Using process creation properties to catch evasion techniques

We developed a robust detection method in [Microsoft Defender for Endpoint]() that can catch known and unknown variations of a process execution class used by attackers to evade detection. This class ...

Continue Reading
Robustel R1510 web_server /action/remove/ API data removal vulnerability

### Summary A data removal vulnerability exists in the web_server /action/remove/ API functionality of Robustel R1510 3.3.0. A specially-crafted network request can lead to arbitrary file deletion. An ...

Continue Reading
Robustel R1510 web_server action endpoints OS command injection vulnerabilities

### Summary Multiple command injection vulnerabilities exist in the web_server action endpoints functionalities of Robustel R1510 3.3.0. A specially-crafted network request can lead to arbitrary comma ...

Continue Reading
Robustel R1510 web_server ajax endpoints OS command injection vulnerabilities

### Summary Multiple command injection vulnerabilities exist in the web_server ajax endpoints functionalities of Robustel R1510 3.3.0. A specially-crafted network packets can lead to arbitrary command ...

Continue Reading
openSUSE 15 Security Update : chromium (openSUSE-SU-2022:10036-1)

The remote SUSE Linux SUSE15 host has packages installed that are affected by multiple vulnerabilities as referenced in the openSUSE-SU-2022:10036-1 advisory. - Use after free in Base. (CVE-2022-215 ...

Continue Reading
URL previews of unusual or maliciously-crafted pages can crash Synapse media repositories or Synapse monoliths

### Impact URL previews of some web pages can exhaust the available stack space for the Synapse process due to unbounded recursion. This is sometimes recoverable and leads to an error for the request ...

Continue Reading
URL previews of unusual or maliciously-crafted pages can crash Synapse media repositories or Synapse monoliths

### Impact URL previews of some web pages can exhaust the available stack space for the Synapse process due to unbounded recursion. This is sometimes recoverable and leads to an error for the request ...

Continue Reading
Leaky Access Tokens Exposed Amazon Photos of Users

The Amazon Photos app for Android insufficiently protected user access tokens, according to a blog post published on Wednesday. Theoretically, with exposed tokens, an attacker could’ve accessed users ...

Continue Reading

Back to Main

Subscribe for the latest news: