Aggregator
Смерть умного дома: FTC раскрывает главную угрозу 2024 года
8 months 3 weeks ago
Вы никогда не узнаете, сколько проживет ваше новое устройство.
CVE-2009-1500 | ProjectCMS 1.0 Beta index.php sn sql injection (EDB-8565 / BID-34767)
8 months 3 weeks ago
A vulnerability has been found in ProjectCMS 1.0 Beta and classified as critical. Affected by this vulnerability is an unknown functionality of the file index.php. The manipulation of the argument sn leads to sql injection.
This vulnerability is known as CVE-2009-1500. The attack can be launched remotely. Furthermore, there is an exploit available.
vuldb.com
CVE-2009-1506 | Intelliants eLitius 1.0 id sql injection (EDB-8563 / BID-34769)
8 months 3 weeks ago
A vulnerability classified as critical was found in Intelliants eLitius 1.0. Affected by this vulnerability is an unknown functionality. The manipulation of the argument id leads to sql injection.
This vulnerability is known as CVE-2009-1506. The attack can be launched remotely. Furthermore, there is an exploit available.
vuldb.com
CVE-2009-1550 | Zakkis ABC Advertise 1.0 Login admin.inc.php access control (EDB-8555 / XFDB-50183)
8 months 3 weeks ago
A vulnerability has been found in Zakkis ABC Advertise 1.0 and classified as problematic. This vulnerability affects unknown code of the file admin.inc.php of the component Login. The manipulation leads to improper access controls.
This vulnerability was named CVE-2009-1550. The attack can be initiated remotely. Furthermore, there is an exploit available.
vuldb.com
CVE-2009-2451 | Mim.infinix InfiniX 1.2.003 index.php sql injection (EDB-8558 / BID-34750)
8 months 3 weeks ago
A vulnerability has been found in Mim.infinix InfiniX 1.2.003 and classified as critical. This vulnerability affects unknown code of the file index.php. The manipulation leads to sql injection.
This vulnerability was named CVE-2009-2451. The attack can be initiated remotely. Furthermore, there is an exploit available.
vuldb.com
CVE-2009-1617 | Teraway LinkTracker 1.0 userid=1/lvl=1 improper authentication (EDB-8550 / BID-34735)
8 months 3 weeks ago
A vulnerability, which was classified as critical, was found in Teraway LinkTracker 1.0. This affects an unknown part. The manipulation of the argument userid=1/lvl=1 leads to improper authentication.
This vulnerability is uniquely identified as CVE-2009-1617. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
vuldb.com
CVE-2009-1618 | Teraway LiveHelp 2.0 pwd=/lvl=1/usr=/alias=admin/userid=1 improper authentication (EDB-8552 / BID-34735)
8 months 3 weeks ago
A vulnerability has been found in Teraway LiveHelp 2.0 and classified as critical. This vulnerability affects unknown code. The manipulation of the argument pwd=/lvl=1/usr=/alias=admin/userid=1 leads to improper authentication.
This vulnerability was named CVE-2009-1618. The attack can be initiated remotely. Furthermore, there is an exploit available.
vuldb.com
CVE-2009-1619 | Teraway FileStream 1.0 improper authentication (EDB-8551 / BID-34735)
8 months 3 weeks ago
A vulnerability was found in Teraway FileStream 1.0 and classified as critical. This issue affects some unknown processing. The manipulation leads to improper authentication.
The identification of this vulnerability is CVE-2009-1619. The attack may be initiated remotely. Furthermore, there is an exploit available.
vuldb.com
8 миллионов установок: как микрозаймы на Android стали глобальной угрозой безопасности
8 months 3 weeks ago
Мобильные приложения, которые превращают финансовую помощь в ночной кошмар.
Latest Multi-Stage Attack Scenarios with Real-World Examples
8 months 3 weeks ago
Multi-stage cyber attacks, characterized by their complex execution chains, are designed to avoid detection and trick victims into a false sense of security. Knowing how they operate is the first step to building a solid defense strategy against them. Let's examine real-world examples of some of the most common multi-stage attack scenarios that are active right now.
URLs and Other Embedded
The Hacker News
评论 | 让自动驾驶汽车行驶在法治轨道上
8 months 3 weeks ago
随着自动驾驶出租车等在交通运输服务中的应用,自动驾驶汽车正加速驶入人们的日常生活。在此背景下,如何在法治轨道上推进科技创新和产业创新深度融合,依法保障自动驾驶新技术的加速培育和新业态的健康有序发展,成为一个不可避免的重要问题。
前沿 | 构建“全链路”数据质量管控体系,夯实数据应用底座
8 months 3 weeks ago
随着数字经济的快速发展,数据已成为国家基础性战略资源和关键生产要素。近年来,农业银行积极融入数字中国建设,把数字经营作为三大战略之一,并将数据管理作为重要内容融入全行“十四五”规划,全面推进数字化转型。
评论 | 压实主体责任,规范算法技术
8 months 3 weeks ago
中央网络安全和信息化委员会办公室秘书局、工业和信息化部办公厅、公安部办公厅、国家市场监督管理总局办公厅近日联合印发通知,部署开展“清朗·网络平台算法典型问题治理”专项行动。
观点 | 坚持依法治网 推进网络综合治理
8 months 3 weeks ago
深入学习贯彻党的二十届三中全会精神,健全网络综合治理体系,必须坚持以习近平法治思想和习近平总书记关于网络强国的重要思想为科学指引,紧密结合我国网信事业发展实际,把坚持依法治网落到实处,让法治的触角更加灵敏,不断向网络空间发展的前沿延伸……
专家观点 | 李峥:科技强者恒强?AI可能例外
8 months 3 weeks ago
近期一种观点认为,AI可能会终结后发国家的赶超优势,固化“强者恒强”的国际政治经济格局。这种观点的依据是,传统上,后发国家往往可以通过学习经验、减少试错成本、以较低成本引入先进技术等方式实现后发赶超。但在AI领域,这种“后发效应”不灵了。
杂志征订 | 2025年《中国信息安全》杂志征订开始!
8 months 3 weeks ago
2025年《中国信息安全》杂志征订开始!
专题·网暴治理 | 在法治轨道上持续推进网络暴力治理
8 months 3 weeks ago
我国高度重视网络暴力治理,一体化布局网络暴力治理立法、执法和司法工作,切实维护公民权益和网络秩序。面对持续发展的互联网和愈加复杂的网络暴力现状,必须在法治轨道上持续综合施策,构建更加高效完备的网络暴力治理法治体系。
Apple ID как приманка: МВД раскрывает новую схему вымогательства у владельцев iPhone
8 months 3 weeks ago
Мошенники превращают популярные программы в инструмент шантажа.
CVE-2024-11860 | SourceCodester Best House Rental Management System 1.0 POST Request ajax.php?action=delete_tenant id improper authorization
8 months 3 weeks ago
A vulnerability classified as critical has been found in SourceCodester Best House Rental Management System 1.0. This affects an unknown part of the file /rental/ajax.php?action=delete_tenant of the component POST Request Handler. The manipulation of the argument id leads to improper authorization.
This vulnerability is uniquely identified as CVE-2024-11860. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
vuldb.com