Aggregator
CVE-2008-3798 | Cisco IOS 12.4/12.4mr denial of service (Nessus ID 49026 / ID 43143)
CVE-2008-3803 | Cisco IOS 12.0s/12.0sx/12.0sz input validation (Nessus ID 49028 / ID 43150)
CVE-2008-3804 | Cisco IOS 12.2/12.4 memory corruption (Nessus ID 49022 / ID 43296)
CVE-2008-3812 | Cisco IOS up to 12.4xw HTTP Deep Packet Inspection input validation (Nessus ID 49018 / ID 43144)
CVE-2007-0605 | Advanced Guestbook 2.4.2 picture.php picture cross site scripting (EDB-29965 / XFDB-34156)
NIST proposes new metric to gauge exploited vulnerabilities
NIST has introduced a new way to estimate which software vulnerabilities have likely been exploited, and it’s calling on the cybersecurity community to help improve and validate the method. The new metric, “Likely Exploited Vulnerabilities” (LEV), aims to close a key gap in vulnerability management: identifying which of the thousands of reported flaws each year are actually being used in real-world attacks. Organizations typically rely on two main tools for this: the Exploit Prediction Scoring … More →
The post NIST proposes new metric to gauge exploited vulnerabilities appeared first on Help Net Security.
Как монетизировать лишнюю энергию? В Пакистане запускают биткойн-стартап национального масштаба
CVE-2007-0609 | Advanced Guestbook index.php cookie information disclosure (EDB-30015 / Nessus ID 25170)
CVE-2008-3819 | Cisco Gss 4492r Global Site Selector up to 3.0 denial of service (Nessus ID 68961 / ID 43160)
CVE-2008-3825 | Red Hat Enterprise Linux up to 5 access control (Nessus ID 67753 / ID 117231)
CVE-2011-0995 | Rubyforge rubygem-sqlite3 1.2.0/1.2.1/1.2.2/1.2.3 access control (Bug 685928 / ID 165190)
CVE-2010-4661 | udisks up to 1.0.2 Kernel Module Loader unrestricted upload (Nessus ID 76038 / ID 165190)
CVE-2008-3838 | Sun OpenSolaris up to Snv 84 Remote Procedure Call input validation (Nessus ID 34067 / ID 115923)
CVE-2008-3858 | IBM DB2 Universal Database up to 9.0 access control (ID 19515 / XFDB-45138)
CVE-2008-3839 | Sun OpenSolaris up to Snv 87 NFS Server denial of service (Nessus ID 34066 / ID 115929)
CVE-2008-3862 | Trend Micro OfficeScan 7.3/8.0 CGI Program memory corruption (Nessus ID 34490 / ID 116001)
CVE-2008-3862 | Trend Micro OfficeScan CGI Parser memory corruption (Nessus ID 34490 / ID 116001)
CVE-2008-3870 | Sun Solaris 8.0/9.0 numeric error (Nessus ID 13405 / ID 116436)
Cyber threats are changing and here’s what you should watch for
In this Help Net Security video, Stefan Tanase, Cyber Intelligence Expert at CSIS, gives an overview of how cybercriminals are changing their tactics, including using legitimate tools to avoid detection and developing more advanced info-stealing malware. Tanase also talks about new social engineering tricks like fake CAPTCHAs, changes in ransomware patterns, and the rise of mobile phishing attacks.
The post Cyber threats are changing and here’s what you should watch for appeared first on Help Net Security.