Updated dokuwiki packages fix security vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions. Vulnerabilities: Bypassing a security policy in DokuWiki Danger level: Middle Availability fixes: Yes Number of vulnerabilities: 4 CVSSv2 Rating: (AV: N / AC: M / Au: N / C: P / I: P / A: N / […]
Search Results
Cyber threats 2014: Bypassing a security policy in DokuWiki
Posted: November 6, 2014 in VulnerabilitiesTags: Cyber threats 2014, DokuWiki
Cyber threats 2014: Remote command execution in FreeBSD
Posted: November 5, 2014 in VulnerabilitiesTags: Cyber threats 2014, vulnerabilities in FreeBSD
“CVE-2014-8517” vulnerability: Remote command execution in FreeBSD FreeBSD developers have published a notification of elimination of vulnerability in FreeBSD. Operation of vulnerability allows to execute arbitrary commands, provides access to critical information and locks the computer. A malicious HTTP server could cause ftp to execute arbitrary commands. Danger level: High Availability fixes: Yes Number of […]
Cyber threats 2014: Serious vulnerability in Sony PlayStation Network
Posted: November 2, 2014 in Vulnerability NewsTags: critical vulnerability, Cyber threats 2014, Sony PlayStation Network
A serious vulnerability in the PlayStation Network service A critical vulnerability (SQL-injection) revealed in PlayStation Network. The flaw allows an attacker to gain access to Sony’s customer data. Experts in the field of cyber security have warned that in the Sony PlayStation Network was discovered a serious vulnerability. As reported at Golem.de, service from Sony […]
Cyber threats 2014: Dangerous vulnerability found in WordPress WP eCommerce plugin
Posted: November 1, 2014 in VulnerabilitiesTags: Cyber threats 2014, WordPress, WordPress vulnerabilities, WP eCommerce plugin
Information leak and access control bypass in WordPress WP eCommerce Plugin Exploitation of this vulnerability allows criminals to export all the user names, addresses and other confidential information of clients. Experts of the company Sucuri found dangerous vulnerability in the plugin “WP eCommerce”, which allows attackers to easily access and edit personal information of users. […]
Cyber threats 2014: Multiple vulnerabilities in EspoCRM
Posted: October 30, 2014 in VulnerabilitiesTags: Cyber threats 2014, EspoCRM
Three new vulnerabilities in the Open Source CRM EspoCRM: PHP File Inclusion, Improper Access Control and Reflected Cross-Site Scripting. Danger level: High Availability Corrections: Yes Number of vulnerabilities: 3 CVSSv2 Rating: (AV: N / AC: H / Au: N / C: C / I: C / A: C / E: U / RL: OF / […]
Trend Micro: Cyber threats for modern TVs
Posted: July 2, 2013 in Security NoticesTags: cyber threats, Smart TV threats, Trend Micro
Trend Micro has studied cyber threat to modern TVs Trend Micro has released a infographic for today’s cyber threats such as TV Smart TV. According to statistics, by 2016 the share of Smart TV will account for 85% of the market. According to experts at Trend Micro, the fact that the Smart TV allows its […]
Experts predict a vector of cyber threats in 2013
Posted: December 19, 2012 in IT Security NewsTags: cyber attacks, cyber security, cyber threats, Symantec
The main part of cyber attacks will focus on smart phones, social networks and the government. Researchers at Symantec presented their forecast of the threat of cyber security in the coming year. According to them, the main “victims” of malicious users and programs become mobile operating systems, social networks and government sites. Experts point out […]
Cybersecurity threats 2015: a security update that fixed five vulnerabilities in Joomla!
Posted: October 24, 2015 in Vulnerability NewsTags: Content Management System, High severity vulnerabilities, Joomla
Five vulnerabilities in the content management system Joomla! These flaws allows a remote user to elevate privileges on the system by exploiting SQL injection. One of vulnerabilities in Joomla! allows an attacker to gain administrator rights. The developers of the popular content management system Joomla released a security update that fixes five vulnerabilities. One of […]
Cybersecurity threats 2015: Three High severity vulnerabilities of the last week
Posted: October 6, 2015 in Vulnerability NewsTags: High severity vulnerabilities, Remote Code Execution, vtiger, WinRAR
Three High severity vulnerabilities of the last week Three high severity vulnerabilities have been discovered in the last week: Execution of arbitrary code in Avast Antivirus, Compromise a system via Unpatched WinRAR and Compromise the system in vtiger. 1. Execution of arbitrary code in Avast Antivirus Danger: Critical The number of vulnerabilities: 1 Vector of […]
Cybersecurity threats 2015: new security vulnerabilities has been found by security researchers
Posted: August 22, 2015 in VulnerabilitiesTags: Android, Android vulnerabilities, Apache Tomcat, Apple QuickTime, Apple QuickTime vulnerabilities, Cybersecurity threats 2015, Drupal, Drupal vulnerabilities
Several new security vulnerabilities of varying severity has been found by security researchers Several new security vulnerabilities of varying severity has been found by security researchers: System compromise in Android (high severity vulnerability) Bypassing security restrictions on Apache Tomcat (middle severity vulnerability) Multiple vulnerabilities in CMS Drupal (low severity vulnerability) Compromising the system in Apple […]