Microsoft Internet Explorer CVE-2013-5049 Memory Corruption Vulnerability
Type: Vulnerability. Microsoft Internet Explorer is prone to a memory-corruption vulnerability; fixes are available. more…Microsoft Internet Explorer CVE-2013-5051 Memory Corruption Vulnerability
Type: Vulnerability. Microsoft Internet Explorer is prone to a memory-corruption vulnerability; fixes are available. more…Microsoft Windows Local Procedure Call CVE-2013-3878 Local Privilege Escalation Vulnerability
Type: Vulnerability. Microsoft Windows is prone to a local privilege-escalation vulnerability; fixes are available. more…Exploit Targeting Windows Zero-Day Vulnerability Spotted
Trend Micro has acquired samples of an exploit targeting the recent zero-day vulnerability affecting Windows XP and Server 2003. This is an elevation of privilege vulnerability, which may allow an attacker to gain privileges that would enable him to do various activities, including deleting or viewing data, installing programs, or creating accounts with administrative privileges. We […] more…Microsoft Windows Kernel ‘NDProxy.sys’ Local Privilege Escalation Vulnerability
Type: Vulnerability. Microsoft Windows is prone to a local privilege-escalation vulnerability. more…Hackers actively exploiting JBoss vulnerability to compromise servers, researchers say
Attackers are actively exploiting a known vulnerability to compromise JBoss Java EE application servers that expose the HTTP Invoker service to the Internet in an insecure manner. read more more…Hackers claim they used zero-day vulnerability to breach vBulletin support forum
A group of hackers claim to have exploited an undocumented vulnerability in the vBulletin Internet forum software in order to break into the MacRumors.com and vBulletin.com forums. read more more…November Patch Tuesday Addresses New IE Zero-Day Exploit, But TIFF Vulnerability Still Unpatched
It’s Patch Tuesday again, and Microsoft has served up eight bulletins this month, three of them rated Critical. One of the three critical bulletins – MS13-090 – deserves special mention, as it fixes a zero-day vulnerability (CVE-2013-3918) found just last week in an Internet Explorer ActiveX control. Separately, IE itself fixed ten vulnerabilities as part […] more…Microsoft Windows Graphics Device Interface CVE-2013-3940 Remote Integer Overflow Vulnerability
Type: Vulnerability. Microsoft Windows is prone to a remote integer-overflow vulnerability; fixes are available. more…Microsoft Windows Ancillary Function Driver CVE-2013-3887 Local Information Disclosure Vulnerability
Type: Vulnerability. Microsoft Windows is prone to a local information-disclosure vulnerability; fixes are available. more…Microsoft Windows Hyper-V CVE-2013-3898 Local Privilege Escalation Vulnerability
Type: Vulnerability. Microsoft Windows is prone to a local privilege-escalation vulnerability; fixes are available. more…Microsoft Windows XML Digital Signatures CVE-2013-3869 Remote Denial of Service Vulnerability
Type: Vulnerability. Microsoft Windows is prone to a remote denial-of-service vulnerability; fixes are available. more…libjpeg/libjpeg-turbo Library CVE-2013-6629 Memory Corruption Vulnerability
Type: Vulnerability. libjpeg and libjpeg-turbo libraries are prone to a memory-corruption vulnerability; fixes are available. more…Microsoft Outlook CVE-2013-3905 Information Disclosure Vulnerability
Type: Vulnerability. Microsoft Outlook is prone to an information-disclosure vulnerability; fixes are available. more…Microsoft Internet Explorer CVE-2013-3910 Memory Corruption Vulnerability
Type: Vulnerability. Microsoft Internet Explorer is prone to a memory-corruption vulnerability; fixes are available. more…Microsoft Internet Explorer CVE-2013-3912 Memory Corruption Vulnerability
Type: Vulnerability. Microsoft Internet Explorer is prone to a memory-corruption vulnerability; fixes are available. more…More information
- Flaws in Phoenix Contact Automationworx Allow Code Execution via Malicious Files
- North Korea Denies Involvement in WannaCry Cyberattack
- Palo Alto Networks Patches Serious DoS, Code Execution Flaws in PAN-OS
- Preparing for GDPR in 2017, Part 4: Your SOC
- CIA Coder Convicted of Massive Leak of US Hacking Tools
- HP bulks up security features on enterprise LaserJet printers
- Cyber Incident Hits UK Postal Service, Halts Overseas Mail
- Longtime Apple programmer and Swift creator leaves Apple for Tesla
- Assange names country targeted by NSA’s MYSTIC mass phone tapping program
- Facebook rolls out code to kick the shins off Adblock Plus reblocking