Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

9/19/2013
04:39 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Tripwire Announces Expanded IPv6 Support In IP360

Version 7.2 featuring support for IPv6 vulnerability scanning, expanded integration services, and additional SCAP functionality

PORTLAND, OREGON -- September 19, 2013 -- Tripwire, Inc., a leading global provider of risk-based security and compliance management solutions, today announced the availability of Tripwire® IP360&trade version 7.2 featuring support for IPv6 vulnerability scanning, expanded integration services and additional SCAP functionality.

"IP360 has already proven itself to be a strong product in our portfolio, and it's a crucial component of our expanding business," noted Rod Murchison, vice president of product management and technology alliances at Tripwire. "Tripwire is committed to investing the resources necessary to continue providing our vulnerability management customers with world-class performance, manageability and scalability."

As IPv6 proliferates throughout networks worldwide, it is increasingly important to identify assets utilizing IPv6 in order to discover their unique vulnerabilities and configurations in order to identify and mitigate IPv6. Tripwire IP360 now supports the discovery of IPv6 capable devices as well as their vulnerabilities and configurations, allowing customers to build vulnerability management into their IPv6 deployments at the start. Key features of the new version include:

· Expanded IPv6 functionality including discovery of IPv6 devices within a specific IP range.

· Improvements to IP360s comprehensive SCAP configuration scanning support including CCEs, CPEs and CVEs in CyberScope reporting.

· Human-readable version of HTML SCAP report.

"While SCAP capabilities are required in the federal government, a narrow approach provides only limited benefits," said Murchison. "Tripwire's cross-product approach to the SCAP standard has already allowed us to deliver additional capabilities at a faster pace to more customers across the product line. We fully expect SCAP to be an integral standard for Tripwire moving forward."

For more information about IP360 please visit http://www.tripwire.com/it-security-software/enterprise-vulnerability-management/tripwire-ip360/.

About Tripwire

Tripwire is a leading global provider of risk-based security and compliance management solutions, enabling enterprises, government agencies and service providers to effectively connect security to their business. Tripwire provides the broadest set of foundational security controls including security configuration management, vulnerability management, file integrity monitoring, log and event management. Tripwire solutions deliver unprecedented visibility, business context and security business intelligence allowing extended enterprises to protect sensitive data from breaches, vulnerabilities, and threats. Learn more at www.tripwire.com or follow us @TripwireInc on Twitter.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27218
PUBLISHED: 2020-11-28
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
CVE-2020-29367
PUBLISHED: 2020-11-27
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
CVE-2020-26245
PUBLISHED: 2020-11-27
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
CVE-2017-15682
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
CVE-2017-15683
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.