vulnerability
XSS bug in Skype iPhone app allows address book theft
A bug in the latest version of Skype for iPhone and iPod touch makes its users vulnerable to having their address book stolen just by viewing a specially crafted message, says …
iManager multiple vulnerabilities
Gjoko Krstic has discovered multiple vulnerabilities in iManager, which can be exploited by malicious people to conduct cross-site scripting attacks, manipulate certain data, …
phpMyAdmin multiple script insertion vulnerabilities
Multiple vulnerabilities have been reported in phpMyAdmin, which can be exploited by malicious users to conduct script insertion attacks, according to Secunia. 1. Certain …
HP expands its Enterprise Security Solutions portfolio
HP expanded its Enterprise Security Solutions portfolio to help enterprises establish and execute a comprehensive security strategy to deal with threats resulting from the …
Wireshark 1.6.2 fixes vulnerabilities
Wireshark is a popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education. The following vulnerabilities have been fixed: A large …
Drupal Author Pane module security bypass weakness
A weakness has been reported in the Author Pane module for Drupal, which can be exploited by malicious people to bypass certain security restrictions, according to Secunia. …
OpenSSL CRL bypass and ECDH DoS vulnerability
Two vulnerabilities have been reported in OpenSSL, which can be exploited by malicious people to bypass certain security restrictions and cause a Denial of Service, according …
MantisBT multiple vulnerabilities
Vulnerabilities have been reported in MantisBT, according to Secunia. These can be exploited by malicious people to conduct cross-site scripting attacks and disclose …
vAuthenticate multiple SQL injection vulnerabilities
Multiple vulnerabilities have been discovered in vAuthenticate, which can be exploited by malicious users and malicious people to conduct SQL injection attacks, according to …
Facebook pays bug hunters $40,000 in three weeks
The recently introduced Facebook bug bounty program has proved to be a great success, says Joe Sullivan, the company’s chief security officer. “We know and have …
Slow HTTP DoS vulnerability test tool
Slow HTTP DoS attacks rely on the fact that the HTTP protocol, by design, requires requests to be completely received by the server before they are processed. If an HTTP …
“Apache Killer” tool spotted in the wild
The developers behind the open source Apache Foundation issued a warning for all users of the Apache HTTPD Web Server, as an attack tool it has been made available on the …
Featured news
Resources
Don't miss
- Man vs. machine: Striking the perfect balance in threat intelligence
- Misconfig Mapper: Open-source tool to uncover security misconfigurations
- Why AI deployment requires a new level of governance
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests