🕴 TikTok, Other Mobile Apps Violate Privacy Regulations 🕴
📖 Read
via "Dark Reading".
App developers are ignoring laws and guidelines regulating data protection measures aimed at minors, putting their monetization plans in jeopardy and risking user trust.📖 Read
via "Dark Reading".
Dark Reading
TikTok, Other Mobile Apps Violate Privacy Regulations
App developers are ignoring laws and guidelines regulating data protection measures aimed at minors, putting their monetization plans in jeopardy and risking user trust.
⚠ S3 Ep129: When spyware arrives from someone you trust ⚠
📖 Read
via "Naked Security".
Scanning tools, supply-chain malware, Wi-Fi hacking, and why there should be TWO World Backup Days... listen now!📖 Read
via "Naked Security".
Naked Security
S3 Ep129: When spyware arrives from someone you trust
Scanning tools, supply-chain malware, Wi-Fi hacking, and why there should be TWO World Backup Days… listen now!
👍2
‼ CVE-2023-27808 ‼
📖 Read
via "National Vulnerability Database".
H3C Magic R100 R100V100R005.bin was discovered to contain a stack overflow via the DeltriggerList interface at /goform/aspForm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted payload.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-29388 ‼
📖 Read
via "National Vulnerability Database".
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in impleCode Product Catalog Simple plugin <= 1.6.17 versions.📖 Read
via "National Vulnerability Database".
👍1
‼ CVE-2023-23799 ‼
📖 Read
via "National Vulnerability Database".
Auth. (admin+) Stored Cross-site Scripting (XSS) vulnerability in Leonardo Giacone Easy Panorama plugin <= 1.1.4 versions.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-27620 ‼
📖 Read
via "National Vulnerability Database".
Auth. (contributor+) Stored Cross-site Scripting (XSS) vulnerability in RoboSoft Photo Gallery, Images, Slider in Rbs Image Gallery plugin <= 3.2.12 versions.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-27810 ‼
📖 Read
via "National Vulnerability Database".
H3C Magic R100 R100V100R005.bin was discovered to contain a stack overflow via the ipqos_lanip_editlist interface at /goform/aspForm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted payload.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-28706 ‼
📖 Read
via "National Vulnerability Database".
Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Software Foundation Apache Airflow Hive Provider.This issue affects Apache Airflow Hive Provider: before 6.0.0.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-27804 ‼
📖 Read
via "National Vulnerability Database".
H3C Magic R100 R100V100R005.bin was discovered to contain a stack overflow via the DelvsList interface at /goform/aspForm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted payload.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-29172 ‼
📖 Read
via "National Vulnerability Database".
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in PropertyHive plugin <= 1.5.46 versions.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-29170 ‼
📖 Read
via "National Vulnerability Database".
Auth. (admin+) Stored Cross-site Scripting (XSS) vulnerability in PI Websolution Product Enquiry for WooCommerce, WooCommerce product catalog plugin <= 2.2.12 versions.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-28707 ‼
📖 Read
via "National Vulnerability Database".
Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow Drill Provider.This issue affects Apache Airflow Drill Provider: before 2.3.2.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-43914 ‼
📖 Read
via "National Vulnerability Database".
IBM TRIRIGA Application Platform 4.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 241036.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-28789 ‼
📖 Read
via "National Vulnerability Database".
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Cimatti Consulting WordPress Contact Forms by Cimatti plugin <= 1.5.4 versions.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-27807 ‼
📖 Read
via "National Vulnerability Database".
H3C Magic R100 R100V100R005.bin was discovered to contain a stack overflow via the Delstlist interface at /goform/aspForm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted payload.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-25442 ‼
📖 Read
via "National Vulnerability Database".
Auth. (admin+) Stored Cross-site Scripting (XSS) vulnerability in Marcel Pol Zeno Font Resizer plugin <= 1.7.9 versions.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-27806 ‼
📖 Read
via "National Vulnerability Database".
H3C Magic R100 R100V100R005.bin was discovered to contain a stack overflow via the ipqos_lanip_dellist interface at /goform/aspForm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted payload.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-28781 ‼
📖 Read
via "National Vulnerability Database".
Unauth. Stored Cross-Site Scripting (XSS) vulnerability in Cimatti Consulting WordPress Contact Forms by Cimatti plugin <= 1.5.4 versions.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-27801 ‼
📖 Read
via "National Vulnerability Database".
H3C Magic R100 R100V100R005.bin was discovered to contain a stack overflow via the DelDNSHnList interface at /goform/aspForm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted payload.📖 Read
via "National Vulnerability Database".
‼ CVE-2023-27805 ‼
📖 Read
via "National Vulnerability Database".
H3C Magic R100 R100V100R005.bin was discovered to contain a stack overflow via the EditSTList interface at /goform/aspForm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted payload.📖 Read
via "National Vulnerability Database".
‼ CVE-2022-43928 ‼
📖 Read
via "National Vulnerability Database".
The IBM Toolbox for Java (Db2 Mirror for i 7.4 and 7.5) could allow a user to obtain sensitive information, caused by utilizing a Java string for processing. Since Java strings are immutable, their contents exist in memory until garbage collected. This means sensitive data could be visible in memory over an indefinite amount of time. IBM has addressed this issue by reducing the amount of time the sensitive data is visible in memory. IBM X-Force ID: 241675.📖 Read
via "National Vulnerability Database".