WP Security Audit Log renamed to WP Activity Log

Today’s announcement is very different from all the previous ones. We are renaming WP Security Audit Log to WP Activity Log. The plugin’s name change reflects the vision we have for the plugin, as explained in this post. A bit of history When we started WP White Security and released the first version of WP […] More info: https://wpactivitylog.com/wp-security-audit-log-renamed-wp-activity-log/

Xilinix Starbleed FPGA vulnerability

Xilinix Starbleed FPGA vulnerability Security Advisory Security Advisory Description Design Advisory for 7 Series/Virtex-6 FPGAs: Defeating Bitstream Encryption (AR# 73541) Impact There is no ... More info: https://support.f5.com/csp/article/K31447551?utm_source=f5support&utm_medium=RSS

Xilinix Starbleed FPGA vulnerability

Xilinix Starbleed FPGA vulnerability Security Advisory Security Advisory Description Design Advisory for 7 Series/Virtex-6 FPGAs: Defeating Bitstream Encryption (AR# 73541) Impact There is no ... More info: https://support.f5.com/csp/article/K31447551?utm_source=f5support&utm_medium=RSS

jackson-mapper-asl vulnerability CVE-2019-10172

jackson-mapper-asl vulnerability CVE-2019-10172 Security Advisory Security Advisory Description A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML external entity ... More info: https://support.f5.com/csp/article/K39573629?utm_source=f5support&utm_medium=RSS

Rowhammer hardware vulnerability CVE-2020-10255

Rowhammer hardware vulnerability CVE-2020-10255 Security Advisory Security Advisory Description Modern DRAM chips (DDR4 and LPDDR4 after 2015) are affected by a vulnerability in deployment of ... More info: https://support.f5.com/csp/article/K60570139?utm_source=f5support&utm_medium=RSS

What’s a Web Shell and Why Is My Website Being Repeatedly Hacked?

Jim Walker Free Consultation by Phone We Fix Hacked Websites Fast (619) 479-6637. “What’s a web shell?” Most hacked websites have one or more web shell scripts added either during or after the site has been compromised. Web shell scripts, sometimes called backdoor scripts, often include a visual interface that may be used to upload, […] More info: https://hackrepair.com/blog/whats-a-web-shell-and-why-is-my-website-being-repeatedly-hacked

Episode 76: Ongoing Attacks on WP Growing in Volume Plus Numerous Plugin Vulnerabilities

On this week’s Think Like a Hacker podcast, we cover an active attack campaign targeting WordPress sites and numerous plugin vulnerabilities. This active attack campaign has been ongoing and has outpaced all other attacks on WordPress vulnerabilities. Our threat intelligence team has been tracking this attacker for months now, and we’re seeing these attacks intensifying. […] More info: https://www.wordfence.com/blog/2020/05/episode-76-ongoing-attacks-on-wp-growing-in-volume-plus-numerous-plugin-vulnerabilities/

MSA-20-0006: Remote code execution possible via SCORM packages

by Michael Hawkins. It was possible to create a SCORM package in such a way that when added to a course, it could be interacted with via web services in order to achieve remote code execution.Severity/Risk:SeriousVersions affected:3.8 to 3.8.2, 3.7 to 3.7.5, 3.6 to 3.6.9, 3.5 to 3.5.11 and earlier unsupported versionsVersions fixed:3.8.3, 3.7.6, 3.6.10 and 3.5.12Reported by:Paul HoldenWorkaround:Disable the SCORM package activity type until the patch is applied.CVE More info: https://moodle.org/mod/forum/discuss.php?d=403513&parent=1628593

MSA-20-0005: MathJax URL upgraded to later version to remove XSS risk (upstream)

by Michael Hawkins. MathJax versions 2.7.2 and earlier contain a stored XSS risk. The MathJax URL has been updated to reference a newer version, which has the vulnerability patched.Severity/Risk:SeriousVersions affected:3.8 to 3.8.2, 3.7 to 3.7.5, 3.6 to 3.6.9, 3.5 to 3.5.11 and earlier unsupported versionsVersions fixed:3.8.3, 3.7.6, 3.6.10 and 3.5.12Reported by:Abdullah HussamWorkaround:Manually update the MathJax URL in site administration to reference the patched version More info: https://moodle.org/mod/forum/discuss.php?d=403512&parent=1628590
Translate »