Aggregator
举杯,逢8必发!8周年再抽911!
CVE-2024-43349 | AREOI All Bootstrap Blocks Plugin up to 1.3.19 on WordPress cross site scripting
CVE-2024-43351 | CryoutCreations Bravada Plugin up to 1.1.2 on WordPress cross site scripting
CVE-2024-43305 | Code Amp Custom Layouts Plugin up to 1.4.11 on WordPress cross site scripting
CVE-2024-43238 | weDevs weMail Plugin up to 1.14.5 on WordPress cross site scripting
CVE-2024-43329 | WP Chill Allegiant Plugin up to 1.2.7 on WordPress cross site scripting
CVE-2024-43306 | WP-Lister Lite for eBay Plugin up to 3.6.0 on WordPress cross site scripting
CVE-2024-43308 | Gutentor Gutenberg Blocks Plugin up to 3.3.5 on WordPress cross site scripting
CVE-2008-7046 | Ajsquare Free Polling Script improper authentication (EDB-7086 / SA32600)
CVE-2024-43324 | CleverSoft Clever Addons for Elementor Plugin up to 2.2.0 on WordPress cross site scripting
CVE-2024-43307 | Gordon Böhme & Antonio Leutsch Structured Content Plugin up to 1.6.2 on WordPress cross site scripting
CVE-2024-43352 | Organic Themes GivingPress Lite Plugin up to 1.8.6 on WordPress cross site scripting
QNodeOS: разработан универсальный язык для программирования квантовых сетей
JVN: 複数のSungrow製品における複数の脆弱性
微软称 Windows 最近的一个更新会导致 USB 打印机打印随机文本
New Microsoft 365 Attack Leverages OAuth Redirection for Credential Theft
Threat researchers at Proofpoint are currently tracking two sophisticated and highly targeted cyber-attack campaigns that are utilizing OAuth redirection mechanisms to compromise user credentials. These attacks combine advanced brand impersonation techniques with malware proliferation, focusing on Microsoft 365-themed credential phishing designed to facilitate account takeovers (ATOs), as per a report shared in the platform, X. […]
The post New Microsoft 365 Attack Leverages OAuth Redirection for Credential Theft appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
New MassJacker Malware Targets Piracy Users, Hijacking Cryptocurrency Transactions
Восстание машин на минималках: Cursor AI отказался продолжать писать код за пользователя
Decrypting Akira Ransomware on Linux/ESXi Without Paying Hackers
A team successfully decrypted an instance of the Akira ransomware on Linux/ESXi systems without succumbing to the hackers’ demands. This achievement not only underscores the ingenuity of cybersecurity experts but also serves as a powerful message to those who rely on extorting from vulnerable businesses and individuals. The Akira ransomware, known for its complex encryption […]
The post Decrypting Akira Ransomware on Linux/ESXi Without Paying Hackers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.