Platform Used for Drugs, Arms trafficking, and Money Laundering French and Dutch police led the takedown of an encrypted messaging platform used in international drug and arms trafficking. Dutch police discovered the app, named Matrix, on the phone of a criminal convicted in 2021 of murdering a journalist.
Flaws in Fuji's Tellus and V-Server Software Pose Risks to Critical Infrastructure Security researchers have uncovered 16 zero-day vulnerabilities in Japanese equipment manufacturer Fuji Electric's Tellus and V-Server remote monitoring software that enable attackers to execute malicious code in devices commonly used by utilities and other critical infrastructure providers.
Buy of Washington D.C.-Area Firm Adds Reverse Engineering, Data Analytics Expertise Sixgen will enhance its cybersecurity operations through the purchase of Washington D.C.-area Kyrus. The move introduces reverse engineering and analytics expertise to Sixgen's portfolio, aligning with its mission to protect critical infrastructure and bolster American cyber defense capabilities.
Russian Threat Actor Delivers NetSupport RAT, BurnsRAT via Fake Requests A malware campaign targeting Russian retailers and service businesses aims to deploy remote access tools and install infostealer malware. Kaspersky dubbed the campaign "Horns&Hooves," after a fake organization set up by fraudsters in the 1931 Soviet satirical novel "The Little Golden Calf."
A vulnerability, which was classified as critical, has been found in NEX-Forms Plugin up to 7.9.6 on WordPress. Affected by this issue is some unknown functionality. The manipulation leads to sql injection.
This vulnerability is handled as CVE-2022-3142. The attack may be launched remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in GNU binutils up to 2.27 and classified as problematic. Affected by this issue is the function opy_special_section_fields of the component BFD Library. The manipulation leads to out-of-bounds read.
This vulnerability is handled as CVE-2017-7304. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in GNU binutils 2.28. This issue affects the function aout_link_add_symbols of the file bfd/aoutx.h of the component BFD Library. The manipulation leads to improper input validation.
The identification of this vulnerability is CVE-2017-7301. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in GNU binutils 2.28. Affected is the function swap_std_reloc_out of the file bfd/aoutx.h of the component BFD Library. The manipulation leads to out-of-bounds read.
This vulnerability is traded as CVE-2017-7302. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in GNU binutils up to 2.27 and classified as problematic. Affected by this vulnerability is the function find_link of the component BFD Library. The manipulation leads to out-of-bounds read.
This vulnerability is known as CVE-2017-7303. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in GNU binutils 2.28. This vulnerability affects the function aout_link_add_symbols of the file bfd/aoutx.h of the component BFD Library. The manipulation leads to out-of-bounds read.
This vulnerability was named CVE-2017-7300. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in TP-Link Archer, Deco and Tapo and classified as critical. Affected by this issue is the function tmp_get_sites of the component HomeShield. The manipulation leads to os command injection.
This vulnerability is handled as CVE-2024-53375. The attack may be launched remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in Advanced File Manager Plugin up to 5.2.10 on WordPress. This issue affects some unknown processing. The manipulation leads to unrestricted upload.
The identification of this vulnerability is CVE-2024-11391. The attack may be initiated remotely. There is no exploit available.