The new Latest Cyber Threats section on freyonsecurity.com lists the most dangerous and impacting threats currently known. We use multiple CVE sources to create the list, which we then consolidate and categorize. Our algorithm searches for threats with high risk and impact so that only the really relevant vulnerabilities are shown.
Recently I followed the tracks of an attacker who had exploited administrator rights on an unpatched Windows 10 System. Further attacks on other internal systems were initially stopped by Windows 10 AppLocker. The execution of powershell/cmd where also forbidden by AppLocker. Minutes later, the hacker had overcome this security measure and continued his attack. AppLocker obviously had to have a vulnerability.
All jQuery versions below 3.4.0 are affected by a new hacking technique called prototype pollution. Successful exploitation could allow an attacker to modify existing object properties, including security properties such as cookies or tokens. Privilege escalation, content manipulation, application hijacking and even remote code execution is possible.