Pages

Friday 29 November 2013

Preparing for war: how far are we from a mass mobile cyber battle?


A mobile phone signal tower
Security is not just a concern for smartphone users – mobile operators can also be hit, and ignorance could cost them dearly
The demand for smarter mobile devices and multimedia content has seen a tremendous growth in the number of smartphones and tablets across the world. While PC shipments are dropping, personal mobile devices are destined for a bright future. There are reports that already claim up to 40% of internet time is spent on mobile devices, and there's no doubt they will become increasingly important in the personal as well as professional lives of millions of people.

Wednesday 27 November 2013

Why we are losing the cyber security war and what we can do about it

If this year’s attacks on Adobe, LexisNexis, NASDAQ, US Airways, and dozens of other large and technologically sophisticated US enterprises didn’t provide sufficient evidence that we are losing the cyber security war, the ongoing breaches by Anonymous make it undeniable. Why are the world’s most IT savvy companies unable to keep attackers out of their networks?

Monday 11 November 2013

Biggest cyber security threats to businesses

As we round out our 2013 business and IT plans, cyber criminals are resolving to implement increasingly sophisticated threats targeting specific computer systems and organisations big and small.
In the past year, businesses have seen several serious hacks and breaches.
http://techday.com/wp-content/uploads/cache/2013/11/176217552/1228694164.jpgAs the arms race between attackers and businesses continues to evolve in 2013, IT departments and security professionals will need to stay on top of the changing tactics and approaches used by criminal hackers in order to protect their organisations.
Below are Check Point’s top resolutions and the greatest security threats to businesses:

Monday 4 November 2013

Malware goes smart, too

http://spectator.sme.sk/img/articles/201311/big/51893.jpgIT SECURITY experts’ predictions that 2013 would see an increase in malware designed for mobile phones have come true. Experts say the rise of new and already known mobile malware will continue.
“Expectations have been met; we register a higher amount of modifications of so-far known malware,” Gabriel BraniÅ¡a, analyst at IT security company ESET, who specialises in malware for Android-based mobile devices, told The Slovak Spectator, adding that the first example of so-called ransomware, i.e. malicious software which blocks a device and requires a ransom to unblock it, has also surfaced.

Saturday 26 October 2013

IT Security Policy: Are You Implementing Yours?


 IT Security Policy: Are You Implementing Yours? image information monitoring 600x600Information monitoring is a tricky subject. We all want to be able to trust others with data, but information theft and data leakage happen all too often, and organizations are asking themselves how much they should be monitoring the way company information is used. But why is it an issue and how should it be done?

Thursday 10 October 2013

Cyber security takes discipline


Cyber Security_103378814
Policies, training are essential with new employees accessing data via mobile devices
Judging by frequent headlines about stolen credit card numbers and hacker attacks, companies face cyber security threats from literally around the world. But are Kentucky companies doing enough to keep their information – and customers’ data – safe?
Cyber threats take many shapes, from the proverbial hacker in his mom’s basement to organized gangs in Eastern European countries. And experts say the bad guys have to be right only one time to pull off an attack, whereas the corporate guardians have to get it right every day, all day to keep company assets safe.

Wednesday 2 October 2013

Top Microsoft investors want chairman Bill Gates to step down

Bill Gates owns about 4.5% of the $277 billion company and is its largest individual shareholder. Photo: AFP 
New York/Seattle: Three of the top 20 investors in Microsoft Corp.are lobbying the board to press for Bill Gates to step down as chairman of the software company he co-founded 38 years ago, according to people familiar with matter.
While Microsoft chief executive Steve Ballmer has been under pressure for years to improve the company’s performance and share price, this appears to be the first time that major shareholders are taking aim at Gates, who remains one of the most respected and influential figures in technology.

Friday 20 September 2013

OIL, ENERGY WATERING HOLE ATTACKS COULD BE TIED TO DOL ATTACKS

oilrigA string of watering hole attacks targeting oil and energy companies dating back to May could be linked to similar attacks against the U.S. Department of Labor website.
Researchers at Cisco discovered the compromised domains of 10 oil and energy companies worldwide, including hydroelectric plants, natural gas distributors, industrial suppliers to the energy sector and investment firms serving those markets. Six of the 10 sites shared the same Web design firm and >>>

FACEBOOK ANDROID BUG SENT USERS’ PHOTOS IN THE CLEAR

Saturday 14 September 2013

Will Samsung's Galaxy Gear change mobile trend?



Samsung Electronics, the world's No. 1 smarthone maker, unveiled its newest version of phablet Galaxy Note 3 and its companion gadget Galaxy Gear, a first-generation wearable device to complement Samsung's smartphones and phablets, at the Berlin trade show Thursday.
The Galaxy Gear smart watch, which will be on display at the IFA consumer electronics fair in Berlin for six days to Sept. 11, will be worn on the wrist to serve as a companion, or a supplementary device, to the new phablet, or a hybrid of smarpthone and tablet PC.
The voice-controlled smart watch..

Monday 2 September 2013

SYRIA’S OTHER ARMY: HOW THE HACKERS WAGE WAR

SEA-290.png At 5:41 P.M. on Tuesday, a tweet from the account of the hacker collective known as the Syrian Electronic Army, which supports the regime of Syria’s President, Bashar al-Assad,said, “Media is going down…” It had been a couple of hours since the Web site of theTimeshad gone offline for the second time this month. Roughly forty-five minutes later, the account asked Twitter, “Are you ready?” Some users had noticed that the backgrounds of their Twitter profiles had been transformed to Syria-related pictures. While Twitter quickly recovered, theTimes continued to be

Thursday 29 August 2013

Registrar Hack at Root of NY Times and Twitter Attacks

rusty lockThe attack that took down the New York Times Web site Tuesday afternoon, along with domains belonging to Twitter and the Huffington Post, was accomplished through the use of compromised credentials belonging to a reseller for the registrar that those companies use to buy their domains. MelbourneIT, the registrar the Times, Twitter and others use, was the initial target of the attack, which enabled the Syrian Electronic Army to change the DNS records for the targeted domains and redirect traffic from those sites to a domain that may have been hosting malware.

Friday 16 August 2013

9 Household Items That Could Be Spying on You

http://l.yimg.com/bt/api/res/1.2/yHgzw6U6zEGYbUV4pda.6A--/YXBwaWQ9eW5ld3M7Y2g9NDgzO2NyPTE7Y3c9NzI0O2R4PTA7ZHk9MDtmaT11bGNyb3A7aD00MjE7cT04NTt3PTYzMA--/http:/l.yimg.com/os/284/2012/04/19/91952208-jpg_174027.jpgFor Americans concerned about their privacy, the NSA data grabs are daunting, but what about the data grabs happening inside your own home, perpetrated not by the government, but by your coffee machine?
Consider every appliance and every piece of home electronics that you own. Does it gather data about how you use it? Does it connect to the Internet? If so,

Hackers use new tactic to attack U.S. media sites

HackingHackers promoting the Syrian Electronic Army simultaneously targeted websites belonging to CNN, Time and the Washington Post on Thursday by breaching Outbrain, a firm which publishes content recommendations on those sites.
That resulted in some WashingtonPost.com and Time.com customers being redirected to the website of the Syrian Electronic Army when they clicked on the content from Outbrain, said Outbrain Vice President Lisa LaCour. The CNN International site briefly displayed a headline that said "Hacked by SEA," she said.

Tuesday 13 August 2013

SIM card hacking makes most of US targets

With six billion people worldwide now using mobile phones, it’s become clear how globally reliant we are on cellular technology. Of course no great new technological wonder comes without its risks.
The dangers we face via our mobiles have reached epic proportions. Up until now the mobile related danger list comprised of cyber bulling....,

Friday 2 August 2013

China Mobile announces its first own-branded smartphones, including an LTE model for $210


cm phone3 520x390 China Mobile announces its first own branded smartphones, including an LTE model for $210China Mobile has launched two self-branded smartphones today, with one that is retailing at a mere RMB499 ($81), becoming the first-ever Chinese operator to manufacture phones as it seeks to increase its diversity and make up for not offering the iPhone on its network.
The world’s largest operator announced the launch of its phones on its official Sina Weibo page. The phone that is priced at RMB499 is a 4-inch smartphone called M601, which is powered by a MARVELL dual-core A9 1.2G high-speed processor and features a 3-megapixel rear camera.

Thursday 1 August 2013

United Kingdom completes digital switchover for 4G mobile networks

The UK's digital switchover is set to be completed later, five months ahead of the original deadline.
Engineers are expected to sign off on work in the north-east of Scotland and the Western Isles, paving the way for more 4G super-fast mobile networks.

Tuesday 23 July 2013

Millions of Sim cards are 'vulnerable to hack attack'

Millions of Sim cards are 'vulnerable to hack attack'
A flaw with mobile phones' Sim card technology is putting millions of people at risk of being spied on and robbed, according to a leading security expert.
Karsten Nohl has said he has found a way to discover some Sims' digital keys by sending them a special text message.

Friday 19 July 2013

Microsoft Has an Operating System for Your House

Researchers at Microsoft have released software aimed at making it easier for homes to be monitored, automated, and controlled using computers and the Internet. It also paves the way for developers to create apps that can be “installed” into homes with numerous different devices to make use of them in new ways.
Although Internet-connected products for the home—including security cameras, thermostats, and motion sensors—are readily available, it can be challenging to install them, and they typically work independently.

Wednesday 17 July 2013

GlassUp Takes on Google Glass With Connected Specs

GlassUpMiss out on becoming a Google Glass Explorer? Well you're in luck—sort of. GlassUp is here to fill the heads-up-display void with its GlassUp eyeglasses. These app-enabled specs connect directly with smartphones to deliver information right onto its lenses. The company has launched an Indiegogo campaign, with a goal of $150,000, and is opening up pre-orders starting today.
So let's be clear, GlassUp eyeglasses might share the same concept as Google Glass, but they are two entirely different products. While Google Glass features native voice control and a built-in camera, GlassUp's eyeglasses have neither. The company touts its lack of privacy issues, but really these are two big omissions. GlassUp's eyeglasses will be "receive only" to start, meaning they can only receive information like notifications and not actually do anything, like snap a picture.

Wednesday 29 May 2013

Bulletin (SB13-147) Vulnerability Summary for the Week of May 20, 2013

Original release date: May 28, 2013 
The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. The NVD is sponsored by the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) / United States Computer Emergency Readiness Team (US-CERT). For modified or updated entries, please visit the NVD, which contains historical vulnerability information.
The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:
  • High - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0
  • Medium - Vulnerabilities will be labeled Medium severity if they have a CVSS base score of 4.0 - 6.9
  • Low - Vulnerabilities will be labeled Low severity if they have a CVSS base score of 0.0 - 3.9
Entries may include additional information provided by organizations and efforts sponsored by US-CERT. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletins is compiled from external, open source reports and is not a direct result of US-CERT analysis.






3s-software -- codesys_gateway-serverUse-after-free vulnerability in the server application in 3S CODESYS Gateway 2.3.9.27 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via unspecified vectors.2013-05-2310.0CVE-2013-2781
angusj -- resource_hackerHeap-based buffer overflow in Resource Hacker 3.6.0.92 allows remote attackers to execute arbitrary code via a Portable Executable (PE) file with a resource section containing a string that has many tab or line feed characters.2013-05-239.3CVE-2012-6553
apple -- quicktimeBuffer overflow in Apple QuickTime before 7.7.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted enof atoms in a movie file.2013-05-249.3CVE-2013-0986
apple -- quicktimeApple QuickTime before 7.7.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted QTIF file.2013-05-249.3CVE-2013-0987
apple -- quicktimeBuffer overflow in Apple QuickTime before 7.7.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted FPX file.2013-05-249.3CVE-2013-0988
apple -- quicktimeBuffer overflow in Apple QuickTime before 7.7.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted MP3 file.2013-05-249.3CVE-2013-0989
apple -- quicktimeApple QuickTime before 7.7.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted TeXML file.2013-05-249.3CVE-2013-1015
apple -- quicktimeBuffer overflow in Apple QuickTime before 7.7.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file with H.263 encoding.2013-05-249.3CVE-2013-1016
apple -- quicktimeBuffer overflow in Apple QuickTime before 7.7.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted dref atoms in a movie file.2013-05-249.3CVE-2013-1017
apple -- quicktimeBuffer overflow in Apple QuickTime before 7.7.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file with H.264 encoding.2013-05-249.3CVE-2013-1018
apple -- quicktimeBuffer overflow in Apple QuickTime before 7.7.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file with Sorenson encoding.2013-05-249.3CVE-2013-1019
apple -- quicktimeApple QuickTime before 7.7.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted JPEG data in a movie file.2013-05-249.3CVE-2013-1020
apple -- quicktimeBuffer overflow in Apple QuickTime before 7.7.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted JPEG data in a movie file.2013-05-249.3CVE-2013-1021
apple -- quicktimeBuffer overflow in Apple QuickTime before 7.7.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted mvhd atoms in a movie file.2013-05-249.3CVE-2013-1022
freenac -- freenacSQL injection vulnerability in deviceadd.php in FreeNAC 3.02 allows remote attackers to execute arbitrary SQL commands via the status parameter.2013-05-237.5CVE-2012-6560
google -- chromeMultiple unspecified vulnerabilities in Google Chrome before 27.0.1453.93 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.2013-05-227.5CVE-2013-2836
google -- chromeUse-after-free vulnerability in the SVG implementation in Google Chrome before 27.0.1453.93 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.2013-05-227.5CVE-2013-2837
google -- chromeGoogle Chrome before 27.0.1453.93 does not properly perform a cast of an unspecified variable during handling of clipboard data, which allows remote attackers to cause a denial of service or possibly have other impact via unknown vectors.2013-05-227.5CVE-2013-2839
google -- chromeUse-after-free vulnerability in the media loader in Google Chrome before 27.0.1453.93 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2013-2846.2013-05-227.5CVE-2013-2840
google -- chromeUse-after-free vulnerability in Google Chrome before 27.0.1453.93 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of Pepper resources.2013-05-227.5CVE-2013-2841
google -- chromeUse-after-free vulnerability in Google Chrome before 27.0.1453.93 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of widgets.2013-05-227.5CVE-2013-2842
google -- chromeUse-after-free vulnerability in Google Chrome before 27.0.1453.93 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of speech data.2013-05-227.5CVE-2013-2843
google -- chromeUse-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in Google Chrome before 27.0.1453.93 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to style resolution.2013-05-227.5CVE-2013-2844
google -- chromeThe Web Audio implementation in Google Chrome before 27.0.1453.93 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.2013-05-227.5CVE-2013-2845
google -- chromeUse-after-free vulnerability in the media loader in Google Chrome before 27.0.1453.93 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2013-2840.2013-05-227.5CVE-2013-2846
infotecs -- vipnet_clientInfotecs ViPNet Client 3.2.10 (15632) and earlier, ViPNet Coordinator 3.2.10 (15632) and earlier, ViPNet Personal Firewall 3.1 and earlier, and ViPNet SafeDisk 4.1 (0.5643) and earlier use weak permissions (Everyone: Full Control) for a folder under %PROGRAMFILES%\Infotecs, which allows local users to gain privileges via a Trojan horse (1) executable file or (2) DLL file.2013-05-227.2CVE-2013-3496
turck -- bl20_programmable_gatewayTURCK BL20 Programmable Gateway and BL67 Programmable Gateway have hardcoded accounts, which allow remote attackers to obtain administrative access via an FTP session.2013-05-2310.0CVE-2012-4697






a51dev -- activecollab_chat_modulefunctions/html_to_text.php in the Chat module before 1.5.2 for activeCollab allows remote authenticated users to execute arbitrary PHP code via the message[message_text] parameter to chat/add_messag, which is not properly handled when executing the preg_replace function with the eval switch.2013-05-236.5CVE-2012-6554
apple -- itunesWebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.2013-05-206.8CVE-2013-0991
apple -- itunesWebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.2013-05-206.8CVE-2013-0992
apple -- itunesWebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.2013-05-206.8CVE-2013-0993
apple -- itunesWebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.2013-05-206.8CVE-2013-0994
apple -- itunesWebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.2013-05-206.8CVE-2013-0995
apple -- itunesWebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.2013-05-206.8CVE-2013-0996
apple -- itunesWebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.2013-05-206.8CVE-2013-0997
apple -- itunesWebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.2013-05-206.8CVE-2013-0998
apple -- itunesWebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.2013-05-206.8CVE-2013-0999
apple -- itunesWebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.2013-05-206.8CVE-2013-1000
apple -- itunesWebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.2013-05-206.8CVE-2013-1001
apple -- itunesWebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.2013-05-206.8CVE-2013-1002
apple -- itunesWebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.2013-05-206.8CVE-2013-1003
apple -- itunesWebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.2013-05-206.8CVE-2013-1004
apple -- itunesWebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.2013-05-206.8CVE-2013-1005
apple -- itunesWebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.2013-05-206.8CVE-2013-1006
apple -- itunesWebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.2013-05-206.8CVE-2013-1007
apple -- itunesWebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.2013-05-206.8CVE-2013-1008
apple -- itunesWebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.2013-05-206.8CVE-2013-1010
apple -- itunesWebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.2013-05-206.8CVE-2013-1011
canonical -- telepathy-idletelepathy-idle before 0.1.15 does not verify (1) that the issuer is a trusted CA, (2) that the server hostname matches a domain name in the subject's Common Name (CN), or (3) the expiration date of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.2013-05-215.8CVE-2007-6746
cisco -- ios_xrMemory leak in the SNMP process in Cisco IOS XR allows remote attackers to cause a denial of service (memory consumption or process reload) by sending many port-162 UDP packets, aka Bug ID CSCug80345.2013-05-235.0CVE-2013-1204
elgg -- elggCross-site scripting (XSS) vulnerability in engine/lib/views.php in Elgg before 1.8.5 allows remote attackers to inject arbitrary web script or HTML via the view parameter to index.php. NOTE: some of these details are obtained from third party information.2013-05-234.3CVE-2012-6561
elgg -- elggengine/lib/users.php in Elgg before 1.8.5 does not properly specify permissions for the useradd action, which allows remote attackers to create arbitrary accounts.2013-05-236.8CVE-2012-6562
elgg -- elggengine/lib/access.php in Elgg before 1.8.5 does not properly clear cached access lists during plugin boot, which allows remote attackers to read private entities via unspecified vectors.2013-05-234.3CVE-2012-6563
emc -- rsa_authentication_agentCross-site scripting (XSS) vulnerability in EMC RSA Authentication Agent 7.1 before 7.1.1 for Web for Internet Information Services, and 7.1 before 7.1.1 for Web for Apache, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.2013-05-224.3CVE-2013-0942
emc -- celerra_control_stationEMC VNX Control Station before 7.1.70.2 and Celerra Control Station before 6.0.70.1 have an incorrect group ownership for unspecified script files, which allows local users to gain privileges by leveraging nasadmin group membership.2013-05-206.8CVE-2013-3270
freenac -- freenacMultiple cross-site scripting (XSS) vulnerabilities in FreeNAC 3.02 allow remote attackers to inject arbitrary web script or HTML via the (1) comment, (2) mac, (3) graphtype, (4) name, or (5) type parameter to stats.php; or (6) comment parameter to deviceadd.php.2013-05-234.3CVE-2012-6559
google -- chromeGoogle V8, as used in Google Chrome before 27.0.1453.93, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.2013-05-225.0CVE-2013-2838
google -- chromeRace condition in the workers implementation in Google Chrome before 27.0.1453.93 allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact via unknown vectors.2013-05-226.8CVE-2013-2847
google -- chromeThe XSS Auditor in Google Chrome before 27.0.1453.93 might allow remote attackers to obtain sensitive information via unspecified vectors.2013-05-225.0CVE-2013-2848
google -- chromeMultiple cross-site scripting (XSS) vulnerabilities in Google Chrome before 27.0.1453.93 allow user-assisted remote attackers to inject arbitrary web script or HTML via vectors involving a (1) drag-and-drop or (2) copy-and-paste operation.2013-05-224.3CVE-2013-2849
heaventools -- pe_explorerHeap-based buffer overflow in HeavenTools PE Explorer 1.99 R6 allows remote attackers to execute arbitrary code via the size value for a string in the resource section of a Portable Executable (PE) file.2013-05-236.8CVE-2012-6558
jspautsch -- firstlastnamesMultiple cross-site scripting (XSS) vulnerabilities in the FirstLastNames plugin 1.1.1 for Vanilla Forums allow remote attackers to inject arbitrary web script or HTML via the (1) User/FirstName or (2) User/LastName parameter to the edit user page. NOTE: some of these details are obtained from third party information.2013-05-234.3CVE-2012-6556
microsys -- promoticDirectory traversal vulnerability in the PmWebDir object in the web server in MICROSYS PROMOTIC before 8.1.5 allows remote attackers to read arbitrary files via unspecified vectors.2013-05-235.0CVE-2011-4518
microsys -- promoticStack-based buffer overflow in an ActiveX component in MICROSYS PROMOTIC before 8.1.5 allows remote attackers to cause a denial of service via a crafted web page.2013-05-234.3CVE-2011-4519
microsys -- promoticHeap-based buffer overflow in an ActiveX component in MICROSYS PROMOTIC before 8.1.5 allows remote attackers to cause a denial of service via a crafted web page.2013-05-234.3CVE-2011-4520
openstack -- keystoneOpenStack Identity (Keystone) Folsom 2012.2.4 and earlier, Grizzly before 2013.1.1, and Havana does not immediately revoke the authentication token when deleting a user through the Keystone v2 API, which allows remote authenticated users to retain access via the token.2013-05-216.0CVE-2013-2059
qemu -- qemuThe qemu guest agent in Qemu 1.4.1 and earlier, as used by Xen, when started in daemon mode, uses weak permissions for certain files, which allows local users to read and write to these files.2013-05-216.9CVE-2013-2007
redhat -- enterprise_linuxrhn-migrate-classic-to-rhsm tool in Red Hat subscription-manager does not verify the Red Hat Network Classic server's X.509 certificate when migrating to a Certificate-based Red Hat Network, which allows remote man-in-the-middle attackers to obtain sensitive information such as user credentials.2013-05-214.3CVE-2012-6137
sahotataran -- latestcommentCross-site scripting (XSS) vulnerability in the LatestComment plugin 1.1 for Vanilla Forums allows remote attackers to inject arbitrary web script or HTML via the discussion title.2013-05-234.3CVE-2012-6555
vercot -- serva32Buffer overflow in the TFTPD service in Serva32 2.1.0 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long string in a read request.2013-05-205.0CVE-2013-0145
web2py -- web2pyCross-site scripting (XSS) vulnerability in static/js/share.js (aka the social bookmarking widget) in Web2py before 2.3.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.2013-05-224.3CVE-2013-2311
xen -- xenXen 4.0.x and 4.1.x incorrectly releases a grant reference when releasing a non-v1, non-transitive grant, which allows local guest administrators to cause a denial of service (host crash), obtain sensitive information, or possible have other impacts via unspecified vectors.2013-05-216.9CVE-2013-1964
zodiacdm -- aboutme-pluginMultiple cross-site scripting (XSS) vulnerabilities in the AboutMe plugin 1.1.1 for Vanilla Forums allow remote attackers to inject arbitrary web script or HTML via the (1) AboutMe/RealName, (2) AboutMe/Name, (3) AboutMe/Quote, (4) AboutMe/Loc, (5) AboutMe/Emp, (6) AboutMe/JobTit, (7) AboutMe/HS, (8) AboutMe/Col, (9) AboutMe/Bio, (10) AboutMe/Inter, (11) AboutMe/Mus, (12) AboutMe/Gam, (13) AboutMe/Mov, (14) AboutMe/FTV, or (15) AboutMe/Bks parameter to the Edit My Details page. NOTE: some of these details are obtained from third party information.2013-05-234.3CVE-2012-6557






apple -- itunesApple iTunes before 11.0.3 does not properly verify X.509 certificates, which allows man-in-the-middle attackers to spoof HTTPS servers via an arbitrary valid certificate.2013-05-202.9CVE-2013-1014
openstack -- devstackOpenStack devstack uses world-readable permissions for keystone.conf, which allows local users to obtain sensitive information such as the LDAP password and admin_token secret by reading the file.2013-05-212.1CVE-2013-1977
openstack -- keystoneOpenStack Identity (Keystone) Grizzly 2013.1.1, when DEBUG mode logging is enabled, logs the (1) admin_token and (2) LDAP password in plaintext, which allows local users to obtain sensitive by reading the log file.2013-05-212.1CVE-2013-2006
rsa -- authentication_agentEMC RSA Authentication API before 8.1 SP1, RSA Web Agent before 5.3.5 for Apache Web Server, RSA Web Agent before 5.3.5 for IIS, RSA PAM Agent before 7.0, and RSA Agent before 6.1.4 for Microsoft Windows use an improper encryption algorithm and a weak key for maintaining the stored data of the node secret for the SecurID Authentication API, which allows local users to obtain sensitive information via cryptographic attacks on this data.2013-05-222.1CVE-2013-0941