Aggregator
CVE-2022-3107 | Linux Kernel up to 5.16-rc6 netvsc_drv.c netvsc_get_ethtool_stats null pointer dereference (Nessus ID 224687)
CVE-2022-3112 | Linux Kernel up to 5.16-rc6 vdec_helpers.c amvdec_set_canvases null pointer dereference (Nessus ID 224688)
CVE-2022-30636 | x-crypto prior 0.0.0-20220525230936-793ad666bf5e on Go path traversal (Nessus ID 224686)
CVE-2022-29154 | rsync up to 3.2.4 File Name channel accessible (FEDORA-2022-25e4dbedf9 / Nessus ID 224691)
CVE-2022-2831 | Blender blendthumb_extract.cc out-of-bounds write (Nessus ID 224693)
CVE-2022-2881 | ISC BIND up to 9.18.6/9.19.4 Statistics Channel buffer overflow (Nessus ID 224692)
CVE-2022-29824 | Oracle Communications Cloud Native Core Binding Support Function Install/Upgrade denial of service (Nessus ID 224695)
CVE-2022-29824 | Oracle HTTP Server 12.2.1.4.0 SSL Module denial of service (Nessus ID 224695)
CVE-2022-29824 | libxml2 up to 2.9.13 buf.c integer overflow (Nessus ID 224695)
CVE-2022-29824 | Oracle Communications Cloud Native Core Network Function Cloud Native Environment Configuration denial of service (Nessus ID 224695)
CVE-2022-29824 | Oracle MySQL Workbench up to 8.0.30 denial of service (Nessus ID 224695)
Управление уязвимостями взлетело на 304%: что стоит за ростом?
Over 10,000 WordPress Sites Exposed by Donation Plugin Code Execution Vulnerability
A critical security flaw in the widely used GiveWP – Donation Plugin and Fundraising Platform has left over 10,000 WordPress websites vulnerable to remote code execution attacks since March 3, 2025. Tracked as CVE-2025-0912, the vulnerability allows unauthenticated attackers to hijack sites by exploiting a deserialization flaw in versions 3.19.4 and earlier. Vulnerability Overview The vulnerability stems from […]
The post Over 10,000 WordPress Sites Exposed by Donation Plugin Code Execution Vulnerability appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Когда замолчат спутники: атомные часы готовят человечество к коллапсу GPS
Beware! Fake CAPTCHA Hidden LummaStealer Threat Installing Silently
Cybersecurity researchers at G DATA have uncovered a sophisticated malware campaign utilizing fake booking websites to deliver the LummaStealer malware through deceptive CAPTCHA prompts. This new attack vector, discovered in January 2025, marks a significant shift in LummaStealer’s distribution methods, moving from traditional channels like GitHub and Telegram to malvertising techniques. The infection chain begins […]
The post Beware! Fake CAPTCHA Hidden LummaStealer Threat Installing Silently appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.