CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: A team of security researchers has disclosed new side-channel vulnerabilities in modern Apple processors that could steal sensitive information from web browsers. [...]
Source: BleepingComputer
January 28th, 2025 (5 months ago)

CVE-2024-45339

Description: When logs are written to a widely-writable directory (the default), an unprivileged attacker may predict a privileged process's log file path and pre-create a symbolic link to a sensitive file in its place. When that privileged process runs, it will follow the planted symlink and overwrite that sensitive file. To fix that, glog now causes the program to exit (with status code 2) when it finds that the configured log file already exists. References https://nvd.nist.gov/vuln/detail/CVE-2024-45339 https://github.com/golang/glog/pull/74 https://github.com/golang/glog/pull/74/commits/b8741656e406e66d6992bc2c9575e460ecaa0ec2 https://groups.google.com/g/golang-announce/c/H-Q4ouHWyKs https://owasp.org/www-community/vulnerabilities/Insecure_Temporary_File https://pkg.go.dev/vuln/GO-2025-3372 https://github.com/advisories/GHSA-6wxm-mpqj-6jpf

EPSS Score: 0.05%

Source: Github Advisory Database (Go)
January 28th, 2025 (5 months ago)
Description: A critical vulnerability was discovered in the ismp-grandpa crate, that allowed a malicious prover easily convince the verifier of the finality of arbitrary headers. Description The vulnerability manifests as a verifer that only accepts incorrect signatures of Grandpa precommits and was introduced in this specific commit. Perhaps due to unfamiliarity with core substrate APIs. The if statement should have included a negation check, similar to the previous code, but this was omitted. Causing the verifier to only accept invalid signatures. This vulnerability remained undetected even with integration tests, as the prover was also misconfigured to initialize the Grandpa verifier with the incorrect authority set_id. This causes verification of honest precommit signatures to fail as the message is now malformed, but the verifier indeed only accepts signatures or messages that fail the verification check. But even more devastatingly, the verifier will also accept malicious GRANDPA signatures for any precommit message. This vulnerability has been fixed in this commit and a patch release has been published. Impact This could be used to steal funds or compromise other kinds of cross-chain applications. Patches This vulnerability has been fixed in the latest version of ismp-granpda v15.0.1 Recommendations Users who rely on the compromised versions must upgrade immediately, as all vulnerable versions of the crate has been yanked. References https://github.com/polytope-labs/hyperbrid...
Source: Github Advisory Database (Rust)
January 28th, 2025 (5 months ago)
Description: A critical vulnerability was discovered in the ismp-grandpa crate, that allowed a malicious prover easily convince the verifier of the finality of arbitrary headers. Description The vulnerability manifests as a verifer that only accepts incorrect signatures of Grandpa precommits and was introduced in this specific commit. Perhaps due to unfamiliarity with core substrate APIs. The if statement should have included a negation check, similar to the previous code, but this was omitted. Causing the verifier to only accept invalid signatures. This vulnerability remained undetected even with integration tests, as the prover was also misconfigured to initialize the Grandpa verifier with the incorrect authority set_id. This causes verification of honest precommit signatures to fail as the message is now malformed, but the verifier indeed only accepts signatures or messages that fail the verification check. But even more devastatingly, the verifier will also accept malicious GRANDPA signatures for any precommit message. This vulnerability has been fixed in this commit and a patch release has been published. Impact This could be used to steal funds or compromise other kinds of cross-chain applications. Patches This vulnerability has been fixed in the latest version of ismp-granpda v15.0.1 Recommendations Users who rely on the compromised versions must upgrade immediately, as all vulnerable versions of the crate has been yanked. References https://github.com/polytope-labs/hyperbrid...
Source: Github Advisory Database (Rust)
January 28th, 2025 (5 months ago)
Description: A critical vulnerability was discovered in the ismp-grandpa crate, that allowed a malicious prover easily convince the verifier of the finality of arbitrary headers. Description The vulnerability manifests as a verifer that only accepts incorrect signatures of Grandpa precommits and was introduced in this specific commit. Perhaps due to unfamiliarity with core substrate APIs. The if statement should have included a negation check, similar to the previous code, but this was omitted. Causing the verifier to only accept invalid signatures. This vulnerability remained undetected even with integration tests, as the prover was also misconfigured to initialize the Grandpa verifier with the incorrect authority set_id. This causes verification of honest precommit signatures to fail as the message is now malformed, but the verifier indeed only accepts signatures or messages that fail the verification check. But even more devastatingly, the verifier will also accept malicious GRANDPA signatures for any precommit message. This vulnerability has been fixed in this commit and a patch release has been published. Impact This could be used to steal funds or compromise other kinds of cross-chain applications. Patches This vulnerability has been fixed in the latest version of ismp-granpda v15.0.1 Recommendations Users who rely on the compromised versions must upgrade immediately, as all vulnerable versions of the crate has been yanked. References https://github.com/polytope-labs/hyperbrid...
Source: Github Advisory Database (Rust)
January 28th, 2025 (5 months ago)
Description: An AI LinkedIn profile was "open to work," boasting it’s a better worker than a human.
Source: 404 Media
January 28th, 2025 (5 months ago)
Description: A Threat Actor Claims to be Selling 900+ Unreleased Databases
Source: DarkWebInformer
January 28th, 2025 (5 months ago)
Description: London-based engineering giant Smiths Group disclosed a security breach after unknown attackers gained access to the company's systems. [...]
Source: BleepingComputer
January 28th, 2025 (5 months ago)
Description: A financially motivated threat actor has been linked to an ongoing phishing email campaign that has been ongoing since at least July 2024 specifically targeting users in Poland and Germany. The attacks have led to the deployment of various payloads, such as Agent Tesla, Snake Keylogger, and a previously undocumented backdoor dubbed TorNet that's delivered by means of PureCrypter. TorNet is so
Source: TheHackerNews
January 28th, 2025 (5 months ago)
Description: A Threat Actor Claims to be Selling the Data of H&M (UAE)
Source: DarkWebInformer
January 28th, 2025 (5 months ago)