Tag
high
advisory
GenAI Tool Access to Sensitive Files for Credential Harvesting and Persistence
2 rules 4 TTPsThis brief outlines the threat of attackers leveraging GenAI tools to access sensitive files containing credentials, SSH keys, browser data, and shell configurations for credential access and persistence.
credential-access
genai
file-access
persistence
2r
4t
high
advisory
WWBN AVideo Unauthorized File Access and Deletion Vulnerability
2 rules 2 TTPsWWBN AVideo platform versions up to 26.0 are vulnerable to unauthorized file access and deletion, where an authenticated user with upload permissions can exploit the `objects/import.json.php` endpoint by manipulating the `fileURI` parameter to steal private video files, read adjacent text files, and delete `.mp4` and other writable files on the filesystem.
avideo
file-access
vulnerability
2r
2t