CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: Microsoft has released the Windows 11 KB5050009 and KB5050021 cumulative updates for versions 24H2 and 23H2 to fix security vulnerabilities and issues. [...]
Source: BleepingComputer
January 14th, 2025 (6 months ago)
Description: An ongoing campaign targeting FortiGate devices with management interfaces exposed on the public Internet is leading to unauthorized administrative logins and configuration changes, creating new accounts, and performing SSL VPN authentication.
Source: Dark Reading
January 14th, 2025 (6 months ago)
Description: A weakness in Google's OAuth "Sign in with Google" feature could enable attackers that register domains of defunct startups to access sensitive data of former employee accounts linked to various software-as-a-service (SaaS) platforms. [...]
Source: BleepingComputer
January 14th, 2025 (6 months ago)
Description: New research has pulled back the curtain on a "deficiency" in Google's "Sign in with Google" authentication flow that exploits a quirk in domain ownership to gain access to sensitive data. "Google's OAuth login doesn't protect against someone purchasing a failed startup's domain and using it to re-create email accounts for former employees," Truffle Security co-founder and CEO Dylan Ayrey said
Source: TheHackerNews
January 14th, 2025 (6 months ago)

CVE-2024-44243

Description: Microsoft has shed light on a now-patched security flaw impacting Apple macOS that, if successfully exploited, could have allowed an attacker running as "root" to bypass the operating system's System Integrity Protection (SIP) and install malicious kernel drivers by loading third-party kernel extensions. The vulnerability in question is CVE-2024-44243 (CVSS score: 5.5), a medium-severity bug

EPSS Score: 0.05%

Source: TheHackerNews
January 14th, 2025 (6 months ago)
Description: Summary Gradio's Access Control List (ACL) for file paths can be bypassed by altering the letter case of a blocked file or directory path. This vulnerability arises due to the lack of case normalization in the file path validation logic. On case-insensitive file systems, such as those used by Windows and macOS, this flaw enables attackers to circumvent security restrictions and access sensitive files that should be protected. This issue can lead to unauthorized data access, exposing sensitive information and undermining the integrity of Gradio's security model. Given Gradio's popularity for building web applications, particularly in machine learning and AI, this vulnerability may pose a substantial threat if exploited in production environments. Affected Version Gradio <= 5.6.0 Impact Unauthorized Access: Sensitive files or directories specified in blocked_paths can be accessed by attackers. Data Exposure: Critical files, such as configuration files or user data, may be leaked. Security Breach: This can lead to broader application or system compromise if sensitive files contain credentials or API keys. Root Cause The blocked_paths parameter in Gradio block's initial configuration is designed to restrict user access to specific files or directories in the local file system. However, it does not account for case-insensitive operating systems, such as Windows and macOS. This oversight enables attackers to bypass ACL restrictions by changing the case of file paths. Vulner...
Source: Github Advisory Database (PIP)
January 14th, 2025 (6 months ago)
Description: Summary When the Vyper Compiler uses the precompiles EcRecover (0x1) and Identity (0x4), the success flag of the call is not checked. As a consequence an attacker can provide a specific amount of gas to make these calls fail but let the overall execution continue. Then the execution result can be incorrect. Based on EVM's rules, after the failed precompile the remaining code has only 1/64 of the pre-call-gas left (as 63/64 were forwarded and spent). Hence, only fairly simple executions can follow the failed precompile calls. Therefore, we found no significantly impacted real-world contracts. Details The relevant precompiles EcRecover EcRecover is used in vyper's ecrecover built-in. As the precompile consumes 3000 gas, any execution after an out-of-gas EcRecover call has at most 47 gas left. Identity The Identity precompile is used in vyper to perform memory copy operations. As its cost is variable, a variable amount of gas might be left after a failed call. The bigger the copy operation, the more gas can be left. Hence, a failed call to Identity could theoretically be followed by successful storage changes or emitted events. Identity is no longer used when evm-version cancun is used (because MCOPY is used instead). In 0.4.0 cancun is default, in 0.3.10 cancun is an option, otherwise cancun is not available. As only pre-cancun versions are relevant, we don't have to consider transient storage operations succeeding a failed call to Identity. The other precompiles Calls to...
Source: Github Advisory Database (PIP)
January 14th, 2025 (6 months ago)
Description: Chicano Federation of San Diego County Has Fallen Victim to RHYSIDA Ransomware
Source: DarkWebInformer
January 14th, 2025 (6 months ago)
Description: The University of Oklahoma Has Fallen Victim to FOG Ransomware
Source: DarkWebInformer
January 14th, 2025 (6 months ago)
Description: BOART & WIRE S.R.L Has Fallen Victim to Sarcoma Ransomware
Source: DarkWebInformer
January 14th, 2025 (6 months ago)