Tag
#mac
Backdoor.Win32.Cafeini.b malware suffers from a man-in-the-middle vulnerability.
Trojan-Downloader.Win32.Small.ahlq malware suffers from an insecure permissions vulnerability.
Third party file and theft
In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.
In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.
A China-linked government-sponsored threat actor has been observed targeting Russian speakers with an updated version of a remote access trojan called PlugX. Secureworks attributed the attempted intrusions to a threat actor it tracks as Bronze President, and by the wider cybersecurity community under the monikers Mustang Panda, TA416, HoneyMyte, RedDelta, and PKPLUG. "The war in Ukraine has
The Hashicorp go-getter library before 1.5.11 does not redact an SSH key from a URL query parameter.
The Hashicorp go-getter library before 1.5.11 could write SSH credentials into its logfile, exposing sensitive credentials to local users able to read the logfile.
Acquisition will add Internet-facing attack surface mapping and monitoring to Tenable's internal asset management products.
By Waqas The vulnerability that existed for the last 8 months allowed attackers to weaponize the VirusTotal platform to achieve… This is a post from HackRead.com Read the original post: Critical RCE Vulnerability Reported in Google’s VirusTotal