Aggregator
Submit #454846: code-projects hotel-management-system-in-c v1.0 Stack-based Buffer Overflow [Accepted]
Submit #454844: code-projects hotel-management-system-in-c v1.0 Stack-based Buffer Overflow [Accepted]
从忽视安全到设计安全,美国大型软件厂商大幅改进产品安全
价值超30亿元的数字货币被盗,这家交易所宣布关闭
Cloudflare Developer Domains Abused For Cyber Attacks
Cloudflare Pages, a popular web deployment platform, is exploited by threat actors to host phishing sites, as attackers leverage Cloudflare’s trusted infrastructure, global CDN, and free hosting to quickly set up and deploy convincing phishing sites. Automatic SSL/TLS encryption enhances the sites’ legitimacy, while custom domains and URL masking further obfuscate their malicious nature. Cloudflare’s […]
The post Cloudflare Developer Domains Abused For Cyber Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Submit #453374: DedeCMS V5.7.116 Cross Site Scripting [Accepted]
Submit #453003: DedeCMS V5.7.116 Cross Site Scripting [Accepted]
Submit #452983: DedeCMS V5.7.116 Cross Site Scripting [Accepted]
Submit #452969: DedeCMS V5.7.116 Cross Site Scripting [Accepted]
CVE-2024-53614 | Thinkware Cloud APK 4.3.46 hard-coded key
CVE-2024-54134 | solana-labs solana-web3.js up to 1.95.7 information disclosure (GHSA-jcxm-7wvp-g6p5)
CVE-2024-37575 | Mister org.mistergroup.shouldianswer 1.4.264 on Android DefaultDialerActivity Component permission
Why Technology Interoperability is the Key to a Safer Internet of Things (IoT)
CVE-2024-37574 | GriceMobile com.grice.call 4.5.2 on Android Intent permission
CVE-2024-54132 | cli up to 2.63.0 path traversal (GHSA-2m9h-r57g-45pj)
CVE-2024-54002 | DependencyTrack dependency-track up to 4.12.1 /api/v1/user/login username information exposure (GHSA-9w3m-hm36-w32w)
CVE-2024-20397 | Cisco NX-OS Bootloader access control (cisco-sa-nxos-image-sig-bypas-pQDRQvjL)
Hackers Exploit Docker Remote API Servers To Inject Gafgyt Malware
Attackers are exploiting publicly exposed Docker Remote API servers to deploy Gafgyt malware by creating a Docker container using a legitimate “alpine” image to deploy the malware and infect the victim system with Gafgyt botnet malware. It allows attackers to launch DDoS attacks on targeted servers, as this shift in the Gafgyt malware’s target range […]
The post Hackers Exploit Docker Remote API Servers To Inject Gafgyt Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.