Dynmx – Signature-based Detection Of Malware Features Based On Windows API Call Sequences
dynmx (spoken dynamics) is a signature-based detection approach for behavioural malware features based on Windows API call sequences. In a...
dynmx (spoken dynamics) is a signature-based detection approach for behavioural malware features based on Windows API call sequences. In a...
Company Name: b'Nord Security' Company HackerOne URL: https://hackerone.com/nordsecurity Submitted By:b'yozzo_'Link to Submitters Profile:https://hackerone.com/b'yozzo_' Report Title:b'Email verification bypass for manual connection...
The Information provided at the time of posting was detected as "Posh C2". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Posh C2". Depending on when you are viewing this...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
NAME__________Hotel Druid SQL injectionPlatforms Affected:HotelDruid HotelDruid 3.0.5Risk Level:6.5Exploitability:HighConsequences:Data Manipulation DESCRIPTION__________Hotel Druid is vulnerable to SQL injection. A remote attacker could...
NAME__________Fl3xx Dispatch app for iOS and Fl3xx Crew privilege escalationPlatforms Affected:Fl3xx Fl3xx Dispatch app for iOS 2.10.37 Fl3xx Fl3xx Crew...
NAME__________Mastodon spoofingPlatforms Affected:Mastodon Mastodon 4.2.0-beta1Risk Level:7.7Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Mastodon could allow a remote attacker to conduct spoofing attacks, caused by an...
NAME__________Fl3xx Dispatch app for iOS and Fl3xx Crew file uploadPlatforms Affected:Fl3xx Fl3xx Dispatch app for iOS 2.10.37 Fl3xx Fl3xx Crew...
NAME__________Nozomi Networks Guardian and CMC denial of servicePlatforms Affected:Nozomi Networks Guardian/CMC 22.6.1Risk Level:7.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Nozomi Networks Guardian and CMC...
NAME__________Progress MOVEit Transfer cross-site scriptingPlatforms Affected:Progress MOVEit Transfer 2018 SP2 (10.2) Progress MOVEit Transfer 2019 (11.0) Progress MOVEit Transfer 2019.1...
NAME__________Snapview Tungstenite crate for Rust denial of servicePlatforms Affected:Snapview Tungstenite crate for Rust 0.20.0Risk Level:7.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Snapview Tungstenite crate...
NAME__________Mastodon server-side request forgeryPlatforms Affected:Mastodon Mastodon 4.2.0-beta1Risk Level:5.4Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Mastodon is vulnerable to server-side request forgery, caused by improper input...
NAME__________Ashlar-Vellum Cobalt code executionPlatforms Affected:Ashlar-Vellum CobaltRisk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Ashlar-Vellum Cobalt could allow a remote attacker to execute arbitrary code on...
NAME__________AMD Driver Execution Environment (DXE) driver information disclosurePlatforms Affected:AMD 3rd Generation EPYC AMD Ryzen 5000 Series processors AMD Ryzen 4000...
NAME__________Dell SCG Policy Manager man-in-the-middlePlatforms Affected:Dell EMC SCG Policy Manager 5.16.00.14Risk Level:5.9Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Dell SCG Policy Manager is vulnerable to...
NAME__________iCMS cross-site request forgeryPlatforms Affected:iCMS iCMS 7.0.16Risk Level:7.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________iCMS is vulnerable to cross-site request forgery, caused by improper validation...