Theft of ETH that was not used for successful execution of orders in non-atomic execution

[Lines of code](https://github.com/code-423n4/2022-11-looksrare/blob/f4c90ca149f4aeeac125605a56166297b717201a/contracts/LooksRareAggregator.sol#L51) # Vulnerability details ## Description There is a ...

Continue Reading
Internet Bug Bounty: CVE-2023-40195: Apache Airflow Spark Provider Deserialization Vulnerability RCE

Apache Airflow Spark Provider. After the malicious Spark server address is configured through the connections of the Airflow UI interface, attackers exploit malicious servers to manipulate pyspark cli ...

Continue Reading
Theft of ETH that was not used for the successful execution of orders

[Lines of code](https://github.com/code-423n4/2022-11-non-fungible/blob/main/contracts/Exchange.sol#L168) # Vulnerability details ## Description There are execute and bulkExecute functions in Exchan ...

Continue Reading
#StopRansomware: LockBit 3.0 Ransomware Affiliates Exploit CVE 2023-4966 Citrix Bleed Vulnerability

SUMMARY Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware th ...

Continue Reading
Privilege escalation

A vulnerability was found in uTorrent. It has been rated as critical. Affected by this issue is some unknown functionality of the component JSON RPC Server. The manipulation leads to privilege escalat ...

Continue Reading
Internet Bug Bounty: CVE-2023-40195: Apache Airflow Spark Provider Deserialization Vulnerability RCE

Apache Airflow Spark Provider. After the malicious Spark server address is configured through the connections of the Airflow UI interface, attackers exploit malicious servers to manipulate pyspark cli ...

Continue Reading
#StopRansomware: LockBit 3.0 Ransomware Affiliates Exploit CVE 2023-4966 Citrix Bleed Vulnerability

SUMMARY Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware th ...

Continue Reading
Theft of ETH that was not used for successful execution of orders in non-atomic execution

[Lines of code](https://github.com/code-423n4/2022-11-looksrare/blob/f4c90ca149f4aeeac125605a56166297b717201a/contracts/LooksRareAggregator.sol#L51) # Vulnerability details ## Description There is a ...

Continue Reading

Back to Main

Subscribe for the latest news: