Tag
Google has addressed a high-severity security flaw impacting the Android kernel that it has been actively exploited in the wild. The vulnerability, tracked as CVE-2024-36971, has been described as a case of remote code execution impacting the kernel. "There are indications that CVE-2024-36971 may be under limited, targeted exploitation," the tech giant noted in its monthly Android security
The APT used DNS poisoning to install the Macma backdoor on targeted networks and then deliver malware to steal data via post-exploitation activity.
Linux DRM has drm_file_update_pid() call to get_pid() too late, which creates a race condition that can lead to use-after-free issue of a struct pid.
Devika version 1 suffers from a path traversal vulnerability.
e107 version 2.3.3 suffers from a cross site scripting vulnerability.
Codeprojects E-Commerce version 1.0 suffers from an ignored default credential vulnerability.
Blog Site version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Best Courier Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Appointment Scheduler version 4.0 suffers from an insecure direct object reference vulnerability.
Organizations in Kazakhstan are the target of a threat activity cluster dubbed Bloody Wolf that delivers a commodity malware called STRRAT (aka Strigoi Master). "The program selling for as little as $80 on underground resources allows the adversaries to take control of corporate computers and hijack restricted data," cybersecurity vendor BI.ZONE said in a new analysis. The cyber attacks employ