Security
Headlines
HeadlinesLatestCVEs

Tag

#auth

Open Source Tool Looks for Signals in Noisy AWS Cloud Logs

Permiso Security announced Cloud Console Cartographer during Black Hat Asia to help defenders look inside Amazon Web Services events logs for signs of cyberattacks.

DARKReading
#vulnerability#web#google#microsoft#amazon#git#aws#auth
Elber Wayber Analog/Digital Audio STL 4.00 Device Config

The device suffers from an unauthenticated device configuration and client-side hidden functionality disclosure.

Elber Wayber Analog/Digital Audio STL 4.00 Authentication Bypass

The device suffers from an authentication bypass vulnerability through a direct and unauthorized access to the password management functionality. The issue allows attackers to bypass authentication by manipulating the set_pwd endpoint that enables them to overwrite the password of any user within the system. This grants unauthorized and administrative access to protected areas of the application compromising the device's system security.

Elber ESE DVB-S/S2 Satellite Receiver 1.5.x Device Config

The device suffers from an unauthenticated device configuration and client-side hidden functionality disclosure.

Elber ESE DVB-S/S2 Satellite Receiver 1.5.x Authentication Bypass

The device suffers from an authentication bypass vulnerability through a direct and unauthorized access to the password management functionality. The issue allows attackers to bypass authentication by manipulating the set_pwd endpoint that enables them to overwrite the password of any user within the system. This grants unauthorized and administrative access to protected areas of the application compromising the device's system security.

Elber Reble610 M/ODU XPIC IP-ASI-SDH Microwave Link Device Config

The device suffers from an unauthenticated device configuration and client-side hidden functionality disclosure.

Elber Reble610 M/ODU XPIC IP-ASI-SDH Microwave Link Authentication Bypass

The device suffers from an authentication bypass vulnerability through a direct and unauthorized access to the password management functionality. The issue allows attackers to bypass authentication by manipulating the set_pwd endpoint that enables them to overwrite the password of any user within the system. This grants unauthorized and administrative access to protected areas of the application compromising the device's system security.

Elber Cleber/3 Broadcast Multi-Purpose Platform 1.0.0 Device Config

The device suffers from an unauthenticated device configuration and client-side hidden functionality disclosure.

Elber Cleber/3 Broadcast Multi-Purpose Platform 1.0.0 Authentication Bypass

The device suffers from an authentication bypass vulnerability through a direct and unauthorized access to the password management functionality. The issue allows attackers to bypass authentication by manipulating the set_pwd endpoint that enables them to overwrite the password of any user within the system. This grants unauthorized and administrative access to protected areas of the application compromising the device's system security.

Elber Signum DVB-S/S2 IRD For Radio Networks 1.999 Device Config

The device suffers from an unauthenticated device configuration and client-side hidden functionality disclosure.