. This led them to the thought that they should Downgrade the latest versions to […]
The post Windows Zero-day Flaw Let Hackers Downgrade Fully Updated Systems to Old Vulnerabilities appeared first on Cyber Security News.