Lucene search

K

Y&k Iletisim Formu Security Vulnerabilities

osv
osv

Bref vulnerable to Body Parsing Inconsistency in Event-Driven Functions

Impacted Resources bref/src/Event/Http/Psr7Bridge.php:130-168 Description When Bref is used with the Event-Driven Function runtime and the handler is a RequestHandlerInterface, then the Lambda event is converted to a PSR7 object. During the conversion process, if the request is a MultiPart, each...

9.8CVSS

7.3AI Score

0.001EPSS

2024-02-01 10:47 PM
4
exploitdb

7.4AI Score

2024-01-31 12:00 AM
73
filippoio
filippoio

Post-quantum Cryptography for the Go Ecosystem

filippo.io/mlkem768 is a pure-Go implementation of ML-KEM-768 optimized for correctness and readability. ML-KEM (formerly known as Kyber, renamed because we can't have nice things) is a post-quantum key exchange mechanism in the process of being standardized by NIST and adopted by most of the...

6.8AI Score

2024-01-30 05:48 PM
7
githubexploit
githubexploit

Exploit for PHP External Variable Modification in Juniper Junos

Juniper-CVE-2023-36845-Mass-Hunting Juniper RCE (Remote Code...

9.8CVSS

7.7AI Score

0.966EPSS

2024-01-30 08:00 AM
88
malwarebytes
malwarebytes

Hewlett Packard Enterprise also searched by Cozy Bear

Hewlett Packard Enterprise (HPE) has disclosed that the state-sponsored actor known as Cozy Bear (aka Midnight Blizzard), gained unauthorized access to HPE’s cloud-based email environment. This news comes only days after Microsoft broke very similar news that it got hacked by this same state...

7AI Score

2024-01-29 03:58 PM
10
malwarebytes
malwarebytes

A week in security (January 22 – January 28)

Last week on Malwarebytes Labs: 10 things to do to improve your online privacy Ring curtails law enforcement’s access to footage Malicious ads for restricted messaging applications target Chinese users Malwarebytes wins every MRG Effitas award for 2 years in a row AI likely to boost ransomware,...

6.8AI Score

2024-01-29 07:36 AM
5
openbugbounty
openbugbounty

k-takeda.jp Improper Access Control vulnerability OBB-3843693

Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified the website operator about its existence. Technical details of the vulnerability are currently...

7AI Score

2024-01-26 07:36 PM
7
openbugbounty
openbugbounty

k-nishio.co.jp Improper Access Control vulnerability OBB-3843685

Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified the website operator about its existence. Technical details of the vulnerability are currently...

7AI Score

2024-01-26 07:33 PM
6
githubexploit
githubexploit

Exploit for CVE-2023-47400

CVE-2023-47400 Proof of Concept for the CVE-2023-47400 ...

8.9AI Score

EPSS

2024-01-26 09:35 AM
116
nvd
nvd

CVE-2023-6919

Path Traversal: '/../filedir' vulnerability in Biges Safe Life Technologies Electronics Inc. VGuard allows Absolute Path Traversal.This issue affects VGuard: before...

7.5CVSS

7.5AI Score

0.001EPSS

2024-01-26 08:15 AM
cve
cve

CVE-2023-6919

Path Traversal: '/../filedir' vulnerability in Biges Safe Life Technologies Electronics Inc. VGuard allows Absolute Path Traversal.This issue affects VGuard: before...

7.5CVSS

7.5AI Score

0.001EPSS

2024-01-26 08:15 AM
11
packetstorm

7.4AI Score

0.0004EPSS

2024-01-26 12:00 AM
164
cve
cve

CVE-2023-6267

A flaw was found in the json payload. If annotation based security is used to secure a REST resource, the JSON body that the resource may consume is being processed (deserialized) prior to the security constraints being evaluated and applied. This does not happen with configuration based...

9.8CVSS

9.2AI Score

0.001EPSS

2024-01-25 07:15 PM
141
malwarebytes
malwarebytes

2024 State of Ransomware in Education: 92% spike in K-12 attacks

This article is based on research by Marcelo Rivero, Malwarebytes’ ransomware specialist, who monitors information published by ransomware gangs on their Dark Web sites. In this report, “known attacks” are those where the victim did not pay a ransom. This provides the best overall picture of...

6.9AI Score

2024-01-24 09:08 PM
13
wallarmlab
wallarmlab

Security Testing: Types, Tools, and Best Practices

Opening Note: Understanding the Core Concepts of Security Analysis Continual developments in technology have elevated the significance of security analysis, a critical phase in software design. You can think of it as a vital diagram within the process of coding, engineered to identify and resolve.....

8.4AI Score

2024-01-24 10:38 AM
12
github
github

Record titles for restricted records can be viewed if exposed by GridFieldAddExistingAutocompleter

Impact If a user should not be able to see a record, but that record can be added to a GridField using the GridFieldAddExistingAutocompleter component, the record's title can be accessed by that user. Base CVSS: 4.3 Reported by: Nick K - LittleMonkey, littlemonkey.co.nz References ...

4.3CVSS

4.5AI Score

0.0004EPSS

2024-01-23 12:49 PM
1
osv
osv

Record titles for restricted records can be viewed if exposed by GridFieldAddExistingAutocompleter

Impact If a user should not be able to see a record, but that record can be added to a GridField using the GridFieldAddExistingAutocompleter component, the record's title can be accessed by that user. Base CVSS: 4.3 Reported by: Nick K - LittleMonkey, littlemonkey.co.nz References ...

4.3CVSS

4.5AI Score

0.0004EPSS

2024-01-23 12:49 PM
9
kitploit
kitploit

Rayder - A Lightweight Tool For Orchestrating And Organizing Your Bug Hunting Recon / Pentesting Command-Line Workflows

Rayder is a command-line tool designed to simplify the orchestration and execution of workflows. It allows you to define a series of modules in a YAML file, each consisting of commands to be executed. Rayder helps you automate complex processes, making it easy to streamline repetitive modules and.....

8AI Score

2024-01-23 11:30 AM
7
krebs
krebs

Canadian Man Stuck in Triangle of E-Commerce Fraud

A Canadian man who says he's been falsely charged with orchestrating a complex e-commerce scam is seeking to clear his name. His case appears to involve "triangulation fraud," which occurs when a consumer purchases something online -- from a seller on Amazon or eBay, for example -- but the seller.....

6.8AI Score

2024-01-19 03:34 PM
19
cve
cve

CVE-2023-7153

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Macroturk Software and Internet Technologies Macro-Bel allows Reflected XSS.This issue affects Macro-Bel: before...

6.1CVSS

6.3AI Score

0.0005EPSS

2024-01-18 03:15 PM
5
nvd
nvd

CVE-2023-7153

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Macroturk Software and Internet Technologies Macro-Bel allows Reflected XSS.This issue affects Macro-Bel: before...

6.1CVSS

6.3AI Score

0.0005EPSS

2024-01-18 03:15 PM
cve
cve

CVE-2023-5806

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mergen Software Quality Management System allows SQL Injection.This issue affects Quality Management System: before...

9.8CVSS

9.7AI Score

0.001EPSS

2024-01-18 01:15 PM
16
nvd
nvd

CVE-2023-5806

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mergen Software Quality Management System allows SQL Injection.This issue affects Quality Management System: before...

9.8CVSS

9.9AI Score

0.001EPSS

2024-01-18 01:15 PM
trellix
trellix

JAVA-based Sophisticated Stealer Using Discord Bot as EventListener

JAVA-Based Sophisticated Stealer Using Discord Bot as EventListener By Gurumoorthi Ramanathan · January 18, 2024 Executive Summary: In mid-November 2023, Trellix Advanced Research Center team members observed a Java-based stealer being spread through cracked software zip files using JDABuilder...

7AI Score

2024-01-18 12:00 AM
14
trellix
trellix

JAVA-based Sophisticated Stealer Using Discord Bot as EventListener

JAVA-Based Sophisticated Stealer Using Discord Bot as EventListener By Gurumoorthi Ramanathan · January 18, 2024 Executive Summary: In mid-November 2023, Trellix Advanced Research Center team members observed a Java-based stealer being spread through cracked software zip files using JDABuilder...

7AI Score

2024-01-18 12:00 AM
4
openbugbounty
openbugbounty

k-kfir.co.il Improper Access Control vulnerability OBB-3837105

Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified the website operator about its existence. Technical details of the vulnerability are currently...

7AI Score

2024-01-17 08:41 PM
4
thn
thn

New iShutdown Method Exposes Hidden Spyware Like Pegasus on Your iPhone

Cybersecurity researchers have identified a "lightweight method" called iShutdown for reliably identifying signs of spyware on Apple iOS devices, including notorious threats like NSO Group's Pegasus, QuaDream's Reign, and Intellexa's Predator. Kaspersky, which analyzed a set of iPhones that were...

6.3AI Score

2024-01-17 10:22 AM
30
hackerone
hackerone

HackerOne: Being able to disclose IBB bounty table of any public program

Summary: Hi there, I hope you are doing well :) According to https://docs.hackerone.com/en/articles/8496298-internet-bug-bounty ██████ It says "You can opt-in by setting up your bounty table on your main program’s rewards settings page (instructions below). This bounty table is private and...

6.9AI Score

2024-01-16 01:34 PM
9
githubexploit
githubexploit

Exploit for Improper Authentication in Google Android

BluetoothDucky CVE-2023-45866 - BluetoothDucky implementation...

8.3AI Score

2024-01-16 07:44 AM
181
malwarebytes
malwarebytes

Fidelity National Financial acknowledges data breach affecting 1.3 million customers

In November 2023, real estate services company Fidelity National Financial (FNF) got its systems knocked offline for a week after a cyberincident. As is often the case these days, it turns out that the cyberincident was very likely a ransomware attack that included a data breach. Ransomware...

7.3AI Score

2024-01-15 01:31 PM
6
openbugbounty
openbugbounty

k-speed.net Cross Site Scripting vulnerability OBB-3835111

Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified the website operator about its existence. Technical details of the vulnerability are currently...

6.2AI Score

2024-01-15 12:26 PM
3
githubexploit
githubexploit

Exploit for Improper Authentication in Google Android

BluetoothDucky CVE-2023-45866 - BluetoothDucky implementation...

6.3CVSS

7AI Score

0.001EPSS

2024-01-15 07:58 AM
224
openbugbounty
openbugbounty

k-klaw.gr Improper Access Control vulnerability OBB-3833594

Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified the website operator about its existence. Technical details of the vulnerability are currently...

7AI Score

2024-01-12 07:37 PM
1
kitploit
kitploit

EmploLeaks - An OSINT Tool That Helps Detect Members Of A Company With Leaked Credentials

This is a tool designed for Open Source Intelligence (OSINT) purposes, which helps to gather information about employees of a company. How it Works The tool starts by searching through LinkedIn to obtain a list of employees of the company. Then, it looks for their social network profiles to find...

6.8AI Score

2024-01-12 11:30 AM
20
githubexploit

6.1CVSS

6.5AI Score

0.003EPSS

2024-01-11 04:02 PM
194
malwarebytes
malwarebytes

ThreatDown earns highest ratings across EDR and MDR categories in G2 Winter 2024 results

The peer-to-peer review source G2 has released its Winter 2024 reports, ranking ThreatDown products on top across several Endpoint Detection and Response (EDR) and Managed Detection and Response (MDR) categories. Based on verified customer reviews, ThreatDown EDR was voted a Leader in the overall.....

7.2AI Score

2024-01-10 04:01 PM
10
redhat
redhat

(RHSA-2024:0148) Important: Red Hat Integration Camel K 1.10.5 release and security update

A security update for Camel K 1.10.5 is now available. The purpose of this text-only errata is to inform you about the security issues fixed. Security Fix(es): JSON-java: parser confusion leads to OOM [rhint-camel-k-1.10] (CVE-2023-5072) Snappy-java: Unchecked chunk length leads to DoS...

7.4AI Score

0.001EPSS

2024-01-10 01:28 PM
15
talos
talos

WWBN AVideo checkLoginAttempts login attempt restriction bypass vulnerability

Talos Vulnerability Report TALOS-2023-1898 WWBN AVideo checkLoginAttempts login attempt restriction bypass vulnerability January 10, 2024 CVE Number CVE-2023-49810 SUMMARY A login attempt restriction bypass vulnerability exists in the checkLoginAttempts functionality of WWBN AVideo dev master...

7.3CVSS

7.4AI Score

0.001EPSS

2024-01-10 12:00 AM
12
talos
talos

WWBN AVideo aVideoEncoder.json.php chunkFile path information disclosure vulnerability

Talos Vulnerability Report TALOS-2023-1869 WWBN AVideo aVideoEncoder.json.php chunkFile path information disclosure vulnerability January 10, 2024 CVE Number CVE-2023-47171 SUMMARY An information disclosure vulnerability exists in the aVideoEncoder.json.php chunkFile path functionality of WWBN...

6.5CVSS

7AI Score

0.0005EPSS

2024-01-10 12:00 AM
8
talos
talos

WWBN AVideo image404Raw.php information disclosure vulnerability

Talos Vulnerability Report TALOS-2023-1881 WWBN AVideo image404Raw.php information disclosure vulnerability January 10, 2024 CVE Number CVE-2023-49738 SUMMARY An information disclosure vulnerability exists in the image404Raw.php functionality of WWBN AVideo dev master commit 15fed957fb. A...

7.5CVSS

6.9AI Score

0.001EPSS

2024-01-10 12:00 AM
6
talos
talos

WWBN AVideo navbarMenuAndLogo.php user name cross-site scripting (XSS) vulnerability

Talos Vulnerability Report TALOS-2023-1882 WWBN AVideo navbarMenuAndLogo.php user name cross-site scripting (XSS) vulnerability January 10, 2024 CVE Number CVE-2023-48730 SUMMARY A cross-site scripting (xss) vulnerability exists in the navbarMenuAndLogo.php user name functionality of WWBN AVideo...

8.5CVSS

5.7AI Score

0.001EPSS

2024-01-10 12:00 AM
7
talos
talos

WWBN AVideo salt generation insufficient entropy vulnerability

Talos Vulnerability Report TALOS-2023-1900 WWBN AVideo salt generation insufficient entropy vulnerability January 10, 2024 CVE Number CVE-2023-49599 SUMMARY An insufficient entropy vulnerability exists in the salt generation functionality of WWBN AVideo dev master commit 15fed957fb. A specially...

9.8CVSS

9.2AI Score

0.0004EPSS

2024-01-10 12:00 AM
8
talos
talos

WWBN AVideo channelBody.php user name cross-site scripting (XSS) vulnerability

Talos Vulnerability Report TALOS-2023-1884 WWBN AVideo channelBody.php user name cross-site scripting (XSS) vulnerability January 10, 2024 CVE Number CVE-2023-47861 SUMMARY A cross-site scripting (xss) vulnerability exists in the channelBody.php user name functionality of WWBN AVideo 11.6 and dev.....

9CVSS

5.8AI Score

0.001EPSS

2024-01-10 12:00 AM
6
talos
talos

WWBN AVideo userRecoverPass.php captcha validation recovery notification bypass vulnerability

Talos Vulnerability Report TALOS-2023-1897 WWBN AVideo userRecoverPass.php captcha validation recovery notification bypass vulnerability January 10, 2024 CVE Number CVE-2023-50172 SUMMARY A recovery notification bypass vulnerability exists in the userRecoverPass.php captcha validation...

5.3CVSS

5.4AI Score

0.0004EPSS

2024-01-10 12:00 AM
5
talos
talos

GTKWave VZT vzt_rd_process_block autosort out-of-bounds write vulnerabilities

Talos Vulnerability Report TALOS-2023-1817 GTKWave VZT vzt_rd_process_block autosort out-of-bounds write vulnerabilities January 8, 2024 CVE Number CVE-2023-39235,CVE-2023-39234 SUMMARY Multiple out-of-bounds write vulnerabilities exist in the VZT vzt_rd_process_block autosort functionality of...

7.8CVSS

7.7AI Score

0.001EPSS

2024-01-08 12:00 AM
6
talos
talos

GTKWave VZT vzt_rd_block_vch_decode dict parsing integer overflow vulnerabilities

Talos Vulnerability Report TALOS-2023-1815 GTKWave VZT vzt_rd_block_vch_decode dict parsing integer overflow vulnerabilities January 8, 2024 CVE Number CVE-2023-38653,CVE-2023-38652 SUMMARY Multiple integer overflow vulnerabilities exist in the VZT vzt_rd_block_vch_decode dict parsing...

7.8CVSS

8AI Score

0.001EPSS

2024-01-08 12:00 AM
6
zdt
zdt

Themebleed Windows 11 Themes Arbitrary Code Execution Exploit

When an unpatched Windows 11 host loads a theme file referencing an msstyles file, Windows loads the msstyles file, and if that file's PACKME_VERSION is 999, it then attempts to load an accompanying dll file ending in _vrf.dll. Before loading that file, it verifies that the file is signed. It does....

8.8CVSS

7AI Score

0.905EPSS

2024-01-08 12:00 AM
139
openbugbounty
openbugbounty

k-tune.org Cross Site Scripting vulnerability OBB-3828780

Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified the website operator about its existence. Technical details of the vulnerability are currently...

6.2AI Score

2024-01-05 10:13 PM
7
packetstorm

8.8CVSS

7.4AI Score

0.905EPSS

2024-01-05 12:00 AM
189
Total number of security vulnerabilities29023