Security

regulation-2016-679-of-27-april-2016

Almost ready for the GDPR

regulation-2016-679-of-27-april-2016 The 2016-679 regulation of 27 April 2016 will apply in all Member States from 25 May 2018, within which the companies will have to comply with the new Privacy Act. As activities related to privacy advice and specifically in relation to the minimum security measures that must be prepared following the Gap Analysis and Privacy Assessment, the Secure Online…

Path traversal in Photo Gallery (WordPress plugin)

Path traversal in Photo Gallery may allow admins to read most files on the filesystem (WordPress plugin)

CVE-2017-7620 Mantis Bug Tracker

CVE-2017-7620 Mantis Bug Tracker 1.3.10 / v2.3.0 CSRF Permalink Injection

WordPress Newsletter Supsystic 1.1.7

WordPress Newsletter Supsystic 1.1.7 – Cross Site Scripting Vulnerability

[CVE-2017-5868] OpenVPN Access Server

[CVE-2017-5868] OpenVPN Access Server : CRLF injection with Session fixation

Linux Kernel Privilege Escalation

SSD Advisory – Linux Kernel XFRM Privilege Escalation

SSD Advisory – Linux Kernel AF_PACKET Use-After-Free

SSD Advisory – Webmin Multiple Vulnerabilities

SSD Advisory – PHP Melody Multiple Vulnerabilities

DefenseCode ThunderScan SAST Advisory: WordPress Ad Widget Plugin Local File Inclusion Security Vulnerability

DefenseCode ThunderScan SAST Advisory: WordPress Simple Login Log Plugin Multiple SQL Injection Security Vulnerabilities

WordPress does not hash or expire wp_signups.activation_key allowing an attacker with SQL injection to create accounts

DefenseCode Security Advisory: Magento Commerce CSRF, Stored Cross Site Scripting #1

Exploit toolkit for CVE-2017-8759 – Microsoft .NET Framework RCE (Builder + listener + video tutorial)

DefenseCode ThunderScan SAST Advisory: WordPress PressForward Plugin Security Vulnerability

DefenseCode ThunderScan SAST Advisory: WordPress Podlove Podcast Publisher Plugin Security Vulnerability

DefenseCode ThunderScan SAST Advisory: WordPress Easy Modal Plugin Multiple Security Vulnerabilities

Stop User Enumeration allows user enumeration via the REST API (WordPress plugin)

GDPR 2018

New European regulation (GDPR)

New European regulation GDPR 2018   Link utili New privacy regulation Genaral Data Protection Regulation General Data Protection Regulation: what’s new and what’s old Privacy

Defense in depth — the Microsoft way (part 48): privilege escalation for dummies — they didn’t make SUCH a stupid blunder?

Cyber Risk Insurance

Cyber Risk Insurance

Cyber Risk Insurance In the light of the recent cyber attacks and the rise of ransomware (like WannaCry and Petya), Secure Online Desktop in collaboration with Broker Busani Stefano of Union Brokers (see BROKER PRESENTATION) is pleased to present the Cyber Risk Assurance Guarantee as a valuable tool to increase The security of your data. Cyber Risk Insurance – Description…

Multiple Local Privilege Escalation Vulnerabilities in Acunetix Web Vulnerability Scanner 11

DefenseCode ThunderScan SAST Advisory: WordPress AffiliateWP Plugin Security Vulnerability

DefenseCode ThunderScan SAST Advisory: WordPress Huge-IT Video Gallery Plugin Security Vulnerability

Joomla com_tag v1.7.6 – (tag) SQL Injection Vulnerability

Qualys Security Advisory – CVE-2017-1000367 in Sudo’s get_process_ttyname() for Linux

Defense in depth — the Microsoft way (part 48): privilege escalation for dummies — they didn’t make SUCH a stupid blunder?

Microsoft Dynamic CRM 2016 – Cross-Site Scripting vulnerability

Executable installers are vulnerable^WEVIL (case 52): escalation of privilege with Microsoft’s .NET Framework installers

Reflected XSS in WordPress Download Manager could allow an attacker to do almost anything an admin can (WordPress plugin)

DefenseCode ThunderScan SAST Advisory: WordPress All In One Schema.org Rich Snippets Plugin Security Vulnerability

[CVE-2017-5868] OpenVPN Access Server : CRLF injection with Session fixation

Stealing Windows Credentials Using Google Chrome

WordPress EELV Newsletter v4.5 – Multiple Vulnerabilities

Ransomware & BaaS

Episodes like the one that happened yesterday remind us more and more of the importance of having a backup. Backup in Cloud can be a valuable countermeasure to Ransomware (to know more about Ransomware see the comprehensive guide about Ransomware from Cloudwards). https://www.nytimes.com/2017/05/13/world/asia/cyberattacks-online-security-.html?hp&action=click&pgtype=Homepage&clickSource=story-heading&module=first-column-region&region=top-news&WT.nav=top-news&_r=0  

DefenseCode ThunderScan SAST Advisory: GOOGLE google-api-php-client Multiple Security Vulnerabilities

DefenseCode WebScanner DAST Advisory: WordPress User Access Manager Plugin Security Vulnerability

DefenseCode ThunderScan SAST Advisory: WordPress Tracking Code Manager Plugin Multiple Security Vulnerabilities

CSRF in wordpress plugin clean login allows remote attacker change wordpress login redirect url or logout redirect url to evil address

DefenseCode ThunderScan SAST Advisory: WordPress WebDorado Gallery Plugin SQL Injection Vulnerability

DefenseCode ThunderScan SAST Advisory: WordPress Spider Event Calendar Plugin SQL Injection Vulnerability

DefenseCode ThunderScan SAST Advisory: WordPress Facebook Plugin SQL Injection Vulnerability

Two Factor Authentication

Two Factor Authentication

Two Factor Authentication Protect your Client Area with Two Factor Authentication via Google Authenticator Now you can protect your Client Area login with Google Authenticator so you will add and extra layer of security on your Cloud Account.   Two Factor Authentication How to enable Google Authenticator on Secure Online Desktop account 1 Access to your Client Area and log in with your…

Let's Encrypt

Let’s Encrypt Free Certificates for all Webhosting users

Let’s Encrypt is a free, automated and open Certification Authority. The objective of Let’s Encrypt and the ACME protocol is to make it possible to set up an HTTPS server and have it automatically obtain a browser-trusted certificate, without any human intervention. This is accomplished by running a certificate management agent on the web server. With our Webhosting service based on Plesk technology you…

Cross-Site Scripting vulnerability in Trust Form WordPress Plugin

Cross-Site Scripting vulnerability in WP-SpamFree Anti-Spam WordPress Plugin

Popup by Supsystic WordPress plugin vulnerable to Cross-Site Request Forgery

Stored Cross-Site Scripting vulnerability in User Login Log WordPress Plugin

Cross-Site Request Forgery & Cross-Site Scripting in Contact Form Manager WordPress Plugin

Stored Cross-Site Scripting vulnerability in Contact Form WordPress Plugin

Remote file upload vulnerability in WordPress Plugin Mobile App Native 3.0

Cross-Site Request Forgery in WordPress Press This function allows DoS

Persistent Cross-Site Scripting in the WordPress NewStatPress plugin

Cross-Site Request Forgery in Atahualpa WordPress Theme

Cross-Site Scripting in Magic Fields 1 WordPress Plugin

Cross-Site Scripting in Google Analytics Dashboard WordPress Plugin

WordPress Adminer plugin allows public (local) database login

Cross-Site Request Forgery in WordPress Download Manager Plugin

Simple Ads Manager WordPress plugin unauthenticated PHP Object injection vulnerability

Cross-Site Request Forgery in Global Content Blocks WordPress Plugin

Cross-Site Request Forgery in File Manager WordPress plugin

Cross-Site Scripting vulnerability in WP-Filebase Download Manager WordPress Plugin

Admin Custom Login WordPress plugin custom login page affected by persistent Cross-Site Scripting

Admin Custom Login WordPress plugin affected by persistent Cross-Site Scripting via Logo URL field

Analytics Stats Counter Statistics WordPress Plugin unauthenticated PHP Object injection vulnerability

WordPress Plugin Kama Click Counter 3.4.9 – Blind SQL Injection

WordPress Plugin Easy Table 1.6 – Persistent Cross-Site Scripting

Persistent Cross-Site Scripting vulnerability in User Access Manager WordPress Plugin

Multiple blind SQL injection vulnerabilities in FormBuilder WordPress Plugin

Cross-Site Request Forgery vulnerability in FormBuilder WordPress Plugin allows plugin permissions modification

CMS Commander Client WordPress Plugin unauthenticated PHP Object injection vulnerability

Google Forms WordPress Plugin unauthenticated PHP Object injection vulnerability

New exploit for new vulnerability in WordPress Plugin + tutorial

Nginx (Debian-based + Gentoo distros) – Root Privilege Escalation [CVE-2016-1247 UPDATE]

Multiple vulnerabilities in cPanel <= 60.0.34

Stop User Enumeration does not stop user enumeration (WordPress plugin)

Zend Framework / zend-mail < 2.4.11 Remote Code Execution (CVE-2016-10034)

MySQL / MariaDB / PerconaDB – Privilege Escalation / Race Condition Exploit [CVE-2016-6663 / OCVE-2016-5616]

Cross-Site Scripting in Check Email WordPress Plugin

Cross-Site Scripting in All In One WP Security & Firewall WordPress Plugin

Nginx (Debian-based distros) – Root Privilege Escalation Vulnerability (CVE-2016-1247)

Stored Cross-Site Scripting vulnerability in 404 to 301 WordPress Plugin

Cross-Site Scripting in Calendar WordPress Plugin

Cross-Site Scripting vulnerability in Caldera Forms WordPress Plugin

Cross-Site Scripting vulnerability in Quotes Collection WordPress Plugin

MySQL / MariaDB / PerconaDB – Root Privilege Escalation Exploit ( CVE-2016-6664 / CVE-2016-5617 )

[oss-security] CVE request:Lynx invalid URL parsing with ‘?’

Subscribe via RSS

More Articles…

Categories …

Newsletter

Tags

z35W7z4v9z8w

Customers

Newsletter