North Korean threat actors planted 67 malicious packages in the Node Package Manager (npm) online repository to deliver a new malware loader called XORIndex to developer systems. [...]
Beware! SVG images are now being used with obfuscated JavaScript for stealthy redirect attacks via spoofed emails. Get insights from Ontinue's latest research on detection and defence.
A new Konfety Android malware variant uses a malformed ZIP and obfuscation to evade detection, posing as fake apps with no real functionality. Zimperium zLabs researchers are tracking a new, sophisticated Konfety Android malware variant that uses an “evil-twin” tactic and duplicate package names to avoid detection. The new Konfety malware variants use malformed ZIP, […]
A vulnerability was found in gaizhenbiao ChuanhuChatGPT up to 20240410. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to server-side request forgery.
This vulnerability is known as CVE-2024-5822. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in Apache Superset up to 4.0.x and classified as critical. Affected by this issue is the function query_to_xml_and_xmlschema/table_to_xml/table_to_xml_and_xmlschema. The manipulation leads to sql injection.
This vulnerability is handled as CVE-2024-53947. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Apache Hive up to 4.0.0. This vulnerability affects unknown code. The manipulation leads to incorrect permission assignment.
This vulnerability was named CVE-2024-29869. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Fortinet FortiClientMac up to 7.0.10/7.2.3. It has been rated as critical. Affected by this issue is some unknown functionality of the file /tmp of the component Configuration File Handler. The manipulation leads to file inclusion.
This vulnerability is handled as CVE-2023-45588. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in D-Link DIR-823G 1.0.2B05_20181207. Affected is the function SetDDNSSettings of the file /HNAP1/ of the component DDNS Service. The manipulation of the argument SOAPAction leads to improper authorization. This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability is traded as CVE-2025-2359. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to apply restrictive firewalling.
A vulnerability classified as critical was found in D-Link DIR-823G 1.0.2B05_20181207. Affected by this vulnerability is the function SetUpnpSettings of the file /HNAP1/ of the component UPnP Service. The manipulation of the argument SOAPAction leads to improper authorization. This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability is known as CVE-2025-2360. The attack can be launched remotely. Furthermore, there is an exploit available.
It is recommended to apply restrictive firewalling.
A vulnerability was found in Apache Cocoon. It has been classified as problematic. Affected is an unknown function. The manipulation leads to incorrect usage of seeds in prng.
This vulnerability is traded as CVE-2025-24783. Attacking locally is a requirement. There is no exploit available.
It is recommended to apply the suggested workaround.
A vulnerability was found in Apache Subversion up to 1.14.4. It has been rated as problematic. This issue affects the function mod_dav_svn of the component Incomplete Fix CVE-2013-1968. The manipulation leads to denial of service.
The identification of this vulnerability is CVE-2024-46901. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apache Hive 4.0.0-alpha-1. It has been classified as problematic. Affected is an unknown function of the component Metastore. The manipulation leads to deserialization.
This vulnerability is traded as CVE-2022-41137. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Wallet for WooCommerce Plugin up to 1.5.6 on WordPress. It has been classified as critical. Affected is an unknown function. The manipulation leads to incorrect conversion between numeric types.
This vulnerability is traded as CVE-2024-7747. It is possible to launch the attack remotely. There is no exploit available.
“The good news" is that China's Volt Typhoon hacking campaign "really failed," an NSA official said at a cyber conference in New York. An FBI official also described an incident of "true cyberwarfare" with the Flax Typhoon group.
An international law enforcement action dismantled a Romanian ransomware gang known as 'Diskstation,' which encrypted the systems of several companies in the Lombardy region, paralyzing their businesses. [...]
A vulnerability was found in mudler localai up to 2.9.x and classified as critical. This issue affects the function audioToWav. The manipulation leads to os command injection.
The identification of this vulnerability is CVE-2024-2029. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.