(Pwn2Own) Cisco RV340 JSON RPC file-copy Command Injection Local Privilege Escalation Vulnerability

This vulnerability allows local attackers to escalate privileges on affected installations of Cisco RV340 routers. An attacker must first obtain the ability to execute low-privileged code on the targe ...

Continue Reading
Duo of Android dropper and payload target certain countries and app users

After making its first in-the-wild appearance in March 2021, Vultur—an information-stealing RAT that runs on Android—is back. And its dropper is equally nasty. Vultur (Romanian for "vulture") is kno ...

Continue Reading
Incorrect Access Control in github.com/nats-io/jwt and github.com/nats-io/nats-server/v2

NATS Server 2.x before 2.2.0 and JWT library before 2.0.1 have Incorrect Access Control because Import Token bindings are mishandled.Read More ...

Continue Reading
Incorrect Access Control in github.com/nats-io/jwt and github.com/nats-io/nats-server/v2

NATS Server 2.x before 2.2.0 and JWT library before 2.0.1 have Incorrect Access Control because Import Token bindings are mishandled.Read More ...

Continue Reading
Import token permissions checking not enforced

(This advisory is canonically ) ## Problem Description The NATS server provides for Subjects which are namespaced by Account; all Subjects are supposed to be private to an account, with an Export/Impo ...

Continue Reading
Import token permissions checking not enforced

(This advisory is canonically ) ## Problem Description The NATS server provides for Subjects which are namespaced by Account; all Subjects are supposed to be private to an account, with an Export/Impo ...

Continue Reading
Nil dereference in NATS JWT, DoS of nats-server

## Problem Description The NATS account system has an Operator trusted by the servers, which signs Accounts, and each Account can then create and sign Users within their account. The Operator should ...

Continue Reading
Nil dereference in NATS JWT, DoS of nats-server

## Problem Description The NATS account system has an Operator trusted by the servers, which signs Accounts, and each Account can then create and sign Users within their account. The Operator should ...

Continue Reading

Back to Main

Subscribe for the latest news: