Security
Headlines
HeadlinesLatestCVEs

Tag

#auth

Mastercard's Bet on Recorded Future a Win for Cyber-Threat Intel

The $2.65B buy validates the growing importance of threat intelligence to enterprise security strategies.

DARKReading
#vulnerability#cisco#git#intel#auth#ibm
Target Practice: Honing Critical Skills on Cyber Ranges

Cyber ranges are a great way for cyber professionals to keep up on emerging threats and new technologies — while having a little fun.

ABB Cylon Aspect 3.08.01 (bigUpload.php) Remote Code Execution

The ABB BMS/BAS controller suffers from a remote code execution vulnerability. The vulnerable uploadFile() function in bigUpload.php improperly reads raw POST data using the php://input wrapper without sufficient validation. This data is passed to the fwrite() function, allowing arbitrary file writes. Combined with an improper sanitization of file paths, this leads to directory traversal, allowing an attacker to upload malicious files to arbitrary locations. Once a malicious file is written to an executable directory, an authenticated attacker can trigger the file to execute code and gain unauthorized access to the building controller.

ABB Cylon Aspect 3.08.01 (databaseFileDelete.php) Arbitrary File Delete

The BMS/BAS controller suffers from an arbitrary file deletion vulnerability. Input passed to the 'file' parameter in 'databasefiledelete.php' is not properly sanitised before being used to delete files. This can be exploited by an unauthenticated attacker to delete files with the permissions of the web server using directory traversal sequences passed within the affected POST parameter.

Dark Web Sales Fuel 32% Increase in Global Healthcare Cyberattacks

Healthcare organizations face a 32% surge in cyberattacks, with sensitive patient data being sold on the Dark Web.…

Commerce Dept. Proposes Ban on Automotive Software & Hardware From China, Russia

After launching an investigation in February into vehicles made by foreign adversaries, the Biden administration is finally making its move in the name of national security.

Invesalius 3.1 Arbitrary File Write / Directory Traversal

Proof of concept python3 code that creates a malicious payload to exploit an arbitrary file write via directory traversal in Invesalius version 3.1. In particular the exploitation steps of this vulnerability involve the use of a specifically crafted .inv3 (a custom extension for InVesalius) that is indeed a tar file file which, once imported inside the victim's client application allows an attacker to write files and folders on the disk.

Debian Security Advisory 5774-1

Debian Linux Security Advisory 5774-1 - It was discovered that ruby-saml, a SAML library implementing the client side of a SAML authorization, does not properly verify the signature of the SAML Response, which could result in bypass of authentication in an application using the ruby-saml library.

Registration And Login System 1.0 SQL Injection

Registration and Login System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

SPIP BigUp 4.3.1 Code Injection

SPIP BigUp version 4.3.1 suffers from a remote PHP code injection vulnerability.