WhisperX tag archive

#clickjacking

This page collects WhisperX intelligence signals tagged #clickjacking. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (5)

The Lab · 2026-04-03 08:26:57 · GitHub Issues

1. Next.js App Exposed: Missing Critical Security Headers Opens Site to XSS, Clickjacking

A critical security oversight has left a Next.js application unprotected against common web attacks. The site's configuration lacks fundamental HTTP security headers, creating direct vulnerabilities to cross-site scripting (XSS), clickjacking, and MIME sniffing attacks. This exposure stems from an empty `next.config.ts...

The Lab · 2026-04-05 18:27:05 · GitHub Issues

2. Panopto Embed URL Vulnerability: Arbitrary Domain Injection Exposes Users to Clickjacking

A high-severity security flaw in a video utility function allows attackers to inject arbitrary domains into Panopto embed URLs, creating a direct vector for clickjacking and phishing attacks. The vulnerability resides in the `getVideoEmbedInfo()` function within `src/utils/video.ts`, which extracts a domain from user-s...

The Lab · 2026-04-12 15:22:35 · GitHub Issues

3. GitHub Security Alert: Next.js App Exposed to Clickjacking, XSS Due to Missing Security Headers

A critical security gap has been identified in a Next.js application's configuration, leaving it vulnerable to clickjacking attacks and amplifying the risk of cross-site scripting (XSS). The vulnerability, flagged as a MEDIUM severity finding (SEC-010), stems from the complete absence of essential security headers in t...

The Lab · 2026-05-07 18:31:40 · GitHub Issues

5. Ory Hydra consent flow vulnerability: arbitrary logo injection enables cookie exfiltration and clickjacking

A security research disclosure identifies multiple hardening gaps in Ory Hydra's consent and device authorization flows that, if exploited, could expose user credentials and enable UI-based attacks. The most actionable issue involves the consent page template at `consent.html`, which renders a logo specified by the OA...