Malicious code in full-watch-john-wick-chapter-4-2023-fullmovies-online-at-homef71 (npm)
-= Per source details. Do not edit below this...
7.1AI Score
Malicious code in downloads-john-wick-chapter-4-fullmovies-online-from-homees (npm)
-= Per source details. Do not edit below this...
7.1AI Score
-= Per source details. Do not edit below this...
7.1AI Score
Malicious code in cuevana3-ver-john-wick-4-la-pelicula-completa-online-gratis4k (npm)
-= Per source details. Do not edit below this...
7.1AI Score
Malicious code in cuevana-3-ver-john-wick-4-pelicula-completa-en-espanol-y-latino (npm)
-= Per source details. Do not edit below this...
7.1AI Score
-= Per source details. Do not edit below this...
7.1AI Score
Malicious code in cuevana-3-ver-john-wick-4-2023-pelicula-completa-en-espanol-y-latino (npm)
-= Per source details. Do not edit below this...
7.1AI Score
Malicious code in cuevana-3-ver-john-wick-4-2023-descargar-la-pelicula (npm)
-= Per source details. Do not edit below this...
7.1AI Score
Malicious code in cuevana-3-ver-john-wick-4-2023-des-cargar-la-peliculao-completa (npm)
-= Per source details. Do not edit below this...
7.1AI Score
Malicious code in cuevana-3-free-ver-john-wick-4-completa-en-espanol-gratis-latino (npm)
-= Per source details. Do not edit below this...
7.1AI Score
-= Per source details. Do not edit below this...
7.1AI Score
-= Per source details. Do not edit below this...
7.1AI Score
Malicious code in 4k-john-wick-chapter-4-fullmovies-online-at-homes-free-hd (npm)
-= Per source details. Do not edit below this...
7.1AI Score
Malicious code in -whareo-to-watch-john-wick-chapter-4-omare-fullmovies-hd-online-at-home (npm)
-= Per source details. Do not edit below this...
7.1AI Score
Malicious code in -whareo-to-watch-john-wick-chapter-4-2023-fullmovies-hd-online-at-home (npm)
-= Per source details. Do not edit below this...
7.1AI Score
Malicious code in -whare-to-watch-john-wick-chapter-4-2023-fullmovies-hd-online-at-suparhit (npm)
-= Per source details. Do not edit below this...
7.1AI Score
Malicious code in -whare-to-watch-john-wick-chapter-4-2023-fullmovies-hd-online-at-index-main (npm)
-= Per source details. Do not edit below this...
7.1AI Score
Malicious code in -whare-to-watch-john-wick-chapter-4-2023-fullmovies-hd-online-at-123 (npm)
-= Per source details. Do not edit below this...
7.1AI Score
-= Per source details. Do not edit below this...
7.1AI Score
-= Per source details. Do not edit below this...
7.1AI Score
Malicious code in -john-wick-keanu-4-k-varindo-en-casa-en-lienia-lliena-love (npm)
-= Per source details. Do not edit below this...
7.1AI Score
-= Per source details. Do not edit below this...
7.1AI Score
-= Per source details. Do not edit below this...
7.1AI Score
-= Per source details. Do not edit below this...
7.1AI Score
Malicious code in -john-wick-4-keanu-reeves-peliculas-completa-h-d-varindo-en-casa-lliena-love (npm)
-= Per source details. Do not edit below this...
7.1AI Score
-= Per source details. Do not edit below this...
7.1AI Score
-= Per source details. Do not edit below this...
7.1AI Score
-= Per source details. Do not edit below this...
7.1AI Score
-= Per source details. Do not edit below this...
7.1AI Score
Malicious code in -espanol-john-wick-keanu-reeves-4-k-varindo-en-casa-en-lienia-lliena-love (npm)
-= Per source details. Do not edit below this...
7.1AI Score
-= Per source details. Do not edit below this...
7.1AI Score
Malicious code in -espanol-john-wick-keanu-4-k-varindo-en-casa-en-lienia-lliena-love (npm)
-= Per source details. Do not edit below this...
7.1AI Score
-= Per source details. Do not edit below this...
7.1AI Score
7.1AI Score
PTC Creo Elements/Direct License Server
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 10.0 ATTENTION: Exploitable remotely/low attack complexity Vendor: PTC Equipment: Creo Elements/Direct License Server Vulnerability: Missing Authorization 2. RISK EVALUATION Successful exploitation of this vulnerability could allow unauthenticated remote...
10CVSS
8.1AI Score
0.0004EPSS
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 6.9 ATTENTION: Low attack complexity Vendor: ABB Equipment: 800xA Base Vulnerabilities: Improper Input Validation 2. RISK EVALUATION Successful exploitation of these vulnerabilities could cause services to crash and restart. 3. TECHNICAL DETAILS 3.1...
5.7CVSS
7.1AI Score
0.0004EPSS
Cybersecurity in the SMB space — a growing threat
Small and medium-sized businesses (SMBs) are increasingly targeted by cybercriminals. Despite adopting digital technology for remote work, production, and sales, SMBs often lack robust cybersecurity measures. SMBs face significant cybersecurity challenges due to limited resources and expertise....
7.3AI Score
How to Cut Costs with a Browser Security Platform
Browser security is becoming increasingly popular, as organizations understand the need to protect at the point of risk - the browser. Network and endpoint solutions are limited in their ability to protect from web-borne threats like phishing websites or malicious browser extensions. They also do.....
7AI Score
Summary IBM Event Streams are vulnerable in terms of both confidentiality and integrity. Multiple Java components within IBM Event Streams are susceptible to these vulnerabilities, enabling remote attackers to execute malicious actions through these components. Vulnerability Details ** CVEID:...
7.4CVSS
7.1AI Score
0.001EPSS
Summary IBM Event Streams is vulnerable to a a denial of service attack due to the jose4j component. The jose4j library is used in event streams for secure handling of JSON Web Tokens (JWTs), enabling encryption, decryption, and validation of tokens to ensure secure authentication and data...
6.8AI Score
0.0004EPSS
Summary IBM Event Streams is vulnerable to XSS vulnerability due to Axios component . Axios is a promise-based HTTP library that lets developers make requests to either their own or a third-party server to fetch data. Vulnerability Details ** CVEID: CVE-2023-45857 DESCRIPTION: **Axios is...
6.5CVSS
5.3AI Score
0.001EPSS
Summary IBM Event Streams is vulnerable to a denial of service attack due to the k8sio apiMAChinery component. k8sio apiMachinery is utilized for handling Kubernetes API interactions, facilitating streamlined communication with Kubernetes clusters within event-driven applications. Vulnerability...
7.5CVSS
8.1AI Score
0.732EPSS
Summary IBM Event Streams is vulnerable to a denial of service attack and Phishing attacks due to the follow-redirect and k8s.io/apiMAChinery component. The follow-redirect library is employed in event streams to seamlessly manage HTTP redirects, ensuring smooth navigation between resources...
7.5CVSS
8.5AI Score
0.732EPSS
Summary IBM Event Streams is vulnerable to a Broken Access Control attack and Post Exploitation attacks due to the JetBrains Kotlin component. JetBrains Kotlin is used in event streams to simplify the development process with its concise syntax, enhance code safety with nullability features, and...
5.3CVSS
6.7AI Score
0.001EPSS
Summary IBM Event Streams is vulnerable to a denial of service attack due to the Eclipse Vert.x component. Vert. x is a toolkit to build reactive microservices.It is used to create a highly scalable and performant event-driven architecture for managing Kafka clusters. Vulnerability Details **...
5.4CVSS
5.5AI Score
0.0004EPSS
Summary IBM Event Streams is vulnerable to a Broken Access Control due to the Node.js follow-redirects module. follow-redirects provides request and get methods that behave identically to those found on the native http and https modules. Vulnerability Details ** CVEID: CVE-2024-28849 DESCRIPTION:.....
6.5CVSS
6.1AI Score
0.0004EPSS
Summary IBM Event Streams is vulnerable to a denial of service attack due to Okio GzipSource component used in our strimzi-kafka-bridge. Okio is used in kafka to efficiently handle byte streams and improve data serialization/deserialization and network communication performance. Vulnerability...
7.5CVSS
6.5AI Score
0.001EPSS
4 FIN9-linked Vietnamese Hackers Indicted in $71M U.S. Cybercrime Spree
Four Vietnamese nationals with ties to the FIN9 cybercrime group have been indicted in the U.S. for their involvement in a series of computer intrusions that caused over $71 million in losses to companies. The defendants, Ta Van Tai (aka Quynh Hoa and Bich Thuy), Nguyen Viet Quoc (aka Tien...
7AI Score
EulerOS 2.0 SP11 : glusterfs (EulerOS-SA-2024-1833)
According to the versions of the glusterfs packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : In Gluster GlusterFS 11.0, there is an xlators/cluster/dht/src/dht-common.c dht_setxattr_mds_cbk use- after-free.(CVE-2022-48340) Tenable...
7.5CVSS
7.8AI Score
0.001EPSS
EulerOS 2.0 SP11 : xorg-x11-server (EulerOS-SA-2024-1849)
According to the versions of the xorg-x11-server package installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : A heap-based buffer over-read vulnerability was found in the X.org server's ProcAppleDRICreatePixmap() function. This issue occurs when...
7.8CVSS
8AI Score
0.0005EPSS