vulnerability
Zero-day bug found in WordPress themes
A bug in a popular WordPress utility is being misused by attackers to upload and make appear on the targeted site annoying and possibly malicious content. The bug was …
Facebook introduces bug bounty program
Facebook has decided to follow in Google’s and Mozilla’s steps and institute a bug bounty program rewarding the responsible disclosure of security vulnerabilities …
Half of organizations face downtime due to patching
53 per cent of companies are affected by downtime when it comes to deploying patches, according to Dell KACE. A further 29 per cent of companies had IT teams conduct patching …
Samba XSS and request forgery vulnerabilities
Two vulnerabilities have been reported in Samba, which can be exploited by malicious people to conduct cross-site scripting and request forgery attacks. 1. The Samba Web …
phpMyAdmin multiple vulnerabilities
Multiple vulnerabilities have been reported in phpMyAdmin, according to Secunia. These can be exploited by malicious users to conduct cross-site scripting attacks and …
U.S. military contractors targeted with malicious PDFs
The last few months have seen a lot of cyber attacks aimed at U.S. military contractors and they are still ongoing. F-Secure researchers have recently spotted an email …
Mitigating software vulnerabilities
Microsoft released a new whitepaper that describes how exploit mitigation technologies can help reduce or eliminate risk, prevent attacks and minimize operational disruption …
Apache Tomcat security bypass vulnerability
A security issue and a vulnerability have been reported in Apache Tomcat, which can be exploited by malicious, local users to bypass certain security restrictions or cause a …
Trend Micro Control Manager file disclosure vulnerability
A vulnerability in Trend Micro Control Manager can be exploited by malicious users to disclose sensitive information, according to Secunia. Input passed via the …
SquirrelMail multiple vulnerabilities
Multiple vulnerabilities have been reported in SquirrelMail, according to Secunia. These vulnerabilities can be exploited by malicious users to conduct script insertion …
Critical vulnerability in Sun Java
ACROS Security has discovered a vulnerability in Sun Java, which can be exploited by malicious people to compromise a user’s system, according to Secunia. The …
SAP NetWeaver multiple vulnerabilities
Some vulnerabilities have been reported in SAP NetWeaver, which can be exploited by malicious people to conduct cross-site scripting attacks, disclose sensitive information, …