CVE Alert: CVE-2024-51328
Vulnerability Summary: CVE-2024-51328 Cross Site Scripting vulnerability in addcategory.php in projectworld's Travel Management System v1.0 allows remote attacker to inject...
Vulnerability Summary: CVE-2024-51328 Cross Site Scripting vulnerability in addcategory.php in projectworld's Travel Management System v1.0 allows remote attacker to inject...
Vulnerability Summary: CVE-2024-48336 The install() function of ProviderInstaller.java in Magisk App before canary version 27007 does not verify the GMS...
Vulnerability Summary: CVE-2024-45086 IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to an XML external entity injection (XXE) attack...
Vulnerability Summary: CVE-2024-51744 golang-jwt is a Go implementation of JSON Web Tokens. Unclear documentation of the error behavior in `ParseWithClaims`...
Vulnerability Summary: CVE-2024-51500 Meshtastic firmware is a device firmware for the Meshtastic project. The Meshtastic firmware does not check for...
Vulnerability Summary: CVE-2024-10805 A vulnerability was found in code-projects University Event Management System 1.0. It has been classified as critical....
Vulnerability Summary: CVE-2024-10791 A vulnerability, which was classified as critical, has been found in Codezips Hospital Appointment System 1.0. This...
Ransomware Group: FLOCKER VICTIM NAME: d****I NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Google has warned that a security flaw impacting its Android operating system has come under active exploitation in the wild....
Following a recent DDoS attack by Russian hacktivists, UK council sites are recovering and restoring their online services effectively. All...
In a significant development, researchers have identified the first open source supply chain attack leveraging smart contracts alongside traditional attack...
Cybercriminals are increasingly targeting DocuSign APIs to deliver convincing fake invoices, a trend that poses significant risks to businesses. Cybersecurity...
In groundbreaking news, Google researchers from Project Zero and DeepMind have successfully identified their first real-world vulnerability leveraging artificial intelligence...
US agencies have found that Russian operatives are responsible for a fabricated video portraying illegal voting by Haitians in Georgia....
A recent ransomware attack in Columbus, Ohio, has raised serious concerns as it has compromised the personal data of 500,000...
A Nigerian man has received a 26-year sentence in a US federal prison due to a significant real estate phishing...
HIBP In June 2024, almost 10M user records from Z-lib were discovered exposed online. Now defunct, Z-lib was a malicious...
CISA and FBI Release Fact Sheet on Protecting Against Iranian Targeting of Accounts Associated with National Political Organizations Today, CISA...
CISA Adds Three Known Exploited Vulnerabilities to Catalog CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
Avoid Scams After Disaster Strikes As hurricanes and other natural disasters occur, CISA urges individuals to remain on alert for...
Microsoft Releases October 2024 Security Updates Microsoft released security updates to address vulnerabilities in multiple products. A cyber threat actor...
CISA Adds Three Known Exploited Vulnerabilities to Catalog CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
Best Practices to Configure BIG-IP LTM Systems to Encrypt HTTP Persistence Cookies CISA has observed cyber threat actors leveraging unencrypted...
CISA Adds Three Known Exploited Vulnerabilities to Catalog CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...