Aggregator
CVE-2024-26596 | Linux Kernel up to 6.7.1 netdev_priv null pointer dereference (dbd909c20c11/844f104790bd / Nessus ID 213018)
CVE-2023-52778 | Linux Kernel up to 6.1.63/6.5.12/6.6.2 net/mptcp/protocol.c __mptcp_move_skbs_from_subflow+0x2604/0x26e0 memory corruption (Nessus ID 213018)
need help tracking
Over 300,000 Prometheus Servers Vulnerable to DoS Attacks Due to RepoJacking Exploit
The research identified vulnerabilities in Prometheus, including information disclosure from exposed servers, DoS risks from pprof endpoints, and potential code execution threats, which could lead to data breaches, system outages, and unauthorized access. Vulnerable Prometheus servers are exposed to internet risk exploitation by attackers, which includes a critical “RepoJacking” vulnerability, allowing malicious exporters to be […]
The post Over 300,000 Prometheus Servers Vulnerable to DoS Attacks Due to RepoJacking Exploit appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2024-11720 | shabti Frontend Admin Plugin up to 3.24.5 on WordPress cross site scripting
CVE-2024-11721 | shabti Frontend Admin Plugin up to 3.24.5 on WordPress privileges management
CVE-2024-31891 | IBM Storage Scale up to 5.1.9.6/5.2.1.1 unnecessary privileges
CVE-2024-31892 | IBM Storage Scale up to 5.1.9.6/5.2.1.1 GUI sql injection
CVE-2024-55557 | Weasis 4.5.1 hard-coded key
Reyee OS IoT Devices Compromised: Over-The-Air Attack Bypasses Wi-Fi Logins
Researchers discovered multiple vulnerabilities in Ruijie Networks’ cloud-connected devices. By exploiting these vulnerabilities, attackers can remotely compromise access points, gain unauthorized access to internal networks, and execute arbitrary code on affected devices. The “Open Sesame” attack demonstrates a practical scenario where an attacker can leverage physical proximity to a Ruijie Reyee OS access point to […]
The post Reyee OS IoT Devices Compromised: Over-The-Air Attack Bypasses Wi-Fi Logins appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
New Android Banking Malware Attacking Indian Banks To Steal Login Credentials
Researchers have discovered a new Android banking trojan targeting Indian users, and this malware disguises itself as essential utility services to trick users into providing sensitive information. The malware has already compromised 419 devices, intercepted 4,918 SMS messages, and stolen 623 banking credentials. As this active campaign continues, the number of affected devices and stolen […]
The post New Android Banking Malware Attacking Indian Banks To Steal Login Credentials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
New Research Uncovered Dark Internet Service Providers Used For Hacking
Bulletproof hosting services, a type of dark internet service provider, offer infrastructure to cybercriminals, facilitating malicious activities like malware distribution, hacking attacks, fraudulent websites, and spam. These services evade legal scrutiny, posing a significant challenge to global cybersecurity. Understanding and identifying bulletproof hosting networks is crucial for cybersecurity researchers, law enforcement agencies, and enterprises. By […]
The post New Research Uncovered Dark Internet Service Providers Used For Hacking appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.