Security
Headlines
HeadlinesLatestCVEs

Tag

#web

3 reasons why your endpoint security is not enough

Categories: Business Join our upcoming webinar and learn about weaknesses in your current endpoint security setup and how to address them. (Read more...) The post 3 reasons why your endpoint security is not enough appeared first on Malwarebytes Labs.

Malwarebytes
#web
How to Prevent ChatGPT From Stealing Your Content & Traffic

ChatGPT and similar large language models (LLMs) have added further complexity to the ever-growing online threat landscape. Cybercriminals no longer need advanced coding skills to execute fraud and other damaging attacks against online businesses and customers, thanks to bots-as-a-service, residential proxies, CAPTCHA farms, and other easily accessible tools.  Now, the latest technology damaging

Alert: Juniper Firewalls, Openfire, and Apache RocketMQ Under Attack from New Exploits

Recently disclosed security flaws impacting Juniper firewalls, Openfire, and Apache RocketMQ servers have come under active exploitation in the wild, according to multiple reports. The Shadowserver Foundation said that it's "seeing exploitation attempts from multiple IPs for Juniper J-Web CVE-2023-36844 (& friends) targeting /webauth_operation.php endpoint," the same day a proof-of-concept (PoC)

CVE-2023-32740: WordPress Custom 404 Pro plugin <= 3.8.1 - Reflected Cross Site Scripting (XSS) vulnerability - Patchstack

Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Kunal Nagar Custom 404 Pro plugin <= 3.8.1 versions.

CVE-2023-3136: MailArchiver <= 2.10.1 - Unauthenticated Stored Cross-Site Scripting via Email Subject — Wordfence Intelligence

The MailArchiver plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an email subject in versions up to, and including, 2.10.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

GhostSec Claim Breaching Iranian Govt Surveillance Software Tool

By Habiba Rashid In a move that has caught global attention, the hacktivist group GhostSec announced a successful breach of the… This is a post from HackRead.com Read the original post: GhostSec Claim Breaching Iranian Govt Surveillance Software Tool

Victim records deleted after spyware vendor compromised

Categories: Personal Tags: spyware Tags: spying Tags: surveillance Tags: Brazil Tags: phone Tags: mobile We take a look at another compromise of a mobile spyware app maker, and ask whether this action comes with hidden danger. (Read more...) The post Victim records deleted after spyware vendor compromised appeared first on Malwarebytes Labs.

CVE-2023-4597: Slimstat Analytics <= 5.0.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode — Wordfence Intelligence

The Slimstat Analytics plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'slimstat' shortcode in versions up to, and including, 5.0.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVE-2023-4596: OffSec’s Exploit Database Archive

The Forminator plugin for WordPress is vulnerable to arbitrary file uploads due to file type validation occurring after a file has been uploaded to the server in the upload_post_image() function in versions up to, and including, 1.24.6. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

CVE-2023-4599: class-email-encoder-bundle-run.php in email-encoder-bundle/tags/2.1.7/core/includes/classes – WordPress Plugin Repository

The Slimstat Analytics plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'eeb_mailto' shortcode in versions up to, and including, 2.1.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.