vulnerability
PDF-Pro multiple vulnerabilities
Several vulnerabilities in PDF-Pro can be exploited by malicious people to compromise a user’s system, according to Secunia. 1. The application loads libraries (e.g. …
Cisco Firewall Services Module DoS vulnerability
A vulnerability exists in the Cisco Firewall Services Module (FWSM) for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers that may cause the Cisco FWSM to …
Flaw in MS Malware Protection Engine puts users at risk
The latest update to the Microsoft Malware Protection Engine includes a patch for a vulnerability that could allow an elevation of privilege if the Engine performs a scan of …
Spyware compromises 150,000+ Symbian devices
A new variant of spyware “Spy.Felxispy” on Symbian devices causing privacy leakage has recently been captured by the National Computer Virus Emergency Response …
BIND Denial of Service vulnerability
A vulnerability has been reported in BIND, which can be exploited by malicious people to cause a Denial of Service, according to Secunia. When an authoritative server …
Mailman script insertion vulnerabilities
Some vulnerabilities have been reported in Mailman, which can be exploited by malicious users to conduct script insertion attacks, according to Secunia. Input passed via the …
Vulnerability allows phishing messages on RapidShare.com
An improper input validation vulnerability discovered recently by M86’s researchers could be used to create phishing messages targeting RapidShare users. The discovery …
Real-time threat intelligence delivery
As the threat landscape is evolving on a daily basis, it is imperative that organizations and their IT security teams are aware of the latest vulnerability threats. Perimeter …
Moderately critical MS Windows vulnerability revealed
Information about a critical Microsoft Windows SMB browser election request parsing vulnerability turned up two days ago on the Full Disclosure mailing list and further …
Sun Java by far the most vulnerable plug-in
Wondering how secure your browser is? Today at the RSA Conference in San Francisco, Qualys CTO Wolfgang Kandek presented their research which clearly shows that browser …
124 new advanced evasion techniques discovered
Stonesoft announced it has discovered 124 new advanced evasion techniques (AETs). Samples of these AETs have been delivered to the Computer Emergency Response Team (CERT-FI), …
Multiple vulnerabilities in Django
Vulnerabilities have been reported in Django, which can be exploited by malicious people to bypass certain security restrictions and conduct script insertion and cross-site …
Featured news
Resources
Don't miss
- Cisco fixes ClamAV vulnerability with available PoC and critical Meeting Management flaw
- SonicWall SMA appliances exploited in zero-day attacks (CVE-2025-23006)
- Defense strategies to counter escalating hybrid attacks
- Web Cache Vulnerability Scanner: Open-source tool for detecting web cache poisoning
- Funding soars in a milestone year for Israeli cybersecurity