🍀Informationsportal für Sichterheitslücken Nachrichten
RSS Sicherheitslücken / Exploits abonnieren
Seite 1 von 3 Seiten (Bei Beitrag 1 - 100)
227x Beiträge in dieser Kategorie
Weiter 2 | Letzte Seite
[1] [ 2 ] [ 3 ]
➠ What is a Supply Chain Attack and How Can Organizations Defend Against Them?
Supply chain attacks are one of the most effective ways to compromise organizations because it targets the weakest link in the security chain.
Continue
➠ curl: curl file writing susceptible to symlink attacks
Summary: If curl command is used to download a file with predictable file name to a world writable directory (such as /tmp), a local attacker is able to
➠ Rackspace Blames Ransomware Woes On Zero-Day Attack
➠ #0daytoday #Zhuhai Suny Technology ESL Tag Forgery / Replay Attacks Vulnerability [#0day #Exploit]
➠ Yelp: If the website does not impose additional defense against CSRF attacks, failing to use the 'Lax' or 'Strict' values could increase the risk of exposur
Summary: [Cookies are typically sent to third parties in cross-origin requests. This can be abused to do CSRF attacks. Recently a new cookie attribute
➠ Internet Bug Bounty: potential denial of service attack via the locale parameter
In Django 3.2 before 3.2.16, 4.0 before 4.0.8, and 4.1 before 4.1.2, internationalized URLs were subject to a denial of service attack via the locale parameter,
➠ CVE-2022-3731 | seccome Ehoney /api/v1/attack/token Payload sql injection
A vulnerability has been found in seccome Ehoney and classified as critical. Affected by this vulnerability is an unknown functionality of the file /api/v1/attack/token.
➠ CVE-2022-3730 | seccome Ehoney /api/v1/attack/falco Payload sql injection
A vulnerability, which was classified as critical, was found in seccome Ehoney. Affected is an unknown function of the file /api/v1/attack/falco. The manipulation
➠ CVE-2022-3729 | seccome Ehoney /api/v1/attack AttackIP sql injection
A vulnerability, which was classified as critical, has been found in seccome Ehoney. This issue affects some unknown processing of the file /api/v1/attack.
➠ Hyperledger: POOL_UPGRADE request handler may allow an unauthenticated attacker to remotely execute code on every node in the network.
This issue is related to the https://github.com/hyperledger/indy-node. The issue was found in the indy-node code that handles the write request of type
➠ Reddit: IDOR allows an attacker to modify the links of any user
Hi team! I found an IDOR which allows to modify the links of any user. Users can put their custom links or social media links on their profile, ex: {F1855366}
➠ Hyperledger: fix(cmd-socketio-server): mitigate cross site scripting attack #2068
Please refer this fix and approve Bounty. See this In Github Security Fix @ryjones (https://github.com/hyperledger/cactus/pull/2068#issuecomment-1186157206)
➠ Internet Bug Bounty: Rails::Html::SafeListSanitizer vulnerable to xss attack in an environment that allows the style tag
It seems to be a problem caused by a difference between the nokogiri java implementation and the ruby implementation. jruby9.3.3.0 (nokogiri java), use
➠ curl: curl "globbing" can lead to denial of service attacks
Summary: [add summary of the vulnerability] The curl "globbing" allows too much scope, which can cause the server to be denied service
➠ Microsoft Releases Workaround For 1-Click 0-Day Under Active Attack
➠ APTs Overwhelmingly Share Known Vulnerabilities Rather Than Attack 0-Days
➠ Actively Attacked Microsoft Zero Day Allows App Spoofing
➠ Attackers Actively Target Windows Installer Zero-Day
➠ Apple Patches 3 More Zero-Days Under Active Attack
➠ Filtering and validating of CSV files to prevent XSS attack
The tax rate and product importer of CSV files were not properly filtered and validated against XSS.
`
This vulnerability affects the following application
➠ Automattic: Site information's Display Name section vulnerable for XSS attacks and HTML Injections.
Summary: Hi, Greetings. I have found that site information's Display Name section on the try.pressable.com is vulnerable for potential XSS attacks
➠ Exodus: 2 Cache Poisoning Attack Methods Affect Core Functionality www.exodus.com
Summary: www.exodus.com hosts static js and css files on Server: cloudflare . Which is cached by cloudflare and passed to all other users accessing the
➠ GnuPG 1.0.0 up to 1.4.15 Computer Processor Acoustic Side-Channel Attack credentials management
A vulnerability classified as problematic has been found in GnuPG. This affects an unknown code of the component Computer Processor. Upgrading to version
➠ Kaspersky: Several domains on kaspersky.com are vulnerable to Web Cache Deception attack
Reported security issue allowed a potential attacker to steal potentially sensitive information of users of a website, because multiple subdomains of the
➠ AA21-131A: DarkSide Ransomware: Best Practices for Preventing Business Disruption from Ransomware Attacks
Original release date: May 11, 2021SummaryThis Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework,
➠ Sifchain: Vulnerable for clickjacking attack
Summary: Hii Team, I know that I have reported to you outside of Scope. The report is related to the mentioned company and the vulnerability can endanger
➠ Sifchain: Possibility of DoS attack at https://sifchain.finance// via CVE-2018-6389 exploitation
There is possibility in /wp-admin/load-scripts.php script to generate large (~3Mb) amount of data via simple non-authenticated request to server. The vulnerability
➠ Sifchain: xmlrpc.php And /wp-json/wp/v2/users FILE IS enable it will used for bruteforce attack and denial of service
Hi Team :) i am abbas heybati ;) Summary: After reviewing the given scope, I realized that the main domain "http://sifchain.finance"
➠ Homebrew: Broken parsing of Git diff allows an attacker to inject arbitrary Ruby scripts to Casks on official taps
Description Due to improper parsing of Git diff in Homebrew/actions/review-cask-pr, it's possible to confuse parser to ignore additional lines.
➠ [remote] Remote Desktop Web Access - Authentication Timing Attack (Metasploit Module)
➠ TikTok: Lack of rate limitation on careers site allows the attacker to brute force the verification code
An attacker could have potentially attempted to brute force the verification code needed to reset a candidate's password by leveraging a lack
➠ Australian Cyber Security Centre Hit by Cyber Security Attack
The Australian Cyber Security Centre is on high alert for the vulnerability lately. The Australian corporate regulator has been the latest high-profile
➠ Khan Academy: Login page vulnerable to bruteforce attacks via rate limiting bypass
SUMMARY This report consists of two vulnerabilities. 1st vulnerability: I found out that there is a rate limiting in place after 25 failed attempts. Now
➠ Node.js third-party modules: [zenn-cli] Path traversal on Windows allows the attacker to read arbitrary .md files
Summary I would like to report path traversal in zenn-cli. It allows the attacker to read arbitrary .md files. Module module name: zenn-cli version: 0.1.39
➠ Agoric: Improper Input Validation allows an attacker to "double spend" or "respend", violating the integrity of the message command history or causing DoS
Summary: Improper Input Validation allows an attacker to "double spend" or "respend", violating the integrity of the
➠ Mattermost Server up to 5.9.5/5.14.4/5.15.1/5.16.0 Legacy Attackment Migration information disclosure
A vulnerability was found in Mattermost Server up to 5.9.5/5.14.4/5.15.1/5.16.0. It has been declared as problematic. Affected by this vulnerability is
➠ HackerOne: 2020-10-09 Credential Stuffing Attack
Executive summary On October 4, 2020 and October 5, 2020, an attacker launched two credential stuffing attacks against HackerOne.com. On October 9, 2020,
➠ [SA-CORE-2020-007] Added escaping to the API to prevent XSS attack
The Drupal AJAX API did not disable JSONP by default, which could lead to cross-site scripting.
This vulnerability affects the following application
➠ Mail.ru: Stored XSS that allow an attacker to read victim mailboxes contacts in mail.ru and my.com application
Mail.ru Mail IOS app was vulnerable to local files access on some iOS versions due to cross-application scripting if malcrafted SVG attachment is viewed
➠ h1-ctf: [H1-2006 2020] Bypassing access control checks by modifying the URL, internal application state, or the HTML page, or using a custom API attack tool
H1-2006 CTF Writeup {F859938} Summary: Access control enforces policy such that users cannot act outside of their intended permissions. Failures typically
➠ Greenhouse.io: SSH port on store.greenhouse.io is vulnerable to brute force attacks
➠ Node.js third-party modules: [wappalyzer] ReDoS allows an attacker to completely break Wappalyzer
NOTE! Thanks for submitting a report! Please replace all the [square] sections below with the pertinent details. Remember, the more detail you provide,
➠ Ruby on Rails: Rack parses encoded cookie names allowing an attacker to send malicious `__Host-` and `__Secure-` prefixed cookies
The rack cookie parser parses the cookie string using unescape. This allows a malicious attacker to set a second cookie with the name being percent encoded.
➠ Address Bar Spoofing Attacks by Safari Browser
Security researcher Rafay Baloch as of late discovered vulnerability in the Safari browser that purportedly enabled the attackers to take control of the
➠ A Critical Vulnerability Assisting Attackers in Gaining Access to Live Video Streaming
Researchers discover a rather critical vulnerability in the D-Link cloud camera that enabled attackers to hijack and intercept the camera in order to gain
➠ Multiple VPN Applications Allow Attackers to Sidestep Authentication; Assists in Taking Control of Affected Systems
Enterprise VPN applications created by Palo Alto Systems, Pulse Secure, Cisco, and F5 Networks are reportedly known to have been 'storing' authentication
➠ All Windows Versions Hit By A Vulnerability; Attackers Take Full Control Over Computer
A vulnerability that existed in every single current Window versions allowing an attacker to misuse the Windows Group Policy feature to assume full control
➠ OWASP ModSecurity Core Rule Set up to 3.1.0 REQUEST-933-APPLICATION-ATTACK-PHP.conf denial of service
A vulnerability, which was classified as problematic, was found in OWASP ModSecurity Core Rule Set up to 3.1.0. Affected is an unknown functionality of
➠ OWASP ModSecurity Core Rule Set up to 3.1.0 REQUEST-933-APPLICATION-ATTACK-PHP.conf denial of service
A vulnerability, which was classified as problematic, has been found in OWASP ModSecurity Core Rule Set up to 3.1.0. This issue affects an unknown function
➠ OWASP ModSecurity Core Rule Set up to 3.1.0 REQUEST-933-APPLICATION-ATTACK-PHP.conf denial of service
A vulnerability classified as problematic was found in OWASP ModSecurity Core Rule Set up to 3.1.0. This vulnerability affects some unknown processing
➠ OWASP ModSecurity Core Rule Set up to 3.1.0 REQUEST-932-APPLICATION-ATTACK-RCE.conf denial of service
A vulnerability classified as problematic has been found in OWASP ModSecurity Core Rule Set up to 3.1.0. This affects an unknown code block of the file
➠ OWASP ModSecurity Core Rule Set up to up to 3.1.0 REQUEST-942-APPLICATION-ATTACK-SQLI.conf sql injection
A vulnerability was found in OWASP ModSecurity Core Rule Set up to up to 3.1.0. It has been rated as critical. Affected by this issue is an unknown code
➠ HackerOne: Attacker with an Old account might still be able to DoS ctf.hacker101.com by sending a Crafted request
Summary: by sending a crafted request on ctf.hacker101.com a very long delay with a response of error 502 has been observed I suspect that if I made this
➠ Node.js third-party modules: Pixel flood attack cause the javascript heap out of memory
I would like to report Pixel flood attack in jimp It allows flooding the memory and causing DoS by uploading a crafted image (5kb image), and the Jimp