Tag
Insufficient data validation in Systems Extensions in Google Chrome on ChromeOS prior to 116.0.5845.120 allowed an attacker who convinced a user to install a malicious extension to bypass file restrictions via a crafted HTML page. (Chromium security severity: Medium)
Threat actors' use of Cloudflare R2 to host phishing pages has witnessed a 61-fold increase over the past six months. "The majority of the phishing campaigns target Microsoft login credentials, although there are some pages targeting Adobe, Dropbox, and other cloud apps," Netskope security researcher Jan Michael said. Cloudflare R2, analogous to Amazon Web Service S3, Google Cloud Storage, and
An issue in Python cpython v.3.7 allows an attacker to obtain sensitive information via the _asyncio._swap_current_task component.
eLitius version 1.0 appears to leave backups in a world accessible directory under the document root.
Elite CMS Pro version 2.01 suffers from a remote SQL injection vulnerability.
Elevel CMS version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Ekushey Project Manager CRM version 3.1 appears to leave default credentials installed after installation.
E-Journal Homoeo CMS version 2.0.3 suffers from a remote SQL injection vulnerability.
EI Tube YouTube API version 3 suffers from a remote SQL injection vulnerability.
E-Fun CMS version 5.0 suffers from an XML external entity injection vulnerability.