digitalcourage.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Diese Instanz wird betrieben von Digitalcourage e.V. für die Allgemeinheit. Damit wir das nachhaltig tun können, erheben wir einen jährlichen Vorausbeitrag von 1€/Monat per SEPA-Lastschrifteinzug.

Server stats:

808
active users

#Crosssitescripting

1 post1 participant0 posts today
Marcel SIneM(S)US<p>Sicherheitspatches: Angreifer können Schadcode auf <a href="https://social.tchncs.de/tags/GitLab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GitLab</span></a>-Servern verankern | Security <a href="https://www.heise.de/news/Sicherheitspatches-Angreifer-koennen-Schadcode-auf-GitLab-Servern-verankern-10523017.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Sicherheitspatch</span><span class="invisible">es-Angreifer-koennen-Schadcode-auf-GitLab-Servern-verankern-10523017.html</span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patchday</span></a> <a href="https://social.tchncs.de/tags/git" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>git</span></a> :git: <a href="https://social.tchncs.de/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> <a href="https://social.tchncs.de/tags/CrossSiteScripting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrossSiteScripting</span></a> <a href="https://social.tchncs.de/tags/storedXSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>storedXSS</span></a></p>
Marcel SIneM(S)US<p>Webframework Astro 5.9 wappnet sich gegen <a href="https://social.tchncs.de/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a>-Attacken | Developer <a href="https://www.heise.de/news/Webframework-Astro-5-9-wappnet-sich-gegen-XSS-Attacken-10438157.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Webframework-Ast</span><span class="invisible">ro-5-9-wappnet-sich-gegen-XSS-Attacken-10438157.html</span></a> <a href="https://social.tchncs.de/tags/CrossSiteScripting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrossSiteScripting</span></a></p>
Marcel SIneM(S)US<p>Sicherheitslücken <a href="https://social.tchncs.de/tags/Gitlab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Gitlab</span></a>: Heruntergestufte Admins behalten weitreichende Rechte | Security <a href="https://www.heise.de/news/Sicherheitsluecken-Gitlab-Heruntergestufte-Admins-behalten-weitreichende-Rechte-10332147.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Sicherheitslueck</span><span class="invisible">en-Gitlab-Heruntergestufte-Admins-behalten-weitreichende-Rechte-10332147.html</span></a> <a href="https://social.tchncs.de/tags/git" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>git</span></a> :git: <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patchday</span></a> <a href="https://social.tchncs.de/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> <a href="https://social.tchncs.de/tags/CrossSiteScripting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrossSiteScripting</span></a></p>
hugovangalen 🤖 🕹️ 😼<p>Cross-eyed scripting.</p><p>Cross-site scripting.</p><p>You haven't lived if you've done neither.</p><p><a href="https://mastodon.nl/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> <a href="https://mastodon.nl/tags/CrossSiteScripting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrossSiteScripting</span></a> <a href="https://mastodon.nl/tags/CrossEyedScripting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrossEyedScripting</span></a></p>
Marcel SIneM(S)US<p>Fünf Sicherheitslücken in <a href="https://social.tchncs.de/tags/Gitlab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Gitlab</span></a> geschlossen | Security <a href="https://www.heise.de/news/Ueber-Bug-Bounty-Programm-gemeldete-Sicherheitsluecken-in-Gitlab-geschlossen-10299543.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Ueber-Bug-Bounty</span><span class="invisible">-Programm-gemeldete-Sicherheitsluecken-in-Gitlab-geschlossen-10299543.html</span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patchday</span></a> <a href="https://social.tchncs.de/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> <a href="https://social.tchncs.de/tags/CrossSiteScripting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrossSiteScripting</span></a></p>
Pyrzout :vm:<p>ADR Report | Application Detection and Response Trends | Contrast Labs – Source: securityboulevard.com <a href="https://ciso2ciso.com/adr-report-application-detection-and-response-trends-contrast-labs-source-securityboulevard-com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/adr-report-appli</span><span class="invisible">cation-detection-and-response-trends-contrast-labs-source-securityboulevard-com/</span></a> <a href="https://social.skynetcloud.site/tags/ApplicationDetectionandResponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ApplicationDetectionandResponse</span></a>(ADR) <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/SecurityBloggersNetwork" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityBloggersNetwork</span></a> <a href="https://social.skynetcloud.site/tags/crosssitescripting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>crosssitescripting</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/Perimeterdefenses" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Perimeterdefenses</span></a> <a href="https://social.skynetcloud.site/tags/SecurityBoulevard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityBoulevard</span></a> #.netapplication <a href="https://social.skynetcloud.site/tags/methodtampering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>methodtampering</span></a> <a href="https://social.skynetcloud.site/tags/cyberattacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberattacks</span></a> <a href="https://social.skynetcloud.site/tags/SQLinjection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SQLinjection</span></a> <a href="https://social.skynetcloud.site/tags/APIsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APIsecurity</span></a> <a href="https://social.skynetcloud.site/tags/attacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attacks</span></a> #.NET <a href="https://social.skynetcloud.site/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a></p>
Marcel SIneM(S)US<p>Sicherheitsupdates <a href="https://social.tchncs.de/tags/Zimbra" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Zimbra</span></a>: Angreifer können Metadaten von E-Mails auslesen | Security <a href="https://www.heise.de/news/Sicherheitsupdates-Zimbra-Angreifer-koennen-Metadaten-von-E-Mails-auslesen-10277628.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Sicherheitsupdat</span><span class="invisible">es-Zimbra-Angreifer-koennen-Metadaten-von-E-Mails-auslesen-10277628.html</span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patchday</span></a> <a href="https://social.tchncs.de/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> <a href="https://social.tchncs.de/tags/CrossSiteScripting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrossSiteScripting</span></a></p>
Marcel SIneM(S)US<p>Jetzt patchen: Cross-Site-Scripting und Denial of Service in <a href="https://social.tchncs.de/tags/GitLab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GitLab</span></a> möglich | Developer <a href="https://www.heise.de/news/Jetzt-patchen-Cross-Site-Scripting-und-Denial-of-Service-in-GitLab-moeglich-10254924.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Jetzt-patchen-Cr</span><span class="invisible">oss-Site-Scripting-und-Denial-of-Service-in-GitLab-moeglich-10254924.html</span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patchday</span></a> <a href="https://social.tchncs.de/tags/DoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DoS</span></a> <a href="https://social.tchncs.de/tags/DenialOfService" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DenialOfService</span></a> <a href="https://social.tchncs.de/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> <a href="https://social.tchncs.de/tags/CrossSiteScripting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrossSiteScripting</span></a></p>
Marcel SIneM(S)US<p>Heimserver-Betriebssystem: Updates beheben Sicherheitslücken in <a href="https://social.tchncs.de/tags/Unraid" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Unraid</span></a> | Security <a href="https://www.heise.de/news/Heimserver-Betriebssystem-Updates-beheben-Sicherheitsluecken-in-Unraid-10253366.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Heimserver-Betri</span><span class="invisible">ebssystem-Updates-beheben-Sicherheitsluecken-in-Unraid-10253366.html</span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patchday</span></a> <a href="https://social.tchncs.de/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> <a href="https://social.tchncs.de/tags/CrossSiteScripting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrossSiteScripting</span></a></p>
Marcel SIneM(S)US<p><a href="https://social.tchncs.de/tags/CMS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CMS</span></a>: Updates stopfen Sicherheitslecks in <a href="https://social.tchncs.de/tags/ProgressSitefinity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ProgressSitefinity</span></a> | Security <a href="https://www.heise.de/news/CMS-Updates-stopfen-Sicherheitslecks-in-Progress-Sitefinity-10233332.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/CMS-Updates-stop</span><span class="invisible">fen-Sicherheitslecks-in-Progress-Sitefinity-10233332.html</span></a> <a href="https://social.tchncs.de/tags/Sitefinity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sitefinity</span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patchday</span></a> <a href="https://social.tchncs.de/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> <a href="https://social.tchncs.de/tags/CrossSiteScripting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrossSiteScripting</span></a> <a href="https://social.tchncs.de/tags/ContentManagementSystem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ContentManagementSystem</span></a></p>
Marcel SIneM(S)US<p><a href="https://social.tchncs.de/tags/CrushFTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrushFTP</span></a>: Attacken auf Admins möglich | Security <a href="https://www.heise.de/news/CrushFTP-Attacken-auf-Admins-moeglich-10202537.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/CrushFTP-Attacke</span><span class="invisible">n-auf-Admins-moeglich-10202537.html</span></a> <a href="https://social.tchncs.de/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> <a href="https://social.tchncs.de/tags/CrossSiteScripting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrossSiteScripting</span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patchday</span></a></p>
Marcel SIneM(S)US<p>Web-Security: Mit Content Security Policy gegen Cross-Site Scripting, Teil 2 | Developer <a href="https://www.heise.de/hintergrund/Web-Security-Mit-Content-Security-Policy-gegen-Cross-Site-Scripting-Teil-2-10175246.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/hintergrund/Web-Secur</span><span class="invisible">ity-Mit-Content-Security-Policy-gegen-Cross-Site-Scripting-Teil-2-10175246.html</span></a> <a href="https://social.tchncs.de/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> <a href="https://social.tchncs.de/tags/development" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>development</span></a> <a href="https://social.tchncs.de/tags/JavaScript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JavaScript</span></a> <a href="https://social.tchncs.de/tags/CrossSiteScripting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrossSiteScripting</span></a></p>
apfeltalk :verified:<p>iOS 18.1.1 und macOS Sequoia 15.1.1 schließen aktiv ausgenutzte Sicherheitslücken<br>Apple hat mit den neuen Updates iOS 18.1.1 und macOS Sequoia 15.1.1 bedeutende Sicherheitslücken geschlossen, die Beric<br><a href="https://www.apfeltalk.de/magazin/feature/ios-18-1-1-und-macos-sequoia-15-1-1-schliessen-aktiv-ausgenutzte-sicherheitsluecken/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">apfeltalk.de/magazin/feature/i</span><span class="invisible">os-18-1-1-und-macos-sequoia-15-1-1-schliessen-aktiv-ausgenutzte-sicherheitsluecken/</span></a><br><a href="https://creators.social/tags/Feature" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Feature</span></a> <a href="https://creators.social/tags/iPad" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iPad</span></a> <a href="https://creators.social/tags/iPhone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iPhone</span></a> <a href="https://creators.social/tags/Mac" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mac</span></a> <a href="https://creators.social/tags/Apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Apple</span></a> <a href="https://creators.social/tags/CrossSiteScripting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrossSiteScripting</span></a> <a href="https://creators.social/tags/CVE202444308" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE202444308</span></a> <a href="https://creators.social/tags/CVE202444309" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE202444309</span></a> <a href="https://creators.social/tags/IntelMac" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IntelMac</span></a> <a href="https://creators.social/tags/IOS1811" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IOS1811</span></a> <a href="https://creators.social/tags/JavaScriptCore" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JavaScriptCore</span></a> <a href="https://creators.social/tags/MacOSSequoia1511" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MacOSSequoia1511</span></a> <a href="https://creators.social/tags/Sicherheitsupdate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitsupdate</span></a> <a href="https://creators.social/tags/Webkit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Webkit</span></a></p>
Marcel SIneM(S)US<p>Web-Security: Mit Content Security Policy gegen Cross-Site Scripting, Teil 1 | Developer <a href="https://www.heise.de/hintergrund/Web-Security-Mit-Content-Security-Policy-gegen-Cross-Site-Scripting-Teil-1-9998046.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/hintergrund/Web-Secur</span><span class="invisible">ity-Mit-Content-Security-Policy-gegen-Cross-Site-Scripting-Teil-1-9998046.html</span></a> <a href="https://social.tchncs.de/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> <a href="https://social.tchncs.de/tags/Development" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Development</span></a> <a href="https://social.tchncs.de/tags/JavaScript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JavaScript</span></a> <a href="https://social.tchncs.de/tags/CrossSiteScripting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrossSiteScripting</span></a></p>
Marcel SIneM(S)US<p><a href="https://social.tchncs.de/tags/SecureByDesign" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecureByDesign</span></a>: <a href="https://social.tchncs.de/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> und <a href="https://social.tchncs.de/tags/FBI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FBI</span></a> wollen <a href="https://social.tchncs.de/tags/CrossSiteScripting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrossSiteScripting</span></a> den Garaus machen | Security <a href="https://www.heise.de/news/Secure-by-Design-CISA-und-FBI-wollen-Cross-Site-Scripting-den-Garaus-machen-9952290.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Secure-by-Design</span><span class="invisible">-CISA-und-FBI-wollen-Cross-Site-Scripting-den-Garaus-machen-9952290.html</span></a> <a href="https://social.tchncs.de/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a></p>
Scripter :verified_flashing:<p>Secure by Design: CISA und FBI wollen Cross-Site-Scripting den Garaus machen | heise online<br><a href="https://heise.de/-9952290" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">heise.de/-9952290</span><span class="invisible"></span></a> <a href="https://social.tchncs.de/tags/CrossSiteScripting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrossSiteScripting</span></a></p>
Tarnkappe.info<p>📬 Arc – Schwere Sicherheitslücke gefunden<br><a href="https://social.tchncs.de/tags/ITSicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSicherheit</span></a> <a href="https://social.tchncs.de/tags/ArcBrowser" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ArcBrowser</span></a> <a href="https://social.tchncs.de/tags/Browser" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Browser</span></a> <a href="https://social.tchncs.de/tags/CrossSiteScripting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrossSiteScripting</span></a> <a href="https://social.tchncs.de/tags/Sicherheitsl%C3%BCcke" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücke</span></a> <a href="https://sc.tarnkappe.info/3b3a30" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">sc.tarnkappe.info/3b3a30</span><span class="invisible"></span></a></p>
Marcel SIneM(S)US<p>Ticketsystem <a href="https://social.tchncs.de/tags/OTRS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OTRS</span></a>: Angreifer können unverschlüsselte Passwörter einsehen | Security <a href="https://www.heise.de/news/Ticketsystem-OTRS-Angreifer-koennen-unverschluesselte-Passwoerter-einsehen-9849809.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Ticketsystem-OTR</span><span class="invisible">S-Angreifer-koennen-unverschluesselte-Passwoerter-einsehen-9849809.html</span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patchday</span></a> <a href="https://social.tchncs.de/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> <a href="https://social.tchncs.de/tags/CrossSiteScripting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrossSiteScripting</span></a></p>
Marcel SIneM(S)US<p>Sicherheitsupdates: Lernplattform <a href="https://social.tchncs.de/tags/Moodle" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Moodle</span></a> vielfältig angreifbar | Security <a href="https://www.heise.de/news/Sicherheitsupdates-Lernplattform-Moodle-vielfaeltig-angreifbar-9840415.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Sicherheitsupdat</span><span class="invisible">es-Lernplattform-Moodle-vielfaeltig-angreifbar-9840415.html</span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patchday</span></a> <a href="https://social.tchncs.de/tags/CrossSiteScripting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrossSiteScripting</span></a> <a href="https://social.tchncs.de/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a></p>
Marcel SIneM(S)US<p>Bitte patchen! Security-Update behebt kritische Schwachstelle in <a href="https://social.tchncs.de/tags/GitLab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GitLab</span></a> | Developer <a href="https://www.heise.de/news/Bitte-patchen-Security-Update-behebt-kritische-Schwachstelle-in-GitLab-9780254.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Bitte-patchen-Se</span><span class="invisible">curity-Update-behebt-kritische-Schwachstelle-in-GitLab-9780254.html</span></a> <a href="https://social.tchncs.de/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> <a href="https://social.tchncs.de/tags/CrossSiteScripting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrossSiteScripting</span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patchday</span></a></p>