Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
3 Web Security Takeaways From Wikipedia's Near Miss
Newest First  |  Oldest First  |  Threaded View
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
2/14/2014 | 9:42:37 AM
Re: How did you find the vulnerability
Thse of us in the realm you protect, salute you (and others) for your work! Definitely a growing and important field. 
shahartal
shahartal,
User Rank: Apprentice
2/14/2014 | 3:33:37 AM
Re: How did you find the vulnerability
These was no external activity to prompt the investigation. We regularly identify popular platforms and perform research in order to expose vulnerabilities that might harm all kinds of users. We're no 'protectors of the realm' but we do our best to help secure the Internet.
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
2/13/2014 | 4:48:02 PM
How did you find the vulnerability
Shahar, Were you looking for something specific, or did some activity the investigation? 
shahartal
shahartal,
User Rank: Apprentice
2/13/2014 | 1:58:31 AM
Re: Was anyone actually affected?
The WikiMedia foundation has stated that they found no evidence of a past attack exploiting that vulnerability. Of course, the first thing a clever attacker would do is clean the logs. As for other web sites, I don't know of any other case yet, but as the exploit has been made public on exploit repositories, it's a matter of finding the unprotected ones and simply running a script.
jagibbons
jagibbons,
User Rank: Strategist
2/12/2014 | 9:56:26 PM
Re: Was anyone actually affected?
The false sense of security around the oldie but goodie attack vectors is a very real issue. In the quest to protect against the newest threats, we don't always think about the older variants that are still out there. Security teams can't take anything for granted. Continually test and verify that systems are protected as best as they can be.
Thomas Claburn
Thomas Claburn,
User Rank: Ninja
2/12/2014 | 7:05:54 PM
Was anyone actually affected?
Did anyone get hacked as a result of this flaw or is that still to come if sites don't patch quickly enough?


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Improving Enterprise Cybersecurity With XDR
Enterprises are looking at eXtended Detection and Response technologies to improve their abilities to detect, and respond to, threats. While endpoint detection and response is not new to enterprise security, organizations have to improve network visibility, expand data collection and expand threat hunting capabilites if they want their XDR deployments to succeed. This issue of Tech Insights also includes: a market overview for XDR from Omdia, questions to ask before deploying XDR, and an XDR primer.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-37770
PUBLISHED: 2022-06-30
Nucleus CMS v3.71 is affected by a file upload vulnerability. In this vulnerability, we can use upload to change the upload path to the path without the Htaccess file. Upload an Htaccess file and write it to AddType application / x-httpd-php.jpg. In this way, an attacker can upload a picture with sh...
CVE-2021-37778
PUBLISHED: 2022-06-30
There is a buffer overflow in gps-sdr-sim v1.0 when parsing long command line parameters, which can lead to DoS or code execution.
CVE-2013-4146
PUBLISHED: 2022-06-30
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-3414. Reason: This candidate is a duplicate of CVE-2012-3414. Notes: All CVE users should reference CVE-2012-3414 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental u...
CVE-2013-4170
PUBLISHED: 2022-06-30
In general, Ember.js escapes or strips any user-supplied content before inserting it in strings that will be sent to innerHTML. However, the `tagName` property of an `Ember.View` was inserted into such a string without being sanitized. This means that if an application assigns a view's `tagName` to ...
CVE-2021-41506
PUBLISHED: 2022-06-30
Xiaongmai AHB7008T-MH-V2, AHB7804R-ELS, AHB7804R-MH-V2, AHB7808R-MS-V2, AHB7808R-MS, AHB7808T-MS-V2, AHB7804R-LMS, HI3518_50H10L_S39 V4.02.R11.7601.Nat.Onvif.20170420, V4.02.R11.Nat.Onvif.20160422, V4.02.R11.7601.Nat.Onvif.20170424, V4.02.R11.Nat.Onvif.20170327, V4.02.R11.Nat.Onvif.20161205, V4.02.R...