Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in January 2008
<<   <   Page 3 / 3
Brits May Outlaw Data Loss
Quick Hits  |  1/4/2008  | 
Criminal proceedings could occur in cases of reckless or repeated loss of personal data
Urban WiFi Routers at Risk
News  |  1/3/2008  | 
Indiana University researchers say densely populated wireless routers could be the next method for spreading pharming, script injection, and bot infections
'Secret Crush' Spreads Spyware, Not Love
Quick Hits  |  1/3/2008  | 
First-ever spyware attack using Facebook application platform tempts victims with a secret crush
Ounce Labs Records Record Sales
News  |  1/3/2008  | 
Success resulted from continued enterprise customer adoption of its application security solution
MessageLabs Gets UK Gov't Mark of Approval Again
News  |  1/3/2008  | 
West Coast Labs' Checkmark Anti-Malware also received
The Perfect Jewelry Heist
News  |  1/3/2008  | 
CourtTV's 'Tiger Team' demonstrates just how lethal a blended attack can be
Breaches Plague Government Agencies
News  |  1/2/2008  | 
Lost laptops in Tennessee's Davidson County and at the US Air Force add to concerns about government's privacy practices
Akonix Spots 18 New IM Attacks
News  |  1/2/2008  | 
Akonix publishes December Threat Report, noting increase in threat sophistication and malicious intent
Enterprises Aren't Shivering in Their Breaches
News  |  1/2/2008  | 
Record statistics on data breaches may be deceiving
Is Sears Sending Spyware to Customers?
Quick Hits  |  1/2/2008  | 
Researcher says Sears and Kmart don't give enough information about app that tracks browsing activity
<<   <   Page 3 / 3


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-36260
PUBLISHED: 2021-09-22
A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.
CVE-2021-39404
PUBLISHED: 2021-09-22
MaianAffiliate v1.0 allows an authenticated administrative user to save an XSS to the database.
CVE-2021-3583
PUBLISHED: 2021-09-22
A flaw was found in Ansible, where a user's controller is vulnerable to template injection. This issue can occur through facts used in the template if the user is trying to put templates in multi-line YAML strings and the facts being handled do not routinely include special template characters. This...
CVE-2021-39339
PUBLISHED: 2021-09-22
The Telefication WordPress plugin is vulnerable to Open Proxy and Server-Side Request Forgery via the ~/bypass.php file due to a user-supplied URL request value that gets called by a curl requests. This affects versions up to, and including, 1.8.0.
CVE-2021-38153
PUBLISHED: 2021-09-22
Some components in Apache Kafka use `Arrays.equals` to validate a password or key, which is vulnerable to timing attacks that make brute force attacks for such credentials more likely to be successful. Users should upgrade to 2.8.1 or higher, or 3.0.0 or higher where this vulnerability has been fixe...