Ninety percent of organizations feel vulnerable to insider attacks. The main enabling risk factors include too many users with excessive access privileges (37%), an increasing number of devices with access to sensitive data (36%), and the increasing complexity of information technology (35%). The resulting Insider Threat Report is the most comprehensive research on the topic …
Google has released a security update warning customers that some of the files provided by third-party vendors through its advertising platform can introduce cross-site scripting (XSS) vulnerabilities. Some of these vendors include: a) adform/IFrameManager.html b) admotion/afa-iframe.htm c) bonzai/bonzaiBuster.html d) exponential/buster.html e) eyeblaster/addineyeV2.html f) eyewonder/interim.html g) flashtalking/ftlocal.html h) ipinyou/py_buster.html i) jivox/jivoxibuster.html j) mediaplex/mojofb_v9.html k) mixpo/framebust.html l) …
Mozilla has released a security updates to address multiple vulnerabilities in Thunderbird 52.5.2: a) CVE-2017-7845: Buffer overflow when drawing and validating elements with ANGLE library using Direct 3D 9 b) CVE-2017-7846: JavaScript Execution via RSS in mailbox:// origin c) CVE-2017-7847: Local path string can be leaked from RSS feed d) CVE-2017-7848: RSS Feed vulnerable to …
Apple has reported that a vulnerability exists in iCloud For Windows 7.2 where an attacker in a privileged network position can track a user. This is due to a privacy issue which existed in the use of client certificates. Further information on this vulnerability and how it can be fixed can be found on the …
CERT Coordination Center (CERT/CC) has released information on a Transport Layer Security (TLS) vulnerability. Exploitation of this vulnerability could allow an attacker to access sensitive information. The TLS vulnerability is also known as Return of Bleichenbacher’s Oracle Threat (ROBOT). ROBOT allows an attacker to obtain the RSA key necessary to decrypt TLS traffic under certain …
Microsoft has reported that A remote code execution vulnerability exists when the Microsoft Malware Protection Engine does not properly scan a specially crafted file, leading to memory corruption. An attacker who successfully exploited this vulnerability could execute arbitrary code in the security context of the LocalSystem account and take control of the system. An attacker …
Google has reported several vulnerabilities with regards to Google Chrome which includes: a) Out of bounds write in QUIC – (CVE-2017-15407) b) Heap buffer overflow in PDFium – (CVE-2017-15408) c) Out of bounds write in Skia – (CVE-2017-15409) d) Use after free in PDFium – (CVE-2017-15410, CVE-2017-15411) e) Use after free in libXML – (CVE-2017-15412) …
Multiple vulnerabilities have been identified in Mozilla Thunderbird, the most severe of which could allow for arbitrary code execution. Details of the vulnerabilities are as follows: a) A use-after-free vulnerability can occur when flushing and resizing layout because the PressShell object has been freed while still in use. This results in a potentially exploitable crash …
The Apache Software Foundation has release security updates to address multiple vulnerabilities in Apache Struts version 2: a) A denial of service vulnerability exists due to an outdated JSON-lib library utilized by a REST plugin – (CVE-2017-15707). b) A remote code execution vulnerability exists because the REST Plugin utilizes Jackson JSON library for data binding …
Cisco has released a security update stating that multiple vulnerabilities exist in Cisco WebEx Network Recording Player for Advanced Recording Format (ARF) and WebEx Recording Format (WRF) files. A remote attacker could exploit these vulnerabilities by providing a user with a malicious ARF or WRF file via email or URL and convincing the user to …