Lucene search

K

微信打赏(Wechat Reward) Security Vulnerabilities

code423n4
code423n4

Creating rewardTokens without streaming depositTokens

Handle bitbopper Vulnerability details Impact stake and withdraws can generate rewardTokens without streaming depositTokens. It does not matter whether the stream is a sale or not. The following lines can increase the reward balance on a withdraw some time after stake:...

6.7AI Score

2021-12-06 12:00 AM
6
code423n4
code423n4

Any arbitraryCall gathered airdrop can be stolen with recoverTokens

Handle hyh Vulnerability details Impact Any airdrop gathered with arbitraryCall will be immediately lost as an attacker can track arbitraryCall transactions and back run them with calls to recoverTokens, which doesn't track any tokens besides reward, deposit and incentive tokens, and will give the....

7AI Score

2021-12-06 12:00 AM
4
code423n4
code423n4

Storage variable unstreamed can be artificially inflated

Handle harleythedog Vulnerability details Impact The storage variable unstreamed keeps track of the global amount of deposit token in the contract that have not been streamed yet. This variable is a public variable, and users that read this variable likely want to use its value to determine...

6.7AI Score

2021-12-05 12:00 AM
6
hackread
hackread

Malvertising attack distributes malicious Chrome extensions, backdoors

By Waqas Researchers believe that the campaign has been active since 2018, and since then, the malware has been under development constantly. Cisco Talos researchers have identified malvertising campaigns using fake installers of popular games and applications, such as WeChat, Viber, Battlefield,.....

3.3AI Score

2021-12-04 05:13 PM
10
thn
thn

New Malvertising Campaigns Spreading Backdoors, Malicious Chrome Extensions

A series of malicious campaigns have been leveraging fake installers of popular apps and games such as Viber, WeChat, NoxPlayer, and Battlefield as a lure to trick users into downloading a new backdoor and an undocumented malicious Google Chrome extension with the goal of stealing credentials and.....

0.6AI Score

2021-12-03 10:59 AM
18
malwarebytes
malwarebytes

Here’s what data the FBI can get from WhatsApp, iMessage, Signal, Telegram, and more

Not every secure messaging app is as safe as it would like us to think. And some are safer than others. A recently disclosed FBI training document shows how much access to the content of encrypted messages from secure messaging services US law enforcement can gain and what they can learn about...

-0.1AI Score

2021-12-01 01:45 PM
26
code423n4
code423n4

UniswapHandler.maltMarketPrice returns wrong decimals

Handle cmichel Vulnerability details The UniswapHandler.maltMarketPrice function returns a tuple of the price and the decimals of the price. However, the returned decimals do not match the computed price for the else if (rewardDecimals < maltDecimals) branch: else if (rewardDecimals <...

6.8AI Score

2021-12-01 12:00 AM
5
code423n4
code423n4

RewardReinvestor.provideReinvest and splitReinvest are vulnerable to sandwich attacks as market price isn't checked

Handle hyh Vulnerability details Impact Liquidity provision can happen at a manipulated price which leads to immediate loss for liquidity provider (i.e. IL happens right after liquidity provision in this case). This yields direct loss for an LP account owner, for example (schematically): 0....

6.7AI Score

2021-12-01 12:00 AM
5
code423n4
code423n4

AbstractRewardMine.sol#setRewardToken is dangerous

Handle 0x0x0x Vulnerability details Impact In case the reward token is changed, totalDeclaredReward will be changed and likely equal to 0. Since _userStakePadding and _globalStakePadding are accumulated, changing the reward token will not reset those values. Thus, it will create problems....

6.8AI Score

2021-12-01 12:00 AM
5
code423n4
code423n4

MiningService _withdrawMultiple will fail most of the times

Handle hyh Vulnerability details Impact Impact depends on subtraction overflow handling and this way on the compiler version used for production deployment. If compiler version above 0.8: The compiler will check subtraction and fail, so: a user will have all withdrawals failed most of the times,...

7AI Score

2021-12-01 12:00 AM
5
code423n4
code423n4

onUnbond calculations incorrect leading to lost funds

Handle harleythedog Vulnerability details Impact Consider the stake padding example given in the contest description here: https://code4rena.com/contests/2021-11-malt-finance-contest. At the end of the example, User A has 100 bonded LP and has 100 stake padding. User B has 100 bonded LP and 200...

6.8AI Score

2021-12-01 12:00 AM
3
thn
thn

New Chinotto Spyware Targets North Korean Defectors, Human Rights Activists

North Korean defectors, journalists who cover North Korea-related news, and entities in South Korea are being zeroed in on by a nation-state-sponsored advanced persistent threat (APT) as part of a new wave of highly-targeted surveillance attacks. Russian cybersecurity firm Kaspersky attributed the....

-0.4AI Score

2021-11-29 01:14 PM
28
cnvd
cnvd

ZStack Remote Code Execution Vulnerability

ZStack is a product of Shanghai Cloud Axis Information Technology Co. The ZStack remote code execution vulnerability can be exploited by attackers to execute arbitrary code to gain control of the...

6AI Score

2021-11-29 12:00 AM
6
cve
cve

CVE-2021-40833

A vulnerability affecting F-Secure antivirus engine was discovered whereby unpacking UPX file can lead to denial-of-service. The vulnerability can be exploited remotely by an attacker. A successful attack will result in denial-of-service of the antivirus...

5.5CVSS

5.4AI Score

0.001EPSS

2021-11-26 05:15 PM
16
nvd
nvd

CVE-2021-40833

A vulnerability affecting F-Secure antivirus engine was discovered whereby unpacking UPX file can lead to denial-of-service. The vulnerability can be exploited remotely by an attacker. A successful attack will result in denial-of-service of the antivirus...

5.5CVSS

0.001EPSS

2021-11-26 05:15 PM
1
prion
prion

Denial of service

A vulnerability affecting F-Secure antivirus engine was discovered whereby unpacking UPX file can lead to denial-of-service. The vulnerability can be exploited remotely by an attacker. A successful attack will result in denial-of-service of the antivirus...

5.5CVSS

5.5AI Score

0.001EPSS

2021-11-26 05:15 PM
4
cvelist
cvelist

CVE-2021-40833 Denial-of-Service (DoS) Vulnerability

A vulnerability affecting F-Secure antivirus engine was discovered whereby unpacking UPX file can lead to denial-of-service. The vulnerability can be exploited remotely by an attacker. A successful attack will result in denial-of-service of the antivirus...

5.5CVSS

5.7AI Score

0.001EPSS

2021-11-26 04:39 PM
1
malwarebytes
malwarebytes

“Free Steam games” videos promise much, deliver malware

Gamers are a hot target for scammers, especially in the run up to Christmas. Major games are released throughout the last few months of any year, and the FOMO (fear of missing out) is strong. Especially if said titles offer pre-order exclusive bonuses, or deals and discounts for a few weeks after.....

7.2AI Score

2021-11-24 04:46 PM
9
malwarebytes
malwarebytes

Windows Installer vulnerability becomes actively exploited zero-day

Sometimes the ways in which malicious code gets in the hands of cybercriminals is frustrating for those in the industry, and incomprehensible to those on the outside. A quick summary of the events in the history of this exploit: A researcher found a flaw in Windows Installer that would allow an...

7.8CVSS

8.2AI Score

0.004EPSS

2021-11-24 02:21 PM
154
threatpost
threatpost

Iranians Charged in Cyberattacks Against U.S. 2020 Election

The U.S. Department of Justice has unsealed charges against two Iranian nationals for cyberattacks against the U.S. 2020 presidential campaign, and there’s a $10 million reward offered for information on their activities. The two men, Seyyed Mohammad Hosein Musa Kazemi and Sajjad Kashian,...

6.9AI Score

2021-11-19 07:49 PM
25
malwarebytes
malwarebytes

Malwarebytes CrackMe – contest summary

On October 29 we published our third CrackMe Challenge and announced two parallel tracks for the contest: "The fastest solve" , and "The best write-up". In the first category ("The fastest solve" ), we got three winners already the first weekend following publication. Big congratulations to: **...

6.9AI Score

2021-11-19 06:18 PM
20
thn
thn

U.S. Charged 2 Iranian Hackers for Threatening Voters During 2020 Presidential Election

The U.S. government on Thursday unsealed an indictment that accused two Iranian nationals of their involvement in cyber-enabled disinformation and threat campaign orchestrated to interfere in the 2020 presidential elections by gaining access to confidential voter information from at least one...

6.8AI Score

2021-11-19 12:54 PM
19
ics
ics

Iranian Government-Sponsored APT Cyber Actors Exploiting Microsoft Exchange and Fortinet Vulnerabilities in Furtherance of Malicious Activities

Summary Actions to Take Today to Protect Against Iranian State-Sponsored Malicious Cyber Activity • Immediately patch software affected by the following vulnerabilities: CVE-2021-34473, 2018-13379, 2020-12812, and 2019-5591. • Implement multi-factor authentication. • Use strong, unique...

9.8CVSS

9.9AI Score

0.973EPSS

2021-11-19 12:00 PM
50
code423n4
code423n4

Transmuter yield can be gamed by only staking when yield is distributed

Handle cmichel Vulnerability details The Transmuter.distribute function distributes the yield to the buffer which is then distributed to all stakers over a TRANSMUTATION_PERIOD, see runPhasedDistribution and updateAccount. If the elapsed time from the last phase distribution is greater than the...

7AI Score

2021-11-18 12:00 AM
4
githubexploit
githubexploit

Exploit for Improper Authentication in Apache Shenyu

Apache ShenYu Admin爆出身份验证绕过漏洞,攻击者可通过该漏洞绕过JSON Web Token...

9.8CVSS

1.8AI Score

0.932EPSS

2021-11-17 08:33 AM
156
huntr
huntr

Path Traversal in welliamcao/opsmanage

漏洞 README.md文件中的nginx配置存在安全漏洞,导致恶意攻击者可以任意读取项目中的文件。 # POC 对于github上的demo地址,一种可行的攻击方式为: http://42.194.214.22:8000/static../ 可以看到读取到整个项目的文件。如果用户对该项目进行过二开,并在init.sql,conf/中写入了一些敏感信息,可能造成较大危害 影响...

0.1AI Score

2021-11-15 02:53 AM
6
securelist
securelist

Streaming wars continue — what about cyberthreats?

Last year became a banner year for the online entertainment industry. Driven by the pandemic lockdown restrictions and imposed work-from-home policies, people got to spend more time at home looking for replacements for familiar sources of entertainment. While theatres and sports stadiums suffered.....

7AI Score

2021-11-10 10:00 AM
11
thn
thn

U.S. Charges Ukrainian Hacker for Kaseya Attack; Seizes $6 Million from REvil Gang

The U.S. government on Monday charged a Ukrainian suspect, arrested in Poland last month, with deploying REvil ransomware to target multiple businesses and government entities in the country, including perpetrating the attack against software company Kaseya, marking the latest action to crack down....

6.8AI Score

2021-11-09 05:38 AM
33
krebs
krebs

REvil Ransom Arrest, $6M Seizure, and $10M Reward

The U.S. Department of Justice today announced the arrest of Ukrainian man accused of deploying ransomware on behalf of the REvil ransomware gang, a Russian-speaking cybercriminal collective that has extorted hundreds of millions from victim organizations. The DOJ also said it had seized $6.1...

6.9AI Score

2021-11-09 02:05 AM
20
cnvd
cnvd

SAP Business Technology Platform信息泄露漏洞

SAP Business Technology Platform is a business technology platform from SAP Germany that integrates intelligent enterprise applications with database and data management, analytics, integration and extension capabilities into a single platform for cloud and hybrid environments, including hundreds.....

5.9CVSS

1.8AI Score

0.002EPSS

2021-11-09 12:00 AM
9
packetstorm

7.1AI Score

2021-11-09 12:00 AM
277
kitploit
kitploit

Kunyu - More Efficient Corporate Asset Collection

Kunyu, More Efficient Corporate Asset Collection 0x00 Introduce Tool introduction Kunyu (kunyu), whose name is taken from , is actually a professional subject related to geographic information, which counts the geographic information of the sea, land, and sky. The same applies to cyberspace....

6.1AI Score

2021-11-08 11:30 AM
15
malwarebytes
malwarebytes

Wanted! US offers $10m bounty for ransomware kingpins

The US State Department is offering a massive $10 million reward if you can help bring DarkSide to justice. The U.S. Department of State announces a reward offer of up to $10,000,000 for information leading to the identification or location of any individual(s) who hold(s) a key leadership...

6.4AI Score

2021-11-05 02:29 PM
37
threatpost
threatpost

Feds Offer $10 Million Bounty for DarkSide Info

The federal government has upped the ante in its fight against ransomware by offering a $10 million reward for information leading to the identification or location of leaders of the DarkSide ransomware group. The U.S. Department of State unveiled the reward on Thursday, adding a $5 million reward....

6.8AI Score

2021-11-05 01:03 PM
10
thn
thn

U.S. Offers $10 Million Reward for Information on DarkSide Ransomware Group

The U.S. government on Thursday announced a $10 million reward for information that may lead to the identification or location of key individuals who hold leadership positions in the DarkSide ransomware group or any of its rebrands. On top of that, the State Department is offering bounties of up...

6.8AI Score

2021-11-05 09:36 AM
14
githubexploit

7.8CVSS

3.1AI Score

0.0004EPSS

2021-11-05 06:36 AM
75
cnvd
cnvd

Logging audit system of Deep Impact Technology Co. is vulnerable to a logic flaw

Ltd. is a provider of products and services focused on enterprise-class security, cloud computing, IT infrastructure and Internet of Things. A logic flaw vulnerability exists in the log auditing system of Deep Impact Technology Co., Ltd. which can be exploited by attackers to arbitrarily reset...

5AI Score

2021-11-05 12:00 AM
5
hackread
hackread

US offers $10m reward for decisive info on DarkSide ransomware gang

By Waqas The US is offering $10 million to anyone who can provide information to law enforcement authorities on the infamous DarkSide ransomware gang that may help in locating and arresting its operators. This is a post from HackRead.com Read the original post: US offers $10m reward for decisive...

6.8AI Score

2021-11-04 11:52 PM
8
cnvd
cnvd

Liaoning Vtime Technology 188Jianzhan SQL Injection Vulnerability

Liaoning Vtime Technology 188Jianzhan is an open source website builder from Liaoning Vtime Technology. 188Jianzhan v2.1.0 is vulnerable to SQL injection. The vulnerability is caused by a lack of valid restrictions and escaping of the username parameter in login.php. An attacker could use this...

9.8CVSS

3.6AI Score

0.002EPSS

2021-11-03 12:00 AM
9
securelist
securelist

Spam and phishing in Q3 2021

Quarterly highlights Scamming championship: sports-related fraud This summer and early fall saw some major international sporting events. The delayed Euro 2020 soccer tournament was held in June and July, followed by the equally delayed Tokyo Olympics in August. Q3 2021 also featured several F1...

7.8CVSS

0.1AI Score

0.974EPSS

2021-11-01 12:00 PM
467
cnvd
cnvd

Fortinet FortiManager VM和FortiAnalyzer Vm信息泄露漏洞

Fortinet FortiManager VM is a centralized network security management platform for virtual machines. FortiAnalyzer Vm is a virtual machine that provides the ability to group devices into different management domains (ADOMs) for security deployment and management. FortiAnalyzer Vm is a virtual...

3.2CVSS

2.1AI Score

0.0004EPSS

2021-10-29 12:00 AM
7
threatpost
threatpost

Grief Ransomware Targets NRA

A ransomware group tied to Russia claims to have stolen data from the National Rifle Association (NRA) in a ransomware attack on the controversial gun-rights group, which has declined to comment on the situation. The Grief ransomware gang listed the NRA as a victim of its nefarious activity on its....

-0.1AI Score

2021-10-28 12:07 PM
10
code423n4
code423n4

ReferralFeePoolV0.sol#claimRewardAsMochi() Array out of bound exception

Handle WatchPug Vulnerability details function claimRewardAsMochi() external { IUSDM usdm = engine.usdm(); address[] memory path = new address ; path[0] = address(usdm); path[1] = uniswapRouter.WETH(); path[2] = address(engine.mochi()); ...

6.9AI Score

2021-10-27 12:00 AM
4
code423n4
code423n4

Missing slippage checks

Handle cmichel Vulnerability details The contracts are missing slippage checks which can lead to being vulnerable to sandwich attacks. A common attack in DeFi is the sandwich attack. Upon observing a trade of asset X for asset Y, an attacker frontruns the victim trade by also buying asset Y, lets.....

7.1AI Score

2021-10-27 12:00 AM
6
githubexploit
githubexploit

Exploit for Use After Free in Google Chrome

CVE-2021-30573-PoC-Google-Chrome Google Chrome Use After...

8.8CVSS

8.9AI Score

0.008EPSS

2021-10-25 01:25 PM
112
ics
ics

Ongoing Cyber Threats to U.S. Water and Wastewater Systems

Summary Immediate Actions WWS Facilities Can Take Now to Protect Against Malicious Cyber Activity • Do not click on suspicious links. _• If you use RDP, secure and monitor it. • _Use strong passwords. • Use multi-factor authentication. Note: This advisory uses the MITRE Adversarial...

9.8AI Score

2021-10-25 12:00 PM
11
code423n4
code423n4

Referrer can drain ReferralFeePoolV0

Handle gzeon Vulnerability details Impact function claimRewardAsMochi in ReferralFeePoolV0.sol did not reduce user reward balance, allowing referrer to claim the same reward repeatedly and thus draining the fee pool. Proof of Concept L28-47 did not reduce user reward balance Tools Used None...

6.9AI Score

2021-10-25 12:00 AM
5
cnvd
cnvd

WordPress Wechat Reward plugin cross-site request forgery vulnerability

WordPress is a set of blogging platform developed by the Wordpress Foundation using the PHP language. The platform supports the hosting of personal blog sites on servers with PHP and MySQL. A cross-site request forgery vulnerability exists in the WordPress Wechat Reward plugin in versions 1.7 and.....

5.4CVSS

1.9AI Score

0.001EPSS

2021-10-24 12:00 AM
5
cnvd
cnvd

Oracle PeopleSoft Enterprise信息泄露漏洞

Oracle PeopleSoft Products is an enterprise human capital management solution from Oracle Corporation. An information disclosure vulnerability exists in the Supplier Portal component of Oracle PeopleSoft Enterprise SCM version 9.2. An attacker could compromise Oracle PeopleSoft Enterprise SCM by...

2.1AI Score

2021-10-22 12:00 AM
12
code423n4
code423n4

takeOutRewardTokens(): epochs calculation should be rounded up

Handle hickuphh3 Vulnerability details Impact If the owner would like to remove rewards, the number of epochs affected could potentially be 1 less because solidity division rounds down, resulting in more rewards taken out than allowed. Proof of Concept Assume currentEpoch is 1000 end epoch is...

6.8AI Score

2021-10-21 12:00 AM
4
Total number of security vulnerabilities8399