Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
15 résultats taggé XSS  ✕
Hackers exploit Roundcube webmail flaw to steal email, credentials https://www.bleepingcomputer.com/news/security/hackers-exploit-roundcube-webmail-flaw-to-steal-email-credentials/
22/10/2024 14:48:04
QRCode
archive.org
thumbnail

Threat actors have been exploiting a vulnerability in the Roundcube Webmail client to target government organizations in the Commonwealth of Independent States (CIS) region, the successor of the former Soviet Union.

bleepingcomputer EN 2024 Actively-Exploited CVE-2024-37383 Cross-Site-Scripting Email Roundcube Vulnerability XSS
New attack uses MSC files and Windows XSS flaw to breach networks https://www.bleepingcomputer.com/news/security/new-grimresource-attack-uses-msc-files-and-windows-xss-flaw-to-breach-networks/
25/06/2024 09:01:37
QRCode
archive.org
thumbnail

A novel command execution technique dubbed 'GrimResource' uses specially crafted MSC (Microsoft Saved Console) and an unpatched Windows XSS flaw to perform code execution via the Microsoft Management Console.

bleepingcomputer EN 2024 Attack GrimResource Microsoft MSC Windows XSS
Active exploitation of unauthenticated stored XSS vulnerabilities in WordPress Plugins https://www.fastly.com/blog/active-exploitation-unauthenticated-stored-xss-vulnerabilities-wordpress/
31/05/2024 09:16:16
QRCode
archive.org
thumbnail

We have observed active exploitation attempts targeting three high-severity CVEs: CVE-2024-2194, CVE-2023-6961, and CVE-2023-40000.

fastly EN 2024 Wordpress XSS exploitation CVE-2024-2194 CVE-2023-6961 CVE-2023-40000
Multiple XSS flaws in Joomla can lead to remote code execution https://securityaffairs.com/159487/security/joomla-xss-flaws.html
22/02/2024 16:55:14
QRCode
archive.org
thumbnail

Joomla maintainers have addressed multiple flaws in the popular content management system (CMS) that can lead to execute arbitrary code

securityaffairs EN 2024 XSS Joomla CMS vulnerabilities CVE-2024-21722 CVE-2024-21723
Russia-Aligned TAG-70 Targets European Government and Military Mail Servers in New Espionage Campaign https://www.recordedfuture.com/russia-aligned-tag-70-targets-european-government-and-military-mail
17/02/2024 12:58:30
QRCode
archive.org
thumbnail

Insikt Group has observed TAG-70 leveraging cross-site scripting (XSS) vulnerabilities against Roundcube webmail servers in Europe, targeting government, military, and national infrastructure.

recordedfuture EN 2024 Russia-Aligned TAG-70 EU XSS Government Military mail spy
Zimbra 0-day used to target international government organizations https://blog.google/threat-analysis-group/zimbra-0-day-used-to-target-international-government-organizations/
16/11/2023 18:01:57
QRCode
archive.org
thumbnail

TAG’s discovery of a 0-day exploit used to steal email data from international government organizations.

blog.google EN 2023 Zimbra 0-day government TAG exploit XSS CVE-2023-37580
European govt email servers hacked using Roundcube zero-day https://www.bleepingcomputer.com/news/security/european-govt-email-servers-hacked-using-roundcube-zero-day/
27/10/2023 08:52:20
QRCode
archive.org
thumbnail

The Winter Vivern Russian hacking group has been exploiting a Roundcube Webmail zero-day since at least October 11 to attack European government entities and think tanks.

Cyber-espionage Email Europe Government Roundcube Russia Winter-Vivern XSS Zero-Day CVE-2023-5631
Winter Vivern exploits zero-day vulnerability in Roundcube Webmail servers https://www.welivesecurity.com/en/eset-research/winter-vivern-exploits-zero-day-vulnerability-roundcube-webmail-servers/
27/10/2023 08:24:41
QRCode
archive.org

ESET Research discover campaigns by the Winter Vivern APT group that exploit a zero-day XSS vulnerability in the Roundcube Webmail server and target governmental entities and a think tank in Europe.

welivesecurity ESET 2023 EN WinterVivern APT zero-day XSS vulnerability Roundcube
Code Vulnerabilities Put Proton Mails at Risk https://www.sonarsource.com/blog/code-vulnerabilities-leak-emails-in-proton-mail/
07/09/2023 23:42:58
QRCode
archive.org
thumbnail

The Sonar Research team discovered critical code vulnerabilities in Proton Mail, Skiff and Tutanota. This post covers the technical details of the XSS vulnerability in Proton Mail.

sonarsource EN 2023 Code Vulnerabilities ProtonMail XSS Tutanota
XSS Vulnerabilities in Azure Led to Unauthorized Access to User Sessions - SecurityWeek https://www.securityweek.com/xss-vulnerabilities-in-azure-led-to-unauthorized-access-to-user-sessions/
18/06/2023 21:53:18
QRCode
archive.org
thumbnail

Microsoft addressed two XSS vulnerabilities in Azure Bastion and Azure Container Registry (ACR) leading to unauthorized access to sessions.

securityweek EN 2023 XSS Azure Bastion ACR unauthorized access
Wordfence Firewall Blocks Bizarre Large-Scale XSS Campaign https://www.wordfence.com/blog/2023/05/wordfence-firewall-blocks-bizarre-large-scale-xss-campaign/
25/05/2023 08:17:20
QRCode
archive.org
thumbnail

The Wordfence Threat Intelligence team has been monitoring an increase in attacks targeting a Cross-Site Scripting vulnerability in Beautiful Cookie Consent Banner, a WordPress plugin installed on over 40,000 sites. The vulnerability, which was fully patched in January in version 2.10.2, offers unauthenticated attackers the ability to add malicious JavaScript to a website, potentially allowing ...Read More

wordfence EN 2023 Beautiful-Cookie-Consent-Banner plugin WordPress XSS Campaign
The Race to Patch: Attackers Leverage Sample Exploit Code in Wordpress Plugin | Akamai https://www.akamai.com/blog/security-research/attackers-leverage-sample-exploit-wordpress-plugin
14/05/2023 17:20:39
QRCode
archive.org
thumbnail

The time for attackers to respond to known vulnerabilities is shrinking. See an example of an attacker using sample code.

  • The Akamai Security Intelligence Group (SIG) has been analyzing attack attempt activity following the announcement of a critical vulnerability in a WordPress custom fields plug-in affecting more than 2 million sites.

  • Exploiting this vulnerability could lead to a reflected cross-site scripting (XSS) attack, in which malicious code is injected into a victim site and pushed to its visitors.

  • On May 4, 2023, the WP Engine team announced the security fix in version 6.1.6, including sample exploit code as a proof of concept (PoC).

  • Starting on May 6, less than 48 hours after the announcement, the SIG observed significant attack attempt activity, scanning for vulnerable sites using the sample code provided in the technical write-up.

  • This highlights that the response time for attackers is rapidly decreasing, increasing the need for vigorous and prompt patch management.

akamai EN 2023 XSS vulnerability WordPress plugin third-party-risk CVE-2023-30777
WordPress Advanced Custom Fields Pro plugin <= 6.1.5 - Reflected Cross Site Scripting (XSS) vulnerability https://patchstack.com/database/vulnerability/advanced-custom-fields-pro/wordpress-advanced-custom-fields-pro-plugin-6-1-5-reflected-cross-site-scripting-xss-vulnerability
08/05/2023 11:18:18
QRCode
archive.org
thumbnail

Rafie Muhammad (Patchstack) discovered and reported this Cross Site Scripting (XSS) vulnerability in WordPress Advanced Custom Fields PRO Plugin. This could allow a malicious actor to inject malicious scripts, such as redirects, advertisements, and other HTML payloads into your website which will be executed when guests visit your site. This vulnerability has been fixed in version 6.1.6.

patchstack EN 2023 WP CVE-2023-30777 Advanced Custom Fields Pro plugin XSS vulnerability Wordpress plugin
Jenkins discloses dozens of zero-day bugs in multiple plugins https://www.bleepingcomputer.com/news/security/jenkins-discloses-dozens-of-zero-day-bugs-in-multiple-plugins/
05/01/2023 08:28:08
QRCode
archive.org
thumbnail

On Thursday, the Jenkins security team announced 34 security vulnerabilities affecting 29 plugins for the Jenkins open source automation server, 29 of the bugs being zero-days still waiting to be patched.

bleepingcomputer EN 2023 CSRF Jenkins Vulnerability XSS Zero-Day Security
Did You Know Your Browser’s Autofill Credentials Could Be Stolen via Cross-Site Scripting (XSS) https://www.gosecure.net/blog/2022/06/29/did-you-know-your-browsers-autofill-credentials-could-be-stolen-via-cross-site-scripting-xss/
18/07/2022 08:43:00
QRCode
archive.org
thumbnail

Cross-Site Scripting (XSS) is a well-known vulnerability that has been around for a long time and can be used to steal sessions, create fake logins and carry out actions as someone else, etc.

In addition, many users are unaware of the potential dangers associated with their browser’s credential autofill feature. This attack vector is not new, but it is unknown to many people and as we investigated further we found that the dangers were extensive. In this post, the GoSecure Titan Labs team will demonstrate that using a browser password manager with autofill could expose your credentials in a web application vulnerable to XSS.

gosecure EN 2022 browsers XSS password-autofill credentials
4250 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio