Drupal Core – Access bypass (SA-CORE-2023-004)

A security advisory has been issued by Drupal to address a vulnerability that allows access bypass and affects multiple versions of Drupal. An attacker could potentially leverage this vulnerability to…

Comments Off on Drupal Core – Access bypass (SA-CORE-2023-004)

Multiple Security Vulnerabilities in OpenSSH

Product and affected versions:OpenSSH 9.1Severity and CEV ID:CVE-2023-25136, pre-authentication double free vulnerabilityVulnerability:OpenSSH server (sshd) contains a memory safety vulnerability that results in a double free in the unprivileged sshd process.…

Comments Off on Multiple Security Vulnerabilities in OpenSSH

Critical Vulnerability in Carbon Black App Control Product

Product and affected versions: VMware Carbon Black App Control versions 8.7.x, 8.8.x, and 8.9.x are affected by the vulnerability.Severity and CEV ID:The vulnerability, tracked as CVE-2023-20858, is rated as critical…

Comments Off on Critical Vulnerability in Carbon Black App Control Product

Ajax Hijacking

Ajax is used to create fast, efficient, and better web applications by using HTML, CSS, XML, and JavaScript. It uses DOM and JavaScript for dynamic content display. Why Ajax? User…

0 Comments

Session Hijacking Attack

In a website, cookies and Sessions are used to store information. These are a tasty treat for malicious hackers. Once an attacker gets their hands on a session ID, they…

0 Comments

Cross-Site Scripting Attack

Almost 40 percent of cyber-attacks in 2019 were performed using “cross-site scripting”, the most popular attack vector globally, according to global statistics. According to the statistics, the SQL injection is…

0 Comments