Skip to content
Threat Feed

January 2024 (30)

high advisory

Beghelli Sicuro24 SicuroWeb AngularJS Sandbox Escape via Template Injection

Beghelli Sicuro24 SicuroWeb is vulnerable to arbitrary JavaScript execution due to embedding an end-of-life AngularJS 1.5.2 component with known sandbox escape primitives combined with template injection, enabling attackers to compromise operator browser sessions via MITM attacks.

Sicuro24 SicuroWeb +1 cve-2026-41468 angularjs template-injection mitm
2r 1t 1c
critical advisory

Betheme WordPress Theme Arbitrary File Upload Vulnerability

The Betheme theme for WordPress is vulnerable to arbitrary file upload, allowing authenticated attackers with author-level privileges or higher to upload arbitrary files, including PHP, leading to remote code execution.

Betheme theme arbitrary-file-upload rce wordpress betheme
2r 1t 1c
medium advisory

changedetection.io Arbitrary Local File Read via Crafted Backup Restore

changedetection.io is vulnerable to arbitrary local file read due to insufficient validation of snapshot paths restored from backup files, allowing attackers to read sensitive files by crafting a malicious backup archive containing a manipulated `history.txt` file.

changedetection.io arbitrary-file-read vulnerability
2r 1t
medium advisory

ChatGPTNextWeb NextChat Improper Authorization Vulnerability (CVE-2026-7644)

CVE-2026-7644 is an improper authorization vulnerability in the addMcpServer function of ChatGPTNextWeb NextChat version 2.16.1 and earlier, allowing for potential remote exploitation following public disclosure of the exploit.

NextChat authorization cve-2026-7644 web-application
1r 1t 1c
high threat

ChatGPTNextWeb NextChat SSRF Vulnerability (CVE-2026-7178)

ChatGPTNextWeb NextChat versions up to 2.16.1 are vulnerable to server-side request forgery (SSRF) due to improper input validation in the storeUrl function, allowing remote attackers to potentially access internal resources or conduct other malicious activities.

exploited NextChat ssrf cve vulnerability web-application
2r 1t 1c
medium advisory

Chmod Activity Targeting Sensitive Linux Directories

Attackers may use chmod to modify file permissions within sensitive Linux directories such as /tmp/, /etc/, and /opt/ to maintain persistence, escalate privileges, or disrupt system operations.

defense-evasion privilege-escalation persistence linux
2r 1t
high advisory

Cisco ACI Multi-Site CloudSec Encryption Information Disclosure Vulnerability

A vulnerability in Cisco ACI Multi-Site CloudSec encryption allows a remote attacker to read or modify intersite encrypted traffic due to a flaw in cipher implementation.

Nexus 9000 Series Fabric Switches in ACI mode cve-2023-20185 information-disclosure network
2r 1t 1c
high advisory

Cisco ASA Logging Disabled via CLI

Detection of disabled logging functionality on a Cisco ASA device via CLI commands, indicating potential defense evasion by adversaries.

Adaptive Security Appliance defense-evasion cisco asa
2r
medium advisory

Cisco ASA Logging Filters Configuration Tampering

Tampering with logging filter configurations on Cisco ASA devices can allow attackers to evade detection by reducing logging levels or disabling specific log categories.

ASA +3 cisco logging evasion
2r 1t
high advisory

Cisco Secure Endpoint Tampering via SFC Utility

An attacker attempts to disable the Immunet Protect service of Cisco Secure Endpoint by leveraging the `sfc.exe` utility with the `-k` parameter, potentially blinding the EDR for further compromise.

Secure Endpoint +1 defense-evasion endpoint cisco
2r 1t
high advisory

Cisco Secure Endpoint Tampering via SFC Utility

The sfc.exe utility is being used with the '-unblock' parameter, a feature within Cisco Secure Endpoint, to remove system blocks imposed by the endpoint protection, potentially indicating an attempt to bypass security measures and execute blocked malicious payloads.

Secure Endpoint +3 defense-evasion endpoint cisco
2r
high advisory

Cisco Secure Endpoint Uninstallation via SFC Utility

The sfc.exe utility is used with the "-u" parameter to uninstall Cisco Secure Endpoint components, potentially disabling endpoint protection and facilitating further exploitation.

Secure Endpoint +3 security-solution-tampering endpoint windows
2r
high advisory

CKAN Unauthenticated SQL Injection in datastore_search_sql

An unauthenticated SQL injection vulnerability in CKAN's `datastore_search_sql` function allows attackers to access private resources and PostgreSQL system information, affecting versions prior to 2.10.10 and versions 2.11.0 through 2.11.4.

ckan sql-injection vulnerability
2r 1t
critical advisory

Cline Kanban Server Cross-Origin WebSocket Hijacking Vulnerability

The `kanban` npm package, used by the `cline` CLI, has a cross-origin WebSocket hijacking vulnerability. Due to the lack of Origin header validation, any website can connect to the kanban server via WebSocket and leak sensitive data, hijack running AI agent terminals leading to remote code execution, or kill running agent tasks, resulting in information disclosure, RCE, and denial of service.

cline +1 websocket cross-origin rce infoleak dos
3r 4t 1i
high advisory

Cobalt Strike PowerShell Loader Detection

This brief details a detection for a PowerShell loader pattern commonly used with Cobalt Strike to decompress and execute payloads, often observed in scripted web delivery attacks.

Splunk Enterprise +2 cobaltstrike powershell malware windows
2r 2t
medium advisory

Command Execution via ForFiles Utility

Adversaries may use the Windows forfiles utility to proxy command execution via a trusted parent process, potentially evading detection.

Microsoft Defender XDR +2 defense-evasion indirect-execution windows
2r 1t
high advisory

Command Obfuscation via Unicode Modifier Letters

Adversaries use Unicode modifier letters to obfuscate command-line arguments, evading string-based detections on common Windows utilities like PowerShell and cmd.exe.

Microsoft Defender XDR +5 defense-evasion command-line unicode obfuscation
2r 1t
low advisory

Component Object Model (COM) Hijacking via Registry Modification

Adversaries may establish persistence by executing malicious content triggered by hijacked references to COM objects through Component Object Model (COM) hijacking via registry modification on Windows systems.

Elastic Defend +9 persistence com-hijacking windows registry defense-evasion privilege-escalation
2r 4t
medium advisory

CVE-2019-1547 ECDSA Remote Timing Attack Vulnerability

CVE-2019-1547 is a security vulnerability that could allow a remote timing attack.

cve-2019-1547 timing-attack ecdsa
2r
medium advisory

CVE-2026-28390 NULL Dereference in CMS KeyTransportRecipientInfo Processing

CVE-2026-28390 is a vulnerability related to a possible NULL pointer dereference when processing CMS KeyTransportRecipientInfo, potentially leading to a denial-of-service condition.

vulnerability denial-of-service
2r 1c
high advisory

CVE-2026-7337 Type Confusion Vulnerability in Chromium V8 Engine

CVE-2026-7337 is a type confusion vulnerability in the V8 JavaScript engine that affects Google Chrome and Microsoft Edge (Chromium-based).

Chrome +1 type confusion v8 engine chromium cve-2026-7337
2r 1t 1c
critical advisory

D-Link DI-8100 Remote Buffer Overflow Vulnerability (CVE-2026-7853)

D-Link DI-8100 version 16.07.26A1 is vulnerable to a remote buffer overflow in the `sprintf` function within the `/auto_reboot.asp` file's HTTP handler component due to improper handling of the `enable/time` argument, potentially leading to arbitrary code execution.

DI-8100 buffer overflow remote code execution d-link cve-2026-7853
2r 1t 1c
high advisory

Deletion of Critical Scheduled Tasks

Adversaries delete critical scheduled tasks, such as those related to BitLocker, ExploitGuard, System Restore, Windows Defender, and Windows Update, to disrupt security measures and enable data destruction.

Windows attack.impact attack.t1489
2r 1t
medium advisory

Denial of Service Vulnerability in marked via Infinite Recursion

A denial of service vulnerability exists in marked version 18.0.0 due to infinite recursion when processing a specific 3-byte sequence (tab, vertical tab, and newline), leading to unbounded memory allocation and application crash.

marked denial-of-service javascript vulnerability
2r 1t
medium advisory

Detect Suspicious WMI Event Subscription Creation for Persistence

This threat brief details the detection of malicious Windows Management Instrumentation (WMI) event subscriptions, a technique used by attackers for persistence and privilege escalation on Windows systems.

Elastic Defend persistence wmi windows event-subscription
2r 1t
high advisory

Detect Windows Downdate Registry Activity

This detection identifies registry modifications associated with the Windows Downdate attack, specifically focusing on pending.xml file modifications outside standard locations, which could force a Windows downgrade for exploitation.

Splunk Enterprise +2 windows-downgrade registry-modification defense-evasion persistence
2r 2t
medium advisory

Detect Windows Netspy Network Scanner Execution

The Netspy network scanner, a tool for internal network discovery, is executed on a Windows endpoint to enumerate active hosts and services, potentially for reconnaissance purposes.

Splunk Enterprise +2 network-discovery windows endpoint
2r 2t
high advisory

Detecting Disabling of Windows Defender Sample Submission

An attacker modifies the Windows registry to disable the Windows Defender Submit Samples Consent feature, preventing the submission of suspicious files for analysis, and potentially evading detection.

Splunk Enterprise +3 defense-evasion registry-modification windows-defender
2r
medium advisory

Detecting Persistence via Parsing macOS Login Item Files

This brief details a method for parsing macOS login item files to detect persistence mechanisms employed by malware or threat actors.

persistence macos
2r 1t
medium advisory

Detecting Spikes in Active Directory Object Modifications

This detection identifies a spike in Active Directory group or object modifications, potentially indicating unauthorized access, defense impairment, or persistence establishment by threat actors.

Splunk Enterprise +2 active-directory persistence privilege-escalation windows
2r 1t