Security
Headlines
HeadlinesLatestCVEs

Tag

#git

Ducktail Infostealer, DarkGate RAT Linked to Same Threat Actors

Vietnamese cybercrime groups are using multiple different MaaS infostealers and RATs to target the digital marketing sector.

DARKReading
#vulnerability#git#intel#backdoor#pdf#auth
SIM Card Ownership Slashed in Burkina Faso

Users could hold up to five SIM cards previously, but now they can only have two; it's a move that the government says is intended to cut down mobile spam levels.

New Windows Infostealer ‘ExelaStealer’ Being Sold on Dark Web

By Waqas Another day, another malware threat against Windows devices and users! This is a post from HackRead.com Read the original post: New Windows Infostealer ‘ExelaStealer’ Being Sold on Dark Web

CVE-2023-5687: Cross-Site Request Forgery Vulnerability in Logout Functionality in mosparo

Cross-Site Request Forgery (CSRF) in GitHub repository mosparo/mosparo prior to 1.0.3.

CVE-2023-5690: Cross-Site Request Forgery Vulnerability in Logout Functionality in modoboa

Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.2.2.

CVE-2023-5688: DOM XSS in https://demo.modoboa.org/user/#profile/ in modoboa

Cross-site Scripting (XSS) - DOM in GitHub repository modoboa/modoboa prior to 2.2.2.

CVE-2023-5689: Merge pull request #3095 from modoboa/fix/xss_profile_form · modoboa/modoboa@d33d3cd

Cross-site Scripting (XSS) - DOM in GitHub repository modoboa/modoboa prior to 2.2.2.

PDF Security – How To Keep Sensitive Data Secure in a PDF File

By Owais Sultan As we progress further into digital life, PDF security has evolved increasingly complex. This is a post from HackRead.com Read the original post: PDF Security – How To Keep Sensitive Data Secure in a PDF File

CVE-2023-3933: GitHub - BlackFan/client-side-prototype-pollution: Prototype Pollution and useful Script Gadgets

The Your Journey theme for WordPress is vulnerable to Reflected Cross-Site Scripting via prototype pollution in versions up to, and including, 1.9.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.