Aggregator
CVE-2025-0754 | Red Hat OpenShift Service Mesh 2.5.6/2.6.3 Envoy Header Hander injection
Akira
CVE-2024-53263 | git-lfs Git LFS up to 3.6.0 URL injection (GHSA-q6r2-x2cc-vrp7 / Nessus ID 214502)
CVE-2024-45598 | Cacti up to 1.2.28 Setting Poller Standard Error Log Path path traversal
CVE-2024-37527 | IBM OpenPages with Watson 8.3/9.0 cross site scripting
CVE-2024-38325 | IBM Storage Defender up to 2.0.7 defender-sensor-cmd CLI missing encryption
Critical Apache Solr Vulnerability Grants Write Access to Attackers on Windows
A new security vulnerability has been uncovered in Apache Solr, affecting versions 6.6 through 9.7.0. The issue, classified as a Relative Path Traversal vulnerability, exposes Solr instances running on Windows to potential risks of arbitrary file path manipulation and write-access. Tracked as SOLR-17543, this vulnerability could permit attackers to exploit the “configset upload” API through […]
The post Critical Apache Solr Vulnerability Grants Write Access to Attackers on Windows appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2024-38320 | IBM Storage Protect for Virtual Environments: Data Protection for VMware risky encryption
IntelBroker, EnergyWeaponUser, and Alex218 Claim to have Leaked the Data of Asia Recruit Malaysia
A Threat Actor Claims to have Leaked the Data of Lyca Mobile France
数世咨询祝您春节快乐,蛇年大吉!
Experimentum Crucis: как простой механик стал отцом клинических испытаний
DEF CON 32 – 3DU Homo ex Machina
Author/Presenter: Lacey Harbour
Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel.
The post DEF CON 32 – 3DU Homo ex Machina appeared first on Security Boulevard.
SecWiki News 2025-01-27 Review
更多最新文章,请访问SecWiki
A Threat Actor Claims to have Leaked the Data of Atlas Pakistan (Pvt.) Ltd
GitHub Vulnerability Exposes User Credentials via Malicious Repositories
A cybersecurity researcher recently disclosed several critical vulnerabilities affecting Git-related projects, revealing how improper handling of credential protocols can lead to sensitive data leaks. From GitHub Desktop to Git Credential Manager and Git LFS, these issues were uncovered during a routine bug-hunting session for the GitHub Bug Bounty program, resulting in the assignment of multiple […]
The post GitHub Vulnerability Exposes User Credentials via Malicious Repositories appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Critical Isolation Vulnerability in Intel Trust Domain Extensions Exposes Sensitive Data
Researchers from IIT Kharagpur and Intel Corporation have identified a significant security vulnerability in Intel Trust Domain Extensions (TDX), a foundational technology designed to ensure robust isolation between virtual machines (VMs) in secure environments. The study reveals that hardware performance counters (HPCs), meant for performance monitoring, can be exploited by Virtual Machine Managers (VMMs) to […]
The post Critical Isolation Vulnerability in Intel Trust Domain Extensions Exposes Sensitive Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.