CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: Brave has announced a new feature in its latest desktop release (version 1.75) that allows advanced users to inject custom JavaScript scriptlets into web pages. This functionality offers users greater control over their browsing experience while maintaining strong privacy protections. Empowering users with custom scriptlets Brave has long positioned itself as a privacy-first browser, blocking … The post Brave Introduces Custom Scriptlets for Advanced Privacy Options appeared first on CyberInsider.
Source: CyberInsider
February 10th, 2025 (5 months ago)
Description: The newspaper company expects the investigation to take some time, but said in an SEC filing that it has not yet identified any material impact.
Source: Dark Reading
February 10th, 2025 (5 months ago)

CVE-2024-13209

Description: Summary Stored XSS in REDAXO 5.18.1 - Article / "content/edit". Details On the latest version of Redaxo, v5.18.1, the article name field is susceptible to stored XSS. Impact A malicious actor can easily steal cookie using this stored XSS and perform a session hijacking attack. References https://github.com/redaxo/redaxo/security/advisories/GHSA-7wj8-856p-qc9m https://nvd.nist.gov/vuln/detail/CVE-2024-13209 https://github.com/redaxo/redaxo/commit/74d7391571a29a455a0c477973bc25d25710e424 https://geochen.medium.com/redaxo-cms-5-18-1-cross-site-scripting-7c9a872c72f6 https://github.com/advisories/GHSA-7wj8-856p-qc9m

CVSS: MEDIUM (5.1)

Source: Github Advisory Database (Composer)
February 10th, 2025 (5 months ago)
Description: A Threat Actor Claims to be Selling the Data of Cin Learn
Source: DarkWebInformer
February 10th, 2025 (5 months ago)
Description: Today, an Alabama man pleaded guilty to hijacking the U.S. Securities and Exchange Commission (SEC) account on X in a January 2024 SIM swapping attack. [...]
Source: BleepingComputer
February 10th, 2025 (5 months ago)
Description: Belsen_Group is Allegedly Selling RCE Access to an Unidentified Manufacturing Company in North Africa
Source: DarkWebInformer
February 10th, 2025 (5 months ago)
Description: A Threat Actor Claims to have Leaked the Data and Source Code of Circuito Mágico del Agua
Source: DarkWebInformer
February 10th, 2025 (5 months ago)
Description: Summary esbuild allows any websites to send any request to the development server and read the response due to default CORS settings. Details esbuild sets Access-Control-Allow-Origin: * header to all requests, including the SSE connection, which allows any websites to send any request to the development server and read the response. https://github.com/evanw/esbuild/blob/df815ac27b84f8b34374c9182a93c94718f8a630/pkg/api/serve_other.go#L121 https://github.com/evanw/esbuild/blob/df815ac27b84f8b34374c9182a93c94718f8a630/pkg/api/serve_other.go#L363 Attack scenario: The attacker serves a malicious web page (http://malicious.example.com). The user accesses the malicious web page. The attacker sends a fetch('http://127.0.0.1:8000/main.js') request by JS in that malicious web page. This request is normally blocked by same-origin policy, but that's not the case for the reasons above. The attacker gets the content of http://127.0.0.1:8000/main.js. In this scenario, I assumed that the attacker knows the URL of the bundle output file name. But the attacker can also get that information by Fetching /index.html: normally you have a script tag here Fetching /assets: it's common to have a assets directory when you have JS files and CSS files in a different directory and the directory listing feature tells the attacker the list of files Connecting /esbuild SSE endpoint: the SSE endpoint sends the URL path of the changed files when the file is changed (new EventSource('/esbuild').addEventL...
Source: Github Advisory Database (NPM)
February 10th, 2025 (5 months ago)
Description: Impact There is a security vulnerability in outdated versions of Coinbase Wallet SDK. This does not directly affect users' keys, smart contracts, or funds. Patches Please update to version >= 4.3.0. References https://github.com/coinbase/coinbase-wallet-sdk/security/advisories/GHSA-8rgj-285w-qcq4 https://github.com/advisories/GHSA-8rgj-285w-qcq4
Source: Github Advisory Database (NPM)
February 10th, 2025 (5 months ago)
Description: Summary There is a possibility for denial of service by memory exhaustion in net-imap's response parser. At any time while the client is connected, a malicious server can send can send highly compressed uid-set data which is automatically read by the client's receiver thread. The response parser uses Range#to_a to convert the uid-set data into arrays of integers, with no limitation on the expanded size of the ranges. Details IMAP's uid-set and sequence-set formats can compress ranges of numbers, for example: "1,2,3,4,5" and "1:5" both represent the same set. When Net::IMAP::ResponseParser receives APPENDUID or COPYUID response codes, it expands each uid-set into an array of integers. On a 64 bit system, these arrays will expand to 8 bytes for each number in the set. A malicious IMAP server may send specially crafted APPENDUID or COPYUID responses with very large uid-set ranges. The Net::IMAP client parses each server response in a separate thread, as soon as each responses is received from the server. This attack works even when the client does not handle the APPENDUID or COPYUID responses. Malicious inputs: # 40 bytes expands to ~1.6GB: "* OK [COPYUID 1 1:99999999 1:99999999]\r\n" # Worst *valid* input scenario (using uint32 max), # 44 bytes expands to 64GiB: "* OK [COPYUID 1 1:4294967295 1:4294967295]\r\n" # Numbers must be non-zero uint32, but this isn't validated. Arrays larger than # UINT32_MAX can be created. For example, the following would theoretically ...
Source: Github Advisory Database (RubyGems)
February 10th, 2025 (5 months ago)