ATENTIONβΌ New - CVE-2011-4090
π Read
via "National Vulnerability Database".
Serendipity before 1.6 has an XSS issue in the karma plugin which may allow privilege escalation.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-4082
π Read
via "National Vulnerability Database".
A local file inclusion flaw was found in the way the phpLDAPadmin before 0.9.8 processed certain values of the "Accept-Language" HTTP header. A remote attacker could use this flaw to cause a denial of service via specially-crafted request.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-4076
π Read
via "National Vulnerability Database".
OpenStack Nova before 2012.1 allows someone with access to an EC2_ACCESS_KEY (equivalent to a username) to obtain the EC2_SECRET_KEY (equivalent to a password). Exposing the EC2_ACCESS_KEY via http or tools that allow man-in-the-middle over https could allow an attacker to easily obtain the EC2_SECRET_KEY. An attacker could also presumably brute force values for EC2_ACCESS_KEY.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-3632
π Read
via "National Vulnerability Database".
Hardlink before 0.1.2 operates on full file system objects path names which can allow a local attacker to use this flaw to conduct symlink attacks.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-3631
π Read
via "National Vulnerability Database".
Hardlink before 0.1.2 has multiple integer overflows leading to heap-based buffer overflows because of the way string lengths concatenation is done in the calculation of the required memory space to be used. A remote attacker could provide a specially-crafted directory tree and trick the local user into consolidating it, leading to hardlink executable crash or potentially arbitrary code execution with user privileges.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-3630
π Read
via "National Vulnerability Database".
Hardlink before 0.1.2 suffer from multiple stack-based buffer overflow flaws because of the way directory trees with deeply nested directories are processed. A remote attacker could provide a specially-crafted directory tree, and trick the local user into consolidating it, leading to hardlink executable crash, or, potentially arbitrary code execution with the privileges of the user running the hardlink executable.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-3624
π Read
via "National Vulnerability Database".
Various methods in WEBrick::HTTPRequest in Ruby 1.9.2 and 1.8.7 and earlier do not validate the X-Forwarded-For, X-Forwarded-Host and X-Forwarded-Server headers in requests, which might allow remote attackers to inject arbitrary text into log files or bypass intended address parsing via a crafted header.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-3617
π Read
via "National Vulnerability Database".
Tahoe-LAFS v1.3.0 through v1.8.2 could allow unauthorized users to delete immutable files in some cases.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-3609
π Read
via "National Vulnerability Database".
A CSRF issue was found in JBoss Application Server 7 before 7.1.0. JBoss did not properly restrict access to the management console information (for example via the "Access-Control-Allow-Origin" HTTP access control flag). This can lead to unauthorized information leak if a user with admin privileges visits a specially-crafted web page provided by a remote attacker.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-3606
π Read
via "National Vulnerability Database".
A DOM based cross-site scripting flaw was found in the JBoss Application Server 7 before 7.1.0 Beta 1 administration console. A remote attacker could provide a specially-crafted web page and trick the valid JBoss AS user, with the administrator privilege, to visit it, which would lead into the DOM environment modification and arbitrary HTML or web script execution.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-3600
π Read
via "National Vulnerability Database".
The /webtools/control/xmlrpc endpoint in OFBiz XML-RPC event handler is exposed to External Entity Injection by passing DOCTYPE declarations with executable payloads that discloses the contents of files in the filesystem. In addition, it can also be used to probe for open network ports, and figure out from returned error messages whether a file exists or not. This affects OFBiz 16.11.01 to 16.11.04.π Read
via "National Vulnerability Database".
β Sir Tim Berners-Lee publishes plan to save the web from βdigital dystopiaβ β
π Read
via "Naked Security".
Web inventor Sir Tim Berners-Lee has proposed a 'Contract for the Web' to rescue it from a headlong plunge into a moral abyss.π Read
via "Naked Security".
Naked Security
Sir Tim Berners-Lee publishes plan to save the web from βdigital dystopiaβ
Web inventor Sir Tim Berners-Lee has proposed a βContract for the Webβ to rescue it from a headlong plunge into a moral abyss.
β Black Friday Shoppers Targeted By Scams and Fake Domains β
π Read
via "Threatpost".
Cybercriminals are tapping in on Black Friday and Cyber Monday shoppers with an array of scams and malware - including domain impersonation, social media giveaway scams, and a malicious Chrome extension.π Read
via "Threatpost".
Threat Post
Black Friday Shoppers Targeted By Scams and Fake Domains
Cybercriminals are tapping in on Black Friday and Cyber Monday shoppers with an array of scams and malware - including domain impersonation, social media giveaway scams, and a malicious Chrome extension.
β National Veterinary Associates catches dose of ransomware β
π Read
via "Naked Security".
Ransomware attacks don't discriminate - and are just as happy targeting those with four legs as those with two.π Read
via "Naked Security".
Naked Security
National Veterinary Associates catches dose of ransomware
Ransomware attacks donβt discriminate β and are just as happy targeting those with four legs as those with two.
β Court says suspect canβt be forced to reveal 64-character password β
π Read
via "Naked Security".
We have to protect the constitutional rights of the innocent, and that can mean shielding guilty-as-hell child abusers, the court said.π Read
via "Naked Security".
Naked Security
Court says suspect canβt be forced to reveal 64-character password
We have to protect the constitutional rights of the innocent, and that can mean shielding guilty-as-hell child abusers, the court said.
β Parents say creep hacked their baby monitor to tell toddler they βloveβ her β
π Read
via "Naked Security".
The Taococo FREDI baby monitor has repeatedly been criticized for being easy to hack.π Read
via "Naked Security".
Naked Security
Parents say creep hacked their baby monitor to tell toddler they βloveβ her
The Taococo FREDI baby monitor has repeatedly been criticized for being easy to hack.
β Naked Security needs an intern! Hereβs how to apply β
π Read
via "Naked Security".
Naked Security is looking for a content marketing intern to join the team for 12 months in 2020.π Read
via "Naked Security".
Naked Security
Naked Security needs an intern! Hereβs how to apply
Naked Security is looking for a content marketing intern to join the team for 12 months in 2020.
π How scammers use Black Friday to target consumers π
π Read
via "Security on TechRepublic".
Holiday shopping scams try to bait consumers with special giveaways, giftcards, discounts, and coupons, according to a new report from cyber security company ZeroFOX.π Read
via "Security on TechRepublic".
TechRepublic
How scammers use Black Friday to target consumers
Holiday shopping scams try to bait consumers with special giveaways, giftcards, discounts, and coupons, according to a new report from cyber security company ZeroFOX.
π΄ 5 Ways to Champion and Increase Your 2020 Security Budget π΄
π Read
via "Dark Reading: ".
Give your organization's leadership an impactful, out-of-office experience so they know what's at stake with their budgeting decisions.π Read
via "Dark Reading: ".
Dark Reading
5 Ways to Champion and Increase Your 2020 Security Budget
Give your organization's leadership an impactful, out-of-office experience so they know what's at stake with their budgeting decisions.
β Managing the Human Security Factor in the Age of Ransomware β
π Read
via "Threatpost".
Convincing employees to take security seriously takes more than awareness campaigns.π Read
via "Threatpost".
Threat Post
Managing the Human Security Factor in the Age of Ransomware
Convincing employees to take security seriously takes more than awareness campaigns.