Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

Content tagged with Vulnerabilities / Threats posted in December 2008
200 Sony PS3s Harnessed To Crack Secure Site Certification
News  |  12/31/2008  | 
A research group finds a way to forge certain digital certificates and create fake versions of popular e-commerce and banking sites.
'Curse Of Silence' Exploit Found For Nokia Handsets
News  |  12/31/2008  | 
A single malformed SMS message can prevent some handsets from sending and receiving further SMS and MMS messages, security researchers warn.
Four Threats For '09 That You've Probably Never Heard Of (Or Thought About)
News  |  12/31/2008  | 
What could keep you up at night in the new year may not be what you expect -- a look at some of the lesser-known threats predicted for 2009
Top 10 Security Stories Of 2008
News  |  12/30/2008  | 
A spike in data breaches, the threat of malicious hardware, and alarming revelations about the Internet's vulnerabilities from security experts such as Dan Kaminsky all made headlines in 2008.
Verizon Wins $33 Million In Cybersquatting Case
News  |  12/30/2008  | 
The telecom said this is the largest-ever cybersquatting judgment, but it may have a hard time getting the money from OnlineNIC.
Microsoft: The Windows Media Player Flaw That Wasn't
Quick Hits  |  12/30/2008  | 
Microsoft refutes report of code execution vulnerability
Zero-Day SQL Server Flaw Could Allow Remote Code Execution
News  |  12/23/2008  | 
Exploits of unpatched vulnerability have already been published, Microsoft warns
Researchers Point Out XSS Flaws On American Express Site
News  |  12/22/2008  | 
Flaws could jeopardize users' identities, researchers say
Microsoft Releases Critical Internet Explorer Patch
News  |  12/17/2008  | 
The out-of-band security update fixes a JavaScript-related vulnerability that's being actively exploited through hacked Web sites.
The Five Coolest Hacks Of 2008
News  |  12/17/2008  | 
Not even your psyche was safe from hacking this year -- hackers found holes in the highway toll system, building security -- and, yes, your head
Microsoft Issuing Emergency Patch For Internet Explorer
News  |  12/16/2008  | 
Without the fix, hackers have the potential to access a computer's memory space, causing IE to exit unexpectedly, in a state that can be exploited.
Zero-Day Exploits On IE7 Could Spread To Other Microsoft Browsers
News  |  12/16/2008  | 
IE5, IE6, and the IE8 beta are also potentially vulnerable, software giant says
Google No Longer Among Top 20 Most Trusted Companies For Privacy
News  |  12/15/2008  | 
A consumer-opinion survey found that Apple, Facebook, Yahoo, and other companies outranked Google in trustworthiness and protection of personal information.
Cisco: Cybercriminals Hiding Behind Legitimate Websites, Email Accounts
News  |  12/15/2008  | 
New annual security threat report from Cisco highlights a 'rough year' for computing in 2008
AT&T, T-Mobile Fined For Voice-Mail Security
News  |  12/12/2008  | 
After a string of high-profile hacks, the Los Angeles district attorney has filed an injunction against the carriers for overstating the security of their voice-mail systems.
Study: One-Quarter Of Antivirus Apps Aren't Working
Quick Hits  |  12/12/2008  | 
Promisec study says many AV packages are disabled or weren't installed properly in the first place
Poor Computer Security Putting Immigrant Data At Risk
News  |  12/12/2008  | 
Vulnerabilities are common where money transfers, check cashing, bill payment, travel services, auto insurance, or notary services are provided, a research firm found.
Zero-Day Microsoft Vulnerabilities Being Exploited
News  |  12/11/2008  | 
Web sites have been found with malicious JavaScript code that attempts to exploit a vulnerability in Internet Explorer 7.
Zero-Day Bug Discovered In IE7
Quick Hits  |  12/11/2008  | 
Vulnerability in the wild could allow attackers to control and steal data from remote PCs
Firefox Leads List Of Most Vulnerable Apps
News  |  12/11/2008  | 
Bit9's list of the 12 riskiest apps to enterprises also includes Acrobat, iTunes, and Skype.
Americans Comfortable With Biometrics, Effective Or Not
News  |  12/9/2008  | 
Older and wealthier U.S.-based respondents indicated a preference for fingerprint scans as a method of verification, according to a survey of 12,000 people worldwide.
Microsoft Patch Day Brings Eight Security Bulletins
News  |  12/9/2008  | 
The bulletins address 28 vulnerabilities in Windows Search, Internet Explorer, Microsoft Office, and other Microsoft software.
U.S. Losing Cyberspace Security Battle
News  |  12/8/2008  | 
The incoming Obama administration has more than two dozen recommendations to about how to more effectively defend cyberspace, as part of a CSIS commission report.
Magazine Reporters Arrange To Buy 21 Million Identities
Quick Hits  |  12/8/2008  | 
In investigative article, journalists seek to prove how easy it is to buy large amounts of personal data
Report: IT, Security Departments Not Seeing Eye To Eye On Threats To The Business
News  |  12/7/2008  | 
While 92 percent of security professionals in new Ponemon-Lumension study say their organization suffered a cyberattack, only 55 percent of IT staffers said the same
Facebook Worm Comes From Infected Friends
News  |  12/5/2008  | 
The Koobface worm has surfaced in a new form and is again menacing Facebook users with spammed links to malicious Web sites.
Black Friday Kicks Off Red-Letter Week For Phishers
Quick Hits  |  12/3/2008  | 
Number of threats increased by 300 percent over 2007, report says
Microsoft, EMC's RSA Partner To Protect Data
News  |  12/3/2008  | 
The near-term arrangement will connect RSA's DLP Suite 6.5 with Microsoft Active Directory Rights Management Services in Windows Server 2008.
Popular Home DSL Routers At Risk Of CSRF Attack
News  |  12/3/2008  | 
Researcher demonstrates ease of hacking home routers with insidious cross-site request forgery (CSRF) attack
Study: Korea Is Most Popular Origin Of Intrusions
Quick Hits  |  12/1/2008  | 
U.S., China still top virus, spam charts


COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Why Cybersecurity's Silence Matters to Black Lives
Tiffany Ricks, CEO, HacWare,  7/8/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11081
PUBLISHED: 2020-07-10
osquery before version 4.4.0 enables a priviledge escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables l...
CVE-2020-6114
PUBLISHED: 2020-07-10
An exploitable SQL injection vulnerability exists in the Admin Reports functionality of Glacies IceHRM v26.6.0.OS (Commit bb274de1751ffb9d09482fd2538f9950a94c510a) . A specially crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerabi...
CVE-2020-15504
PUBLISHED: 2020-07-10
A SQL injection vulnerability in the user and admin web interfaces of Sophos XG Firewall v18.0 MR1 and older potentially allows an attacker to run arbitrary code remotely. The fix is built into the re-release of XG Firewall v18 MR-1 (named MR-1-Build396) and the v17.5 MR13 release. All other version...
CVE-2020-8190
PUBLISHED: 2020-07-10
Incorrect file permissions in Citrix ADC and Citrix Gateway before versions 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 allows privilege escalation.
CVE-2020-8191
PUBLISHED: 2020-07-10
Improper input validation in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allows reflected Cross Site Scripting (XSS).