Monthly Archives: May 2015
Security Vendors up Ante for Channel – Channelnomics
Old-school Anti-virus Vendors Learn New Tricks – Network World
CVE-2015-2250
Multiple cross-site scripting (XSS) vulnerabilities in concrete5 before 5.7.4 allow remote attackers to inject arbitrary web script or HTML via the (1) banned_word[] parameter to index.php/dashboard/system/conversations/bannedwords/success, (2) channel parameter to index.php/dashboard/reports/logs/view, (3) accessType parameter to index.php/tools/required/permissions/access_entity, (4) msCountry parameter to index.php/dashboard/system/multilingual/setup/load_icon, arHandle parameter to (5) design/submit or (6) design in index.php/ccm/system/dialogs/area/design/submit, (7) pageURL to index.php/dashboard/pages/single, (8) SEARCH_INDEX_AREA_METHOD parameter to index.php/dashboard/system/seo/searchindex/updated, (9) unit parameter to index.php/dashboard/system/optimization/jobs/job_scheduled, (10) register_notification_email parameter to index.php/dashboard/system/registration/open/1, or (11) PATH_INFO to index.php/dashboard/extend/connect/.
CVE-2015-3325
SQL injection vulnerability in forum.php in the WP Symposium plugin before 15.4 for WordPress allows remote attackers to execute arbitrary SQL commands via the show parameter in the QUERY_STRING to the default URI.
CVE-2015-3989
Multiple cross-site scripting (XSS) vulnerabilities in concrete5 before 5.7.4 allow remote attackers to inject arbitrary web script or HTML via vectors related to private messages or other unspecified vectors.
Several Factors Mitigate VENOM’s Utility for Attackers
Proof of concept code exploiting the VENOM vulnerability has surfaced. Its author says mitigating factors make VENOM difficult to exploit at scale.
Apple seeks to block sale of RadioShack customer data
Apple has filed a court objection against the sale of RadioShack customer data for those who had purchased its products, reports Ars Technica.
The post Apple seeks to block sale of RadioShack customer data appeared first on We Live Security.
![]()
How did the Internet change the everyday work of a security researcher?
Aryeh Goretsky and David Harley talk to Sabrina Pagnotta about the internet’s impact on security research.
The post How did the Internet change the everyday work of a security researcher? appeared first on We Live Security.
![]()
Google turns down 60 percent of ‘right to be forgotten’ requests
A year after Google introduced its controversial ‘right to be forgotten’ feature, the search giant has published some statistics about its implementation.
The post Google turns down 60 percent of ‘right to be forgotten’ requests appeared first on We Live Security.
![]()