Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in December 2008
200 Sony PS3s Harnessed To Crack Secure Site Certification
News  |  12/31/2008  | 
A research group finds a way to forge certain digital certificates and create fake versions of popular e-commerce and banking sites.
'Curse Of Silence' Exploit Found For Nokia Handsets
News  |  12/31/2008  | 
A single malformed SMS message can prevent some handsets from sending and receiving further SMS and MMS messages, security researchers warn.
Four Threats For '09 That You've Probably Never Heard Of (Or Thought About)
News  |  12/31/2008  | 
What could keep you up at night in the new year may not be what you expect -- a look at some of the lesser-known threats predicted for 2009
Top 10 Security Stories Of 2008
News  |  12/30/2008  | 
A spike in data breaches, the threat of malicious hardware, and alarming revelations about the Internet's vulnerabilities from security experts such as Dan Kaminsky all made headlines in 2008.
Verizon Wins $33 Million In Cybersquatting Case
News  |  12/30/2008  | 
The telecom said this is the largest-ever cybersquatting judgment, but it may have a hard time getting the money from OnlineNIC.
Microsoft: The Windows Media Player Flaw That Wasn't
Quick Hits  |  12/30/2008  | 
Microsoft refutes report of code execution vulnerability
Zero-Day SQL Server Flaw Could Allow Remote Code Execution
News  |  12/23/2008  | 
Exploits of unpatched vulnerability have already been published, Microsoft warns
Researchers Point Out XSS Flaws On American Express Site
News  |  12/22/2008  | 
Flaws could jeopardize users' identities, researchers say
Microsoft Releases Critical Internet Explorer Patch
News  |  12/17/2008  | 
The out-of-band security update fixes a JavaScript-related vulnerability that's being actively exploited through hacked Web sites.
The Five Coolest Hacks Of 2008
News  |  12/17/2008  | 
Not even your psyche was safe from hacking this year -- hackers found holes in the highway toll system, building security -- and, yes, your head
Microsoft Issuing Emergency Patch For Internet Explorer
News  |  12/16/2008  | 
Without the fix, hackers have the potential to access a computer's memory space, causing IE to exit unexpectedly, in a state that can be exploited.
Zero-Day Exploits On IE7 Could Spread To Other Microsoft Browsers
News  |  12/16/2008  | 
IE5, IE6, and the IE8 beta are also potentially vulnerable, software giant says
Google No Longer Among Top 20 Most Trusted Companies For Privacy
News  |  12/15/2008  | 
A consumer-opinion survey found that Apple, Facebook, Yahoo, and other companies outranked Google in trustworthiness and protection of personal information.
Cisco: Cybercriminals Hiding Behind Legitimate Websites, Email Accounts
News  |  12/15/2008  | 
New annual security threat report from Cisco highlights a 'rough year' for computing in 2008
AT&T, T-Mobile Fined For Voice-Mail Security
News  |  12/12/2008  | 
After a string of high-profile hacks, the Los Angeles district attorney has filed an injunction against the carriers for overstating the security of their voice-mail systems.
Study: One-Quarter Of Antivirus Apps Aren't Working
Quick Hits  |  12/12/2008  | 
Promisec study says many AV packages are disabled or weren't installed properly in the first place
Poor Computer Security Putting Immigrant Data At Risk
News  |  12/12/2008  | 
Vulnerabilities are common where money transfers, check cashing, bill payment, travel services, auto insurance, or notary services are provided, a research firm found.
Zero-Day Microsoft Vulnerabilities Being Exploited
News  |  12/11/2008  | 
Web sites have been found with malicious JavaScript code that attempts to exploit a vulnerability in Internet Explorer 7.
Zero-Day Bug Discovered In IE7
Quick Hits  |  12/11/2008  | 
Vulnerability in the wild could allow attackers to control and steal data from remote PCs
Firefox Leads List Of Most Vulnerable Apps
News  |  12/11/2008  | 
Bit9's list of the 12 riskiest apps to enterprises also includes Acrobat, iTunes, and Skype.
Americans Comfortable With Biometrics, Effective Or Not
News  |  12/9/2008  | 
Older and wealthier U.S.-based respondents indicated a preference for fingerprint scans as a method of verification, according to a survey of 12,000 people worldwide.
Microsoft Patch Day Brings Eight Security Bulletins
News  |  12/9/2008  | 
The bulletins address 28 vulnerabilities in Windows Search, Internet Explorer, Microsoft Office, and other Microsoft software.
U.S. Losing Cyberspace Security Battle
News  |  12/8/2008  | 
The incoming Obama administration has more than two dozen recommendations to about how to more effectively defend cyberspace, as part of a CSIS commission report.
Magazine Reporters Arrange To Buy 21 Million Identities
Quick Hits  |  12/8/2008  | 
In investigative article, journalists seek to prove how easy it is to buy large amounts of personal data
Report: IT, Security Departments Not Seeing Eye To Eye On Threats To The Business
News  |  12/7/2008  | 
While 92 percent of security professionals in new Ponemon-Lumension study say their organization suffered a cyberattack, only 55 percent of IT staffers said the same
Facebook Worm Comes From Infected Friends
News  |  12/5/2008  | 
The Koobface worm has surfaced in a new form and is again menacing Facebook users with spammed links to malicious Web sites.
Black Friday Kicks Off Red-Letter Week For Phishers
Quick Hits  |  12/3/2008  | 
Number of threats increased by 300 percent over 2007, report says
Microsoft, EMC's RSA Partner To Protect Data
News  |  12/3/2008  | 
The near-term arrangement will connect RSA's DLP Suite 6.5 with Microsoft Active Directory Rights Management Services in Windows Server 2008.
Popular Home DSL Routers At Risk Of CSRF Attack
News  |  12/3/2008  | 
Researcher demonstrates ease of hacking home routers with insidious cross-site request forgery (CSRF) attack
Study: Korea Is Most Popular Origin Of Intrusions
Quick Hits  |  12/1/2008  | 
U.S., China still top virus, spam charts


COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
9 Tips to Prepare for the Future of Cloud & Network Security
Kelly Sheridan, Staff Editor, Dark Reading,  9/28/2020
Attacker Dwell Time: Ransomware's Most Important Metric
Ricardo Villadiego, Founder and CEO of Lumu,  9/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-25288
PUBLISHED: 2020-09-30
An issue was discovered in MantisBT before 2.24.3. When editing an Issue in a Project where a Custom Field with a crafted Regular Expression property is used, improper escaping of the corresponding form input's pattern attribute allows HTML injection and, if CSP settings permit, execution of arbitra...
CVE-2020-25781
PUBLISHED: 2020-09-30
An issue was discovered in file_download.php in MantisBT before 2.24.3. Users without access to view private issue notes are able to download the (supposedly private) attachments linked to these notes by accessing the corresponding file download URL directly.
CVE-2020-25830
PUBLISHED: 2020-09-30
An issue was discovered in MantisBT before 2.24.3. Improper escaping of a custom field's name allows an attacker to inject HTML and, if CSP settings permit, achieve execution of arbitrary JavaScript when attempting to update said custom field via bug_actiongroup_page.php.
CVE-2020-26159
PUBLISHED: 2020-09-30
In Oniguruma 6.9.5_rev1, an attacker able to supply a regular expression for compilation may be able to overflow a buffer by one byte in concat_opt_exact_str in src/regcomp.c .
CVE-2020-6654
PUBLISHED: 2020-09-30
A DLL Hijacking vulnerability in Eaton's 9000x Programming and Configuration Software v 2.0.38 and prior allows an attacker to execute arbitrary code by replacing the required DLLs with malicious DLLs when the software try to load vci11un6.DLL and cinpl.DLL.