Tag
Company Visitor Management version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
CMSsite version 1.0 suffers from a remote shell upload vulnerability.
CMS RIMI version 1.3 suffers from cross site request forgery and arbitrary file upload vulnerabilities.
Client Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
CCMS Project version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Biobook Social Networking Site version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
The threat actors behind a recently observed Qilin ransomware attack have stolen credentials stored in Google Chrome browsers on a small set of compromised endpoints. The use of credential harvesting in connection with a ransomware infection marks an unusual twist, and one that could have cascading consequences, cybersecurity firm Sophos said in a Thursday report. The attack, detected in July
It’s not unusual for a threat actor to exaggerate the extent of a hack or breach to drum up interest, and hopefully, the eventual purchase or ransom price.
As many as 15,000 applications using Amazon Web Services' (AWS) Application Load Balancer (ALB) for authentication are potentially susceptible to a configuration-based issue that could expose them to sidestep access controls and compromise applications. That's according to findings from Israeli cybersecurity company Miggo, which dubbed the problem ALBeast. "This vulnerability allows attackers to
AVMS Project version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.