Filter
-Infinity
0

BleepingComputerHackers target SSRF bugs in EC2-hosted sites to steal AWS credentials

First published (updated )

Amazon AWS CloudFormationZDI-25-205: Amazon AWS CloudFormation Templates Uncontrolled Search Path Element Remote Code Execution Vulnerability

First published (updated )

Amazon AWS CloudFormationAmazon AWS CloudFormation Templates Uncontrolled Search Path Element Remote Code Execution Vulnerability

First published (updated )

Amazon AWS CloudFormationAmazon AWS CloudFormation Templates Uncontrolled Search Path Element Remote Code Execution Vulnerability

First published (updated )

Apache Tomcat- Rapid Reset HTTP/2 vulnerability

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Amazon Simple AffiliateSimple Amazon Affiliate <= 1.0.9 - Reflected Cross-Site Scripting

First published (updated )

ownCloudUnspecified vulnerability in ownCloud Server before 4.0.12 allows remote attackers to obtain sensiti…

First published (updated )

OpenSSH serverPath Traversal

First published (updated )

Amazon SageMaker WorkflowMD5 Hash Collision in SageMaker Workflow in aws/sagemaker-python-sdk

First published (updated )

maven/software.amazon.ion:ion-javaIon Java StackOverflow vulnerability

7.5
EPSS
0.05%
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Amazon Ion for JavaAmazon Ion is a Java implementation of the Ion data notation. Prior to version 1.10.5, a potential d…

First published (updated )

ZDNetNavigating AI-powered cyber threats in 2025: 4 expert security tips for businesses

First published (updated )
News
ZDNet

Amazon OpensearchField-level security issue with .keyword fields in OpenSearch

First published (updated )

Amazon OpensearchIssue with whitespace in JWT roles in OpenSearch

8.8
First published (updated )

Amazon OpenSearchIssue in Anomaly Detection with document and field level rules in numerical feature aggregations

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

FreeBSD KernelOpenSSH regreSSHion Attack (CVE-2024-6387)

8.1
EPSS
71.47%
First published (updated )

Amazon OpenSearchTime discrepancy in authentication responses in OpenSearch

First published (updated )

YaySMTPVulnerability: SMTP for Amazon SES <= 1.7.1 - Unauthenticated Stored Cross-Site Scripting via Email Logs

7.2
First published (updated )

The RegisterTriplestrength hits with ransomware, cloud crypto mining

First published (updated )

BleepingComputerwhoAMI attacks give hackers code execution on Amazon EC2 instances

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Amazon WorkSpaces ClientIssue affecting Amazon WorkSpaces (when running Amazon DCV protocol), Amazon AppStream 2.0, and Amazon DCV clients

7.7
EPSS
0.04%
First published (updated )

Arista CloudEOSOn affected platforms running Arista CloudEOS a size check bypass issue in the Software Forwarding Engine (Sfe) may allow buffer over reads in later code. Additionally, depending on configured options this may cause a recomputation of the TCP checksum ...

7.5
First published (updated )

Amazon WorkSpacesIssue affecting Amazon WorkSpaces Clients (when running PCoIP protocol)

7.7
EPSS
0.04%
First published (updated )

Dark ReadingAbandoned AWS Cloud Storage: A Major Cyberattack Vector

First published (updated )

Amazon AWS Signature Version 4AWS SDK for Rust will log AWS credentials when TRACE-level logging is enabled for request sending

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

BleepingComputerHow attackers abuse S3 Bucket Namesquatting — And How to Stop Them

First published (updated )

Dark ReadingChinese 'Infrastructure Laundering' Abuses AWS, Microsoft Cloud

First published (updated )

The RegisterAbandoned AWS S3 buckets can be reused in supply-chain attacks that would make SolarWinds look 'insignificant'

First published (updated )

BleepingComputerAmazon Redshift gets new default settings to prevent data breaches

First published (updated )

Amazon Fire OSAn Improper Enforcement of Behavioral Workflow vulnerability in the exchangeDeviceServices function …

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203