A malicious PyPI package “aiocpa,” that stole crypto wallet data via obfuscated code, has been removed after being reported by Reversing Labs researchers
A vulnerability classified as problematic was found in Guizhou Xiaoma Technology jpress 5.1.2. Affected by this vulnerability is an unknown functionality of the file /commons/attachment/upload of the component Avatar Handler. The manipulation of the argument files leads to cross site scripting.
This vulnerability is known as CVE-2024-11971. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical has been found in code-projects Concert Ticket Ordering System 1.0. Affected is an unknown function of the file /tour(cor).php. The manipulation of the argument mai leads to sql injection.
This vulnerability is traded as CVE-2024-11970. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
Also: Python Library Update Steals Credentials; Drug Cartels Launder With Tether This week's cryptohack roundup includes a U.S. federal judge striking down the SEC's expanded "Dealer Rule," a Python crypto library update stealing credentials, why digital payment apps are being excluded from some types of federal oversight, and drug cartels laundering profits via Tether.
Nearly two dozen security vulnerabilities have been disclosed in Advantech EKI industrial-grade wireless access point devices, some of which could be weaponized to bypass authentication and execute code with elevated privileges.
"These vulnerabilities pose significant risks, allowing unauthenticated remote code execution with root privileges, thereby fully compromising the confidentiality,
The Tor Project has put out an urgent call to the privacy community asking volunteers to help deploy 200 new WebTunnel bridges by the end of the year to fight government censorship. [...]
A vulnerability was found in Apache Arrow R up to 16.1.0. It has been rated as problematic. This issue affects the function to_data_frame. The manipulation leads to deserialization.
The identification of this vulnerability is CVE-2024-52338. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Cradlepoint NetCloud Exchange Client 1.110.50 on Windows. It has been declared as critical. This vulnerability affects unknown code. The manipulation leads to incorrect default permissions.
This vulnerability was named CVE-2024-11969. Attacking locally is a requirement. There is no exploit available.
A vulnerability was found in Linux Kernel up to 6.4.6. It has been classified as critical. This affects the function bcm_proc_show. The manipulation leads to use after free.
This vulnerability is uniquely identified as CVE-2023-52922. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.