[ MDVSA-2013:004 ] tomcat5
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2013:004http://www.mandriva.com/security/...
View ArticleCyberLink PowerDVD #0day
1.Description:The ntk_PowerDVD12.sys kernel driver distributed with CyberLing PowerDVD containsan pool overflow vulnerability in the handling of IOCTL 0x9C402404.Exploitation of this issue allows an...
View ArticleToday's NIST CVE issuance's For Multiple Vulns In Adobe Products
Click on the underlined CVE for additional vuln specific infoCVE-2013-0627Summary: Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1...
View Articlebs.am Remote Add Admin Exploit
bs_am_remote_add_admin.au3BS.AM (BUSINESS SOLUTIONS) CMS REMOTE ADD ADMIN EXPLOIT.THIS IS A EXPLOIT WRITTEN IN AUTOIT SCRIPTING/PROGRAMMING LANGUAGE.ON SUCCESSFULL REMOTE EXPLOITATION IT WILL NEW ADMIN...
View ArticleJava 7 Update 10 remote code execution vulnerability
OverviewJava 7 Update 10 and earlier contain an unspecified vulnerability that can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.DescriptionJava 7 Update 10...
View Articlenew scripts/modules/exploits added to Nmap, OpenVAS, Metasploit, and Nessus...
This report describes any new scripts/modules/exploits added to Nmap,OpenVAS, Metasploit, and Nessus since yesterday.== OpenVAS plugins (3) ==r15109...
View ArticleGlobal Cyber Security Market to be Worth $68.34Bn in 2013 - New Market Study...
Analysis indicates that the global cyber security market is set to be worth $68.34bn in 2013, as exceedingly high-demand continues for information security systems across governments, global...
View ArticleGazzang Capitalizes on Big Data Security, Reports Record 2012
Linux Data Security Leader Closes $4 Million Investment Led by Austin VenturesAUSTIN, Texas--(BUSINESS WIRE)--Gazzang, the Linux data security company, today announced the company recently completed...
View ArticleApplication Security, Inc.’s TeamSHATTER Discovers Nine Database...
Researchers Credited with Reporting Critical Vulnerabilities that Allow An Attacker to Take Full Control of the Sybase ServerNEW YORK--(BUSINESS WIRE)--Application Security, Inc. (AppSecInc), the...
View ArticleTrustGo Releases Q4 Mobile Mayhem Report
43% Growth in 'High Risk' Apps Underscores the Unique Nature of the Mobile Security ChallengeSANTA CLARA, CA--(Marketwire - Jan 10, 2013) - TrustGo Mobile Inc. (TrustGo), a leading mobile security...
View ArticleVDC Research Predicts M2M Market to Exceed $25B by 2016
eading M2M Research Firm Releases Data that Supports the Growing Importance of Connectivity, Data Analysis and Security as a Competitive AdvantageNatick, MA (PRWEB) January 10, 2013VDC Research (VDC),...
View ArticleBabel HMAC Cryptographic Authentication
Abstract This document describes a cryptographic authentication mechanism for Babel routing protocol, updating, but not superceding RFC 6126. The mechanism allocates two new TLV types for the...
View ArticleNagios history.cgi Remote Command Execution Exploit
#!/usr/bin/python## CVE-2012-6096 - Nagios history.cgi Remote Command Execution# ===========================================================# Another year, another reincarnation of classic and trivial#...
View ArticleHero Framework 3.76 Multiple XSS Vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1Advisory: Hero Framework 3.76 Multiple Cross-site ScriptingvulnerabilitiesAdvisory ID: SSCHADV2012-023Author: Stefan SchurtzAffected Software: Successfully...
View ArticleDetailed examples of two vulnerabilities in whitelisting software: SE46...
The following vulnerabilities unfortunately seem to be largely unknown in public even though they are about a year old by now. They have both been patched by the vendors after I discovered them and...
View ArticleCisco Linksys Remote Preauth 0day Root Exploit
DefenseCode Security Advisory (UPCOMING): Cisco Linksys Remote Preauth 0day Root ExploitStory behind the vulnerability...Months ago, we've contacted Cisco about a remote preauth (root access)...
View ArticleU.S. Cities Relying on Precog Software to Predict Murder
Who needs the freaky precogs of Minority Report to predict if someone’s likely to commit murder when you have an algorithm that can do it for you?New crime-prediction software used in Maryland and...
View Article[RHSA-2013:0153-01] Critical: Ruby on Rails security update
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1===================================================================== Red Hat Security AdvisorySynopsis: Critical: Ruby on Rails...
View ArticleUnchecked Source of the 0day vuln
/*Unchecked Source of the 0day vulnpbBY: KAFEINE ON JAN 10TH, 2013 | Undecrypted souce for Java EveryDay 1.7.0_10Originaly placed on https://damagelab.org/index.php?showtopic=23719&st=0From Russia...
View ArticleTumblr's troll: A wake-up call for social networks
Social networking sites are becoming victims of their own success.Hundreds – even thousands – of users can share information faster than ever before, providing a more connected world. However, as more...
View Article