Security
Headlines
HeadlinesLatestCVEs

Tag

#chrome

CVE-2023-4572: Chromium: CVE-2023-4572 Use after free in MediaStream

**Why is this Chrome CVE included in the Security Update Guide?** The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. **How can I see the version of the browser?** 1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window 2. Click on **Help and Feedback** 3. Click on **About Microsoft Edge**

Microsoft Security Response Center
#vulnerability#microsoft#chrome#Microsoft Edge (Chromium-based)#Security Vulnerability
SapphireStealer: Open-source information stealer enables credential and data theft

SapphireStealer, an open-source information stealer, has been observed across public malware repositories with increasing frequency since its initial public release in December 2022. Information-stealing malware like SapphireStealer can be used to obtain sensitive information, including corporate credentials, which are often resold to other threat actors who leverage the access for

Google Fixes Serious Security Flaws in Chrome and Android

Plus: Mozilla patches more than a dozen vulnerabilities in Firefox, and enterprise companies Ivanti, Cisco, and SAP roll out a slew of updates to get rid of some high-severity bugs.

CVE-2023-31714: OffSec’s Exploit Database Archive

Chitor-CMS before v1.1.2 was discovered to contain multiple SQL injection vulnerabilities.

Victim records deleted after spyware vendor compromised

Categories: Personal Tags: spyware Tags: spying Tags: surveillance Tags: Brazil Tags: phone Tags: mobile We take a look at another compromise of a mobile spyware app maker, and ask whether this action comes with hidden danger. (Read more...) The post Victim records deleted after spyware vendor compromised appeared first on Malwarebytes Labs.

CVE-2023-4596: OffSec’s Exploit Database Archive

The Forminator plugin for WordPress is vulnerable to arbitrary file uploads due to file type validation occurring after a file has been uploaded to the server in the upload_post_image() function in versions up to, and including, 1.24.6. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

CVE-2023-4572: Stable Channel Update for Desktop

Use after free in MediaStream in Google Chrome prior to 116.0.5845.140 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Grawlix 1.5.1 Cross Site Scripting

Grawlix version 1.5.1 suffers from a cross site scripting vulnerability.