Security
Headlines
HeadlinesLatestCVEs

Tag

#windows

Leveraging Behavioral Analysis to Catch Living-Off-the-Land Attacks

Attackers are increasingly staying under the radar by using your own tools against you. Only behavioral AI can catch these stealthy attacks.

DARKReading
#web#mac#windows#git#backdoor#auth#ssh
Threat Source newsletter (March 16, 2023) — A deep dive into Talos' work in Ukraine

The latest episode of ThreatWise TV from Hazel Burton is the closest look yet at the team Talos assembled in the days after Russia invaded Ukraine.

Microsoft Outlook CVE-2023-23397 Proof Of Concept

Proof of concept code for a critical Microsoft Outlook vulnerability for Windows that allows hackers to remotely steal hashed passwords by simply receiving an email.

CVE-2023-28105: fix zip.Unzip path traversal vulnerability and add some new file util… · dablelv/go-huge-util@0e308b0

go-used-util has commonly used utility functions for Go. Versions prior to 0.0.34 have a ZipSlip issue when using fsutil package to unzip files. When users use `zip.Unzip` to unzip zip files from a malicious attacker, they may be vulnerable to path traversal. The issue has been fixed in version 0.0.34. There are no known workarounds.

CVE-2023-27041: bug_report/SQLi-1.md at main · forsean/bug_report

School Registration and Fee System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at/bilal final/edit_user.php.

Emotet adopts Microsoft OneNote attachments

Categories: Threat Intelligence Emotet finally got the memo and added Microsoft OneNote lures. (Read more...) The post Emotet adopts Microsoft OneNote attachments appeared first on Malwarebytes Labs.

CVE-2021-31637: UwAmp Arbitrary Code Execution

An issue found in UwAmp v.1.1, 1.2, 1.3, 2.0, 2.1, 2.2, 2.2.1, 3.0.0, 3.0.1, 3.0.2 allows a remote attacker to execute arbitrary code via a crafted DLL.

Bitbucket Environment Variable Remote Command Injection

For various versions of Bitbucket, there is an authenticated command injection vulnerability that can be exploited by injecting environment variables into a user name. This module achieves remote code execution as the atlbitbucket user by injecting the GIT_EXTERNAL_DIFF environment variable, a null character as a delimiter, and arbitrary code into a user's user name. The value (payload) of the GIT_EXTERNAL_DIFF environment variable will be run once the Bitbucket application is coerced into generating a diff. This Metasploit module requires at least admin credentials, as admins and above only have the option to change their user name.

Microsoft SQL Server 2014 / 2016 / 2017 / 2019 / 2022 Audit Logging Failure

Microsoft SQL Server 2014, 2016, 2017, 2019, and 2022 appears to ignore audit rules for sys.sysxlgns allowing an attacker with administrative permissions to extract password hashes under the radar. Microsoft told the researcher they are not willing to fix it but acknowledge it as a security problem.

CVE-2023-27250: bug_report/sql_injection.md at main · iknownt/bug_report

Online Book Store Project v1.0 is vulnerable to SQL Injection via /bookstore/bookPerPub.php.