Remove index.html
article thumbnail

Large-scale Citrix NetScaler Gateway credential harvesting campaign exploits CVE-2023-3519

Security Affairs

The attackers exploited the flaw to inject a malicious Javascript into the device “index.html” login page. Then the attackers appended custom HTML code to “index.html” which references a remote JavaScript file hosted on attacker-controlled infrastructure. ” reads the report published by IBM X-Force.

article thumbnail

Cyber Defense Magazine – September 2020 has arrived. Enjoy it!

Security Affairs

We hope you enjoy this month’s edition…packed with over 150 pages of excellent content. 150 Pages Loaded with excellent content Learn from the experts, cybersecurity best practices Find out about upcoming information security related conferences, expos and trade shows. Always free, no strings attached.

IT 83
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyber Defense Magazine – July 2020 has arrived. Enjoy it!

Security Affairs

OVER 165 PAGESALWAYS FREE – LOADED WITH EXCELLENT CONTENT Learn from the experts, cybersecurity best practices Find out about upcoming information security related conferences, expos and trade shows. We hope you enjoy this month’s edition…packed with over 165 pages of excellent content. Always free, no strings attached.

B2C 82
article thumbnail

Cyber Defense Magazine – August 2020 has arrived. Enjoy it!

Security Affairs

OVER 145 PAGESALWAYS FREE – LOADED WITH EXCELLENT CONTENT Learn from the experts, cybersecurity best practices Find out about upcoming information security related conferences, expos and trade shows. We hope you enjoy this month’s edition…packed with over 147 pages of excellent content. Always free, no strings attached.

B2C 81
article thumbnail

WordPress Easy WP SMTP zero-day potentially exposes hundreds of thousands of sites to hack

Security Affairs

“The plugin’s folder doesn’t have any index.html file, hence, on servers that have directory listing enabled, hackers can find and view the log,” reads the post published by Ninja Technologies Network (NinTechNet). The log is a text file with a random name, e.g., 5fcdb91308506_debug_log.txt.”

Passwords 145
article thumbnail

Cyber Defense Magazine ? July 2020 has arrived. Enjoy it!

Security Affairs

OVER 165 PAGESALWAYS FREE – LOADED WITH EXCELLENT CONTENT Learn from the experts, cybersecurity best practices Find out about upcoming information security related conferences, expos and trade shows. With much appreciation to our sponsors. Always free, no strings attached.

B2C 59
article thumbnail

Thousands of Citrix servers still vulnerable to CVE-2022-27510 and CVE-2022-27518 

Security Affairs

The experts noticed that there is an MD5 hash-like value in the HTTP body when requesting the URL: /vpn/index.html . Unfortunately, the version number of these installs was not included in the HTTP response from the servers.

Cloud 98