Tag
#windows
Crime Complaints Reporting Management System version 1.0 suffers from a remote shell upload vulnerability.
Courier Management System version 1.0 suffers from a cross site request forgery vulnerability.
Company Visitor Management version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
CMSsite version 1.0 suffers from a remote shell upload vulnerability.
CMS RIMI version 1.3 suffers from cross site request forgery and arbitrary file upload vulnerabilities.
Client Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
CCMS Project version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Biobook Social Networking Site version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
The proliferation of new top-level domains (TLDs) has exacerbated a well-known security weakness: Many organizations set up their internal Microsoft authentication systems years ago using domain names in TLDs that didn't exist at the time. Meaning, they are continuously sending their Windows usernames and passwords to domain names they do not control and which are freely available for anyone to register. Here's a look at one security researcher's efforts to map and shrink the size of this insidious problem.
Read the full article for key points from Intruder’s VP of Product, Andy Hornegold’s recent talk on exposure management. If you’d like to hear Andy’s insights first-hand, watch Intruder’s on-demand webinar. To learn more about reducing your attack surface, reach out to their team today. Attack surface management vs exposure management Attack surface management (ASM) is the ongoing