Tag
Improper handling of Length parameter in GitHub repository erudika/scoold prior to 1.49.4. When the text size is large enough the service results in a momentary outage in a production environment. That can lead to memory corruption on the server.
Multiple (13x) Cross-Site Request Forgery (CSRF) vulnerabilities in WPKube's Subscribe To Comments Reloaded plugin <= 211130 on WordPress allows attackers to clean up Log archive, download system info file, plugin system settings, plugin options settings, generate a new key, reset all options, change notifications settings, management page settings, comment form settings, manage subscriptions > mass update settings, manage subscriptions > add a new subscription, update subscription, delete Subscription.
International cybersecurity authorities have published an overview of the most routinely exploited vulnerabilities of 2021. The post The top 5 most routinely exploited vulnerabilities of 2021 appeared first on Malwarebytes Labs.
Red Planet Laundry Management System 1.0 is vulnerable to SQL Injection.
Red Planet Laundry Management System 1.0 is vulnerable to SQL Injection.
Exclusive Threatpost research examines organizations’ top cloud security concerns, attitudes towards zero-trust and DevSecOps.
Plus: Microsoft patched some 100 flaws, while Oracle issued more than 500 security fixes.
Google has been busy. After introducing badges for browser apps, it's also launched its "nutrition labels" for apps. The post Google Play’s Data safety section empowers Android users to make informed app choices appeared first on Malwarebytes Labs.
The sophisticated Bumblebee downloader is being used in ongoing email-borne attacks that could lead to ransomware infections.
Law enforcement believes that these hackers duping major tech companies are teenagers. But they are causing severe harm. The post Hackers fool major tech companies into handing over data of women and minors to abuse appeared first on Malwarebytes Labs.