Security
Headlines
HeadlinesLatestCVEs

Tag

#firefox

You can be tracked online using your Chrome browser extensions

We look at a new project which uses several techniques to determine which Chrome extensions are being used on a device. The post You can be tracked online using your Chrome browser extensions appeared first on Malwarebytes Labs.

Malwarebytes
#web#google#microsoft#java#perl#auth#chrome#firefox
Old Age Home Management System 1.0 SQL Injection

Old Age Home Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

Pandora FMS 7.0NG.742 Remote Code Execution

Pandora FMS version 7.0NG.742 suffers from an authenticated remote code execution vulnerability.

Virtua Software Cobranca 12S SQL Injection

Virtua Software Cobranca version 12S suffers from a remote SQL injection vulnerability.

Ubuntu Security Notice USN-5475-1

Ubuntu Security Notice 5475-1 - Multiple security issues were discovered in Firefox. If a user were tricked into opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, spoof the browser UI, conduct cross-site scripting attacks, bypass content security policy restrictions, or execute arbitrary code.

Marval MSM 14.19.0.12476 Remote Code Execution

Marval MSM version 14.19.0.12476 suffers from a remote code execution vulnerability.

An Alleged Russian Spy Was Busted Trying to Intern at The Hague

Plus: Firefox adds new privacy protections, a big Intel and AMD chip flaw, and more of the week’s top security news.

CVE-2022-31941: bug_report/SQL-1.md at main · Gsir97/bug_report

Rescue Dispatch Management System v1.0 is vulnerable to SQL Injection via \rdms\admin?page=user\manage_user&id=.

CVE-2022-31083: Latest News - Apple Developer

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 4.10.11 and 5.2.2, the certificate in the Parse Server Apple Game Center auth adapter not validated. As a result, authentication could potentially be bypassed by making a fake certificate accessible via certain Apple domains and providing the URL to that certificate in an authData object. Versions 4.0.11 and 5.2.2 prevent this by introducing a new `rootCertificateUrl` property to the Parse Server Apple Game Center auth adapter which takes the URL to the root certificate of Apple's Game Center authentication certificate. If no value is set, the `rootCertificateUrl` property defaults to the URL of the current root certificate as of May 27, 2022. Keep in mind that the root certificate can change at any time and that it is the developer's responsibility to keep the root certificate URL up-to-date when using the Parse Server Apple Game Center auth adapter. There are no k...