Software Security Intelligence

Monitor and remediate emerging vulnerabilities before attackers do.

Augury One

Authoritative guidance for every vulnerability

Definitively manage your risk with actionable guidance rooted in deep technical analysis.

! Remote code injection in Log4j Last updated 2 minutes ago The Log4j logging utility is vulnerable to remote code execution when provided specially crafted inputs. ! Langflow unauthenticated remote code execution Last updated 15 minutes ago A Langflow API endpoint allows for unauthenticated remote code execution using specially crafted HTTP requests. ! Denial of service in Apache Tomcat multipart file uploads Last updated 1 hour ago Apache Tomcat allowed unbounded part amounts in multipart file upload requests, allowing denial of service through resource exhaustion. i Python Requests library may leak configured netrc credentials Last updated 2 hours ago Using a specially crafted URL, the destination HTTP server will receive a request containing credentials defined in the netrc file.

Timely Advisories

Receive curated and digestible advisories for emerging software security vulnerabilities, even if a CVE is not yet assigned.

Remote code injection in Log4j SEVERITY CRITICAL IMPACT CRITICAL CATEGORY Injection Description Log4j's StrSubstitutor.substitute() method processes ${} lookup patterns without validation. The JndiLookup.lookup() method directly passes user input to context.lookup() with no sanitization, enabling remote code execution through malicious JNDI references. public String lookup(LogEvent event, String key) { return context.lookup(key); } Detection File System Detection Search for Log4j JAR files containing vulnerable JndiLookup class find . -name "*.jar" -exec grep -l "JndiLookup.class" {} \; Log Analysis Look for JNDI lookup patterns indicating exploitation attempts grep -r "\${jndi:" /var/log/ --include="*.log" Mitigation Set -Dlog4j2.formatMsgNoLookups=true or remove JndiLookup.class Remediation Upgrade to Log4j 2.17.1+ (Java 8) or 2.12.4+ (Java 7)

Root-cause analysis and detection guidance

Each advisory includes detailed technical analysis and guidance, allowing customers to properly assess, mitigate, and remediate impact.

Extract signal from the noise

Transform overwhelming vulnerability data into actionable intelligence.

AI powered sourcing and signals integration

Scale beyond human curation with advisories that are continuously being sourced and updated by a fleet of fine-tuned AI agents, ensuring you are always informed.

On-demand intelligence curation

Engage with our security researchers to validate every technical detail of an advisory to ensure you can take action without error.

Community driven vulnerability insights

Leverage collective expertise and experiences from organizations worldwide to gain deeper understanding and context around emerging threats.

Last-mile delivery, designed for humans

Deliver actionable intelligence to stakeholder from engineering to executives with advisories written for a multi-disciplinary audience.

Maintain realtime situational awareness

Stay informed with real-time updates and community discussions.

SEC We've confirmed CVE-2021-44228 affects our Java applications using Log4j. Has anyone tried the file system detection commands from the advisory? DEV Yes, I ran the find command and found vulnerable JARs in 3 applications. Already applied the -Dlog4j2.formatMsgNoLookups=true workaround. Planning upgrades to 2.17.1 this weekend. OPS The grep command found ${jndi: patterns in our access logs from last week. Looks like we were being probed before the public disclosure. A1 We're seeing similar pre-disclosure probing across multiple organizations. We are updating the listed detections with pre-disclosure probe attempt fingerprints as they are disclosed to us, or made available through other sources.

Community Discussions

Participate in community discussions about each advisory, and benefit from the knowledge of other researchers and organizations.

Advisory Update Notifications Email Notifications Receive email updates when advisories are updated Recent Updates Remote code injection in Log4j Updated Added pre-disclosure probe detection patterns - 2 minutes ago Langflow unauthenticated remote code execution Updated Confirmed additional affected API endpoints - 15 minutes ago Denial of service in Apache Tomcat multipart file uploads Updated Updated resource exhaustion mitigation guidance - 1 hour ago

Advisory Update Notifications

Subscribe to stay informed on changes to advisories relevant to you.

Enhance the capabilities of every discipline

Equip your organization with the information necessary to secure your organization.

Deprecate one-sentence vulnerability advisories

Pave the road to informed remediation decisions with detailed analysis and remediation guidance.

Root cause analysis, with sources cited

Go beyond "update to x" with a detailed analysis of the root cause of the vulnerability, it's exploitation, and remediation.

Make informed remediation decisions

Pave the road to remediation with detailed root cause analysis and remediation guidance.

Mitigations, for when remediation isn't an option

When official remediation can't be followed, get alternative mitigation strategies to reduce exposure until full remediation is possible.

Access an inclusive, engineering-first community

Give your engineering teams access to a community of engineers tackling the same vulnerabilities.

Deliver intelligence beyond feeds

Reduce analyst busy work with curated advisories on emerging vulnerabilities.

Automated technical analysis

Reduce manual analyst workload with AI-curated reporting for each vulnerability.

Advisories regardless of CVEs

Advisories are issued for emerging vulnerabilities even if a CVE isn't yet assigned, giving you a critical head start.

Community intelligence sharing

Participate in private discussions with other threat intelligence professionals to share real-world observations and validate findings.

Detection guidance

Give your response teams the information they need to detect vulnerability presence and exploitation in your environment -- without the manual curation.

Streamline software vulnerability management

Turn filtered noise into into actionable guidance that enhances your vulnerability management program.

Deprecate barebones scanning findings

Stop shipping context-less scanning findings to your engineering teams, and instead give them the information they need to determine relevance and confidently remediate.

Make confident prioritization decisions

Get detailed impact analysis and remediation guidance to help prioritize vulnerability response based on actual business risk.

Stay informed on emerging guidance

Subscribe to advisory notifications to stay informed about new details and guidance as advisories evolve.

Mitigate when you can't remediate

When patching isn't immediately possible, access expert guidance on alternative mitigations to reduce exposure risk.

Speedrun vulnerability research and exploitation

Offensive security teams gain deep technical insights and exploitation context to better understand attack vectors and validate defensive measures.

Accelerate your engagements

Make informed engagement decisions with detailed root cause analysis and available exploitation techniques.

Manage detection risk

Stay informed of emerging detection mechanisms that may be used to detect your exploitation techniques.

Develop new capabilities

Avoid getting caught waiting for a public proof of concept, and instead develop new capabilities atop trusted guidance.

Exchange tradecraft

Engage with other offensive security professionals and researchers to validate techniques and share exploitation insights.

Transparent pricing

Organization

TBA credits/month, per organization

Researcher

TBA credit/month, per account

Student

TBA credits/month, per account

With essentials included

Exportable stakeholder-ready reporting

Rapidly inform key stakeholders with exportable vulnerability intelligence reporting.

Searchable vulnerability artifacts

Search and filter every advisory artifact in one place, including identifiers, artifacts, and vulnerability details.

24/7 advisory sourcing and curation

Advisories are continuously being sourced and updated by a fleet of fine-tuned AI agents, ensuring every advisory is up to date with the latest information.

Community access to verified advisories

Advisories verified by our security researchers are available to all customers, regardless of who requested verification.

Versioned advisories

Trace and verify every change to an advisory and it's artifacts with version-controlled advisories.

Curated CWE-based categorization

Advisories are categorized by CWEs to help you find relevant advisories and contextualize the impact of the vulnerability.

About

Augury One was founded to improve the state of software security, lowering the barrier of entry to security services. Staffed by expert software security engineers, Augury One provides organizations continous security advisory and engineering support, augmenting and extending existing organization capabilities.

contact

Want to know more? Let's chat.

info@augury.one