Security
Headlines
HeadlinesLatestCVEs

Tag

#google

Supply Chain Management 1.0 Backup Disclosure

Supply Chain Management version 1.0 suffers from a backup disclosure vulnerability.

Packet Storm
#sql#vulnerability#windows#google#js#php#auth#firefox
Event Management System 1.0 Insecure Direct Object Reference

Event Management System version 1.0 suffers from an insecure direct object reference vulnerability.

Student Attendance Management System 1.0 Insecure Settings

Student Attendance Management System version 1.0 suffers from an ignored default credential vulnerability.

Printing Business Records Management System 1.0 Cross Site Request Forgery

Printing Business Records Management System version 1.0 suffers from a cross site request forgery vulnerability.

Online Eyewear Shop 1.0 Cross Site Request Forgery

Online Eyewear Shop version 1.0 suffers from a cross site request forgery vulnerability.

Fake Disney+ activation page redirects to pornographic scam

Next time you need to activate a subscription on your TV, watch out for these fake sites scammers are using to trick you and steal your money.

Cyberattackers Use HR Targets to Lay More_Eggs Backdoor

The FIN6 group is the likely culprit behind a spear-phishing campaign that demonstrates a shift in tactics, from targeting job seekers to going after those who hire.

AI-Powered Rhadamanthys Stealer Targets Crypto Wallets with Image Recognition

The threat actors behind the Rhadamanthys information stealer have added new advanced features to the malware, including using artificial intelligence (AI) for optical character recognition (OCR) as part of what's called "Seed Phrase Image Recognition." "This allows Rhadamanthys to extract cryptocurrency wallet seed phrases from images, making it a highly potent threat for anyone dealing in

Android users targeted on Facebook and porn sites, served adware

ThreatDown research uncovered a campaign that spreads a annoying adware for Android devices through several methods

Nitro PDF Pro Local Privilege Escalation

The Nitro PDF Pro application uses a .msi installer file (embedded into an executable .exe installer file) for installation. The MSI installer uses custom actions in repair mode in an unsafe way. Attackers with low-privileged system access to a Windows system where Nitro PDF Pro is installed, can exploit the cached MSI installer's custom actions to effectively escalate privileges and get a command prompt running in context of NT AUTHORITY\SYSTEM. Versions prior to 14.26.1.0 and 13.70.8.82 and affected.