Security
Headlines
HeadlinesLatestCVEs

Tag

#web

Debian Security Advisory 5465-1

Debian Linux Security Advisory 5465-1 - Seokchan Yoon discovered that missing sanitising in the email and URL validators of Django, a Python web development framework, could result in denial of service.

Packet Storm
#web#linux#debian#dos#java
WordPress Ninja Forms 3.6.25 Cross Site Scripting

WordPress Ninja Forms plugin version 3.6.25 suffers from a cross site scripting vulnerability.

Webedition CMS 2.9.8.8 Cross Site Scripting

Webedition CMS version 2.9.8.8 suffers from a persistent cross site scripting vulnerability.

CVE-2023-29505: CVE-2023-29505 - Excellium Services

An issue was discovered in Zoho ManageEngine Network Configuration Manager 12.6.165. The WebSocket endpoint allows Cross-site WebSocket hijacking.

Webedition CMS 2.9.8.8 Remote Code Execution

Webedition CMS version 2.9.8.8 suffers from a remote code execution vulnerability.

Webutler 3.2 Shell Upload

Webutler version 3.2 suffers from a remote shell upload vulnerability.

Red Hat Security Advisory 2023-4461-01

Red Hat Security Advisory 2023-4461-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 102.14.0 ESR. Issues addressed include buffer overflow and bypass vulnerabilities.

Videoplay 1.3.0 Insecure Settings

Videoplay version 1.3.0 appears to leave default credentials installed after installation.

The end looms for Meta's behavioural advertising in Europe

Categories: Personal Tags: meta Tags: Facebook Tags: EU Tags: legal Tags: litigation Tags: behavioural Tags: advertising Tags: tracking We take a look at what appears to be the beginning of the end for Meta's behavioural advertising in Europe. (Read more...) The post The end looms for Meta's behavioural advertising in Europe appeared first on Malwarebytes Labs.

Teach a Man to Phish and He’s Set for Life

One frustrating aspect of email phishing is the frequency with which scammers fall back on tried-and-true methods that really have no business working these days. Like attaching a phishing email to a traditional, clean email message, or leveraging link redirects on LinkedIn, or abusing an encoding method that makes it easy to disguise booby-trapped Microsoft Windows files as relatively harmless documents.