Bref vulnerable to Body Parsing Inconsistency in Event-Driven Functions
Impacted Resources bref/src/Event/Http/Psr7Bridge.php:130-168 Description When Bref is used with the Event-Driven Function runtime and the handler is a RequestHandlerInterface, then the Lambda event is converted to a PSR7 object. During the conversion process, if the request is a MultiPart, each...
9.8CVSS
7.3AI Score
0.001EPSS
7.4AI Score
7.4AI Score
Post-quantum Cryptography for the Go Ecosystem
filippo.io/mlkem768 is a pure-Go implementation of ML-KEM-768 optimized for correctness and readability. ML-KEM (formerly known as Kyber, renamed because we can't have nice things) is a post-quantum key exchange mechanism in the process of being standardized by NIST and adopted by most of the...
6.8AI Score
Exploit for PHP External Variable Modification in Juniper Junos
Juniper-CVE-2023-36845-Mass-Hunting Juniper RCE (Remote Code...
9.8CVSS
7.7AI Score
0.966EPSS
Hewlett Packard Enterprise also searched by Cozy Bear
Hewlett Packard Enterprise (HPE) has disclosed that the state-sponsored actor known as Cozy Bear (aka Midnight Blizzard), gained unauthorized access to HPE’s cloud-based email environment. This news comes only days after Microsoft broke very similar news that it got hacked by this same state...
7AI Score
A week in security (January 22 – January 28)
Last week on Malwarebytes Labs: 10 things to do to improve your online privacy Ring curtails law enforcement’s access to footage Malicious ads for restricted messaging applications target Chinese users Malwarebytes wins every MRG Effitas award for 2 years in a row AI likely to boost ransomware,...
6.8AI Score
k-takeda.jp Improper Access Control vulnerability OBB-3843693
Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified the website operator about its existence. Technical details of the vulnerability are currently...
7AI Score
k-nishio.co.jp Improper Access Control vulnerability OBB-3843685
Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified the website operator about its existence. Technical details of the vulnerability are currently...
7AI Score
8.9AI Score
EPSS
Path Traversal: '/../filedir' vulnerability in Biges Safe Life Technologies Electronics Inc. VGuard allows Absolute Path Traversal.This issue affects VGuard: before...
7.5CVSS
7.5AI Score
0.001EPSS
Path Traversal: '/../filedir' vulnerability in Biges Safe Life Technologies Electronics Inc. VGuard allows Absolute Path Traversal.This issue affects VGuard: before...
7.5CVSS
7.5AI Score
0.001EPSS
7.4AI Score
0.0004EPSS
A flaw was found in the json payload. If annotation based security is used to secure a REST resource, the JSON body that the resource may consume is being processed (deserialized) prior to the security constraints being evaluated and applied. This does not happen with configuration based...
9.8CVSS
9.2AI Score
0.001EPSS
2024 State of Ransomware in Education: 92% spike in K-12 attacks
This article is based on research by Marcelo Rivero, Malwarebytes’ ransomware specialist, who monitors information published by ransomware gangs on their Dark Web sites. In this report, “known attacks” are those where the victim did not pay a ransom. This provides the best overall picture of...
6.9AI Score
Security Testing: Types, Tools, and Best Practices
Opening Note: Understanding the Core Concepts of Security Analysis Continual developments in technology have elevated the significance of security analysis, a critical phase in software design. You can think of it as a vital diagram within the process of coding, engineered to identify and resolve.....
8.4AI Score
Record titles for restricted records can be viewed if exposed by GridFieldAddExistingAutocompleter
Impact If a user should not be able to see a record, but that record can be added to a GridField using the GridFieldAddExistingAutocompleter component, the record's title can be accessed by that user. Base CVSS: 4.3 Reported by: Nick K - LittleMonkey, littlemonkey.co.nz References ...
4.3CVSS
4.5AI Score
0.0004EPSS
Record titles for restricted records can be viewed if exposed by GridFieldAddExistingAutocompleter
Impact If a user should not be able to see a record, but that record can be added to a GridField using the GridFieldAddExistingAutocompleter component, the record's title can be accessed by that user. Base CVSS: 4.3 Reported by: Nick K - LittleMonkey, littlemonkey.co.nz References ...
4.3CVSS
4.5AI Score
0.0004EPSS
Rayder is a command-line tool designed to simplify the orchestration and execution of workflows. It allows you to define a series of modules in a YAML file, each consisting of commands to be executed. Rayder helps you automate complex processes, making it easy to streamline repetitive modules and.....
8AI Score
Canadian Man Stuck in Triangle of E-Commerce Fraud
A Canadian man who says he's been falsely charged with orchestrating a complex e-commerce scam is seeking to clear his name. His case appears to involve "triangulation fraud," which occurs when a consumer purchases something online -- from a seller on Amazon or eBay, for example -- but the seller.....
6.8AI Score
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Macroturk Software and Internet Technologies Macro-Bel allows Reflected XSS.This issue affects Macro-Bel: before...
6.1CVSS
6.3AI Score
0.0005EPSS
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Macroturk Software and Internet Technologies Macro-Bel allows Reflected XSS.This issue affects Macro-Bel: before...
6.1CVSS
6.3AI Score
0.0005EPSS
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mergen Software Quality Management System allows SQL Injection.This issue affects Quality Management System: before...
9.8CVSS
9.7AI Score
0.001EPSS
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mergen Software Quality Management System allows SQL Injection.This issue affects Quality Management System: before...
9.8CVSS
9.9AI Score
0.001EPSS
JAVA-based Sophisticated Stealer Using Discord Bot as EventListener
JAVA-Based Sophisticated Stealer Using Discord Bot as EventListener By Gurumoorthi Ramanathan · January 18, 2024 Executive Summary: In mid-November 2023, Trellix Advanced Research Center team members observed a Java-based stealer being spread through cracked software zip files using JDABuilder...
7AI Score
JAVA-based Sophisticated Stealer Using Discord Bot as EventListener
JAVA-Based Sophisticated Stealer Using Discord Bot as EventListener By Gurumoorthi Ramanathan · January 18, 2024 Executive Summary: In mid-November 2023, Trellix Advanced Research Center team members observed a Java-based stealer being spread through cracked software zip files using JDABuilder...
7AI Score
k-kfir.co.il Improper Access Control vulnerability OBB-3837105
Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified the website operator about its existence. Technical details of the vulnerability are currently...
7AI Score
New iShutdown Method Exposes Hidden Spyware Like Pegasus on Your iPhone
Cybersecurity researchers have identified a "lightweight method" called iShutdown for reliably identifying signs of spyware on Apple iOS devices, including notorious threats like NSO Group's Pegasus, QuaDream's Reign, and Intellexa's Predator. Kaspersky, which analyzed a set of iPhones that were...
6.3AI Score
HackerOne: Being able to disclose IBB bounty table of any public program
Summary: Hi there, I hope you are doing well :) According to https://docs.hackerone.com/en/articles/8496298-internet-bug-bounty ██████ It says "You can opt-in by setting up your bounty table on your main program’s rewards settings page (instructions below). This bounty table is private and...
6.9AI Score
Exploit for Improper Authentication in Google Android
BluetoothDucky CVE-2023-45866 - BluetoothDucky implementation...
8.3AI Score
Fidelity National Financial acknowledges data breach affecting 1.3 million customers
In November 2023, real estate services company Fidelity National Financial (FNF) got its systems knocked offline for a week after a cyberincident. As is often the case these days, it turns out that the cyberincident was very likely a ransomware attack that included a data breach. Ransomware...
7.3AI Score
k-speed.net Cross Site Scripting vulnerability OBB-3835111
Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified the website operator about its existence. Technical details of the vulnerability are currently...
6.2AI Score
Exploit for Improper Authentication in Google Android
BluetoothDucky CVE-2023-45866 - BluetoothDucky implementation...
6.3CVSS
7AI Score
0.001EPSS
k-klaw.gr Improper Access Control vulnerability OBB-3833594
Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified the website operator about its existence. Technical details of the vulnerability are currently...
7AI Score
EmploLeaks - An OSINT Tool That Helps Detect Members Of A Company With Leaked Credentials
This is a tool designed for Open Source Intelligence (OSINT) purposes, which helps to gather information about employees of a company. How it Works The tool starts by searching through LinkedIn to obtain a list of employees of the company. Then, it looks for their social network profiles to find...
6.8AI Score
6.1CVSS
6.5AI Score
0.003EPSS
ThreatDown earns highest ratings across EDR and MDR categories in G2 Winter 2024 results
The peer-to-peer review source G2 has released its Winter 2024 reports, ranking ThreatDown products on top across several Endpoint Detection and Response (EDR) and Managed Detection and Response (MDR) categories. Based on verified customer reviews, ThreatDown EDR was voted a Leader in the overall.....
7.2AI Score
(RHSA-2024:0148) Important: Red Hat Integration Camel K 1.10.5 release and security update
A security update for Camel K 1.10.5 is now available. The purpose of this text-only errata is to inform you about the security issues fixed. Security Fix(es): JSON-java: parser confusion leads to OOM [rhint-camel-k-1.10] (CVE-2023-5072) Snappy-java: Unchecked chunk length leads to DoS...
7.4AI Score
0.001EPSS
WWBN AVideo checkLoginAttempts login attempt restriction bypass vulnerability
Talos Vulnerability Report TALOS-2023-1898 WWBN AVideo checkLoginAttempts login attempt restriction bypass vulnerability January 10, 2024 CVE Number CVE-2023-49810 SUMMARY A login attempt restriction bypass vulnerability exists in the checkLoginAttempts functionality of WWBN AVideo dev master...
7.3CVSS
7.4AI Score
0.001EPSS
WWBN AVideo aVideoEncoder.json.php chunkFile path information disclosure vulnerability
Talos Vulnerability Report TALOS-2023-1869 WWBN AVideo aVideoEncoder.json.php chunkFile path information disclosure vulnerability January 10, 2024 CVE Number CVE-2023-47171 SUMMARY An information disclosure vulnerability exists in the aVideoEncoder.json.php chunkFile path functionality of WWBN...
6.5CVSS
7AI Score
0.0005EPSS
WWBN AVideo image404Raw.php information disclosure vulnerability
Talos Vulnerability Report TALOS-2023-1881 WWBN AVideo image404Raw.php information disclosure vulnerability January 10, 2024 CVE Number CVE-2023-49738 SUMMARY An information disclosure vulnerability exists in the image404Raw.php functionality of WWBN AVideo dev master commit 15fed957fb. A...
7.5CVSS
6.9AI Score
0.001EPSS
WWBN AVideo navbarMenuAndLogo.php user name cross-site scripting (XSS) vulnerability
Talos Vulnerability Report TALOS-2023-1882 WWBN AVideo navbarMenuAndLogo.php user name cross-site scripting (XSS) vulnerability January 10, 2024 CVE Number CVE-2023-48730 SUMMARY A cross-site scripting (xss) vulnerability exists in the navbarMenuAndLogo.php user name functionality of WWBN AVideo...
8.5CVSS
5.7AI Score
0.001EPSS
WWBN AVideo salt generation insufficient entropy vulnerability
Talos Vulnerability Report TALOS-2023-1900 WWBN AVideo salt generation insufficient entropy vulnerability January 10, 2024 CVE Number CVE-2023-49599 SUMMARY An insufficient entropy vulnerability exists in the salt generation functionality of WWBN AVideo dev master commit 15fed957fb. A specially...
9.8CVSS
9.2AI Score
0.0004EPSS
WWBN AVideo channelBody.php user name cross-site scripting (XSS) vulnerability
Talos Vulnerability Report TALOS-2023-1884 WWBN AVideo channelBody.php user name cross-site scripting (XSS) vulnerability January 10, 2024 CVE Number CVE-2023-47861 SUMMARY A cross-site scripting (xss) vulnerability exists in the channelBody.php user name functionality of WWBN AVideo 11.6 and dev.....
9CVSS
5.8AI Score
0.001EPSS
WWBN AVideo userRecoverPass.php captcha validation recovery notification bypass vulnerability
Talos Vulnerability Report TALOS-2023-1897 WWBN AVideo userRecoverPass.php captcha validation recovery notification bypass vulnerability January 10, 2024 CVE Number CVE-2023-50172 SUMMARY A recovery notification bypass vulnerability exists in the userRecoverPass.php captcha validation...
5.3CVSS
5.4AI Score
0.0004EPSS
GTKWave VZT vzt_rd_process_block autosort out-of-bounds write vulnerabilities
Talos Vulnerability Report TALOS-2023-1817 GTKWave VZT vzt_rd_process_block autosort out-of-bounds write vulnerabilities January 8, 2024 CVE Number CVE-2023-39235,CVE-2023-39234 SUMMARY Multiple out-of-bounds write vulnerabilities exist in the VZT vzt_rd_process_block autosort functionality of...
7.8CVSS
7.7AI Score
0.001EPSS
GTKWave VZT vzt_rd_block_vch_decode dict parsing integer overflow vulnerabilities
Talos Vulnerability Report TALOS-2023-1815 GTKWave VZT vzt_rd_block_vch_decode dict parsing integer overflow vulnerabilities January 8, 2024 CVE Number CVE-2023-38653,CVE-2023-38652 SUMMARY Multiple integer overflow vulnerabilities exist in the VZT vzt_rd_block_vch_decode dict parsing...
7.8CVSS
8AI Score
0.001EPSS
Themebleed Windows 11 Themes Arbitrary Code Execution Exploit
When an unpatched Windows 11 host loads a theme file referencing an msstyles file, Windows loads the msstyles file, and if that file's PACKME_VERSION is 999, it then attempts to load an accompanying dll file ending in _vrf.dll. Before loading that file, it verifies that the file is signed. It does....
8.8CVSS
7AI Score
0.905EPSS
k-tune.org Cross Site Scripting vulnerability OBB-3828780
Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified the website operator about its existence. Technical details of the vulnerability are currently...
6.2AI Score
8.8CVSS
7.4AI Score
0.905EPSS