End-of-Shift report
Timeframe: Montag 23-09-2013 18:00 − Dienstag 24-09-2013 18:00
Handler: L. Aaron Kaplan
Co-Handler: L. Aaron Kaplan
ICS Vendor Fixes Hard-Coded Credential Bugs Nearly Two Years After Advisory
Nearly two years after a security researcher published details of the hard-coded credentials that ship with a slew of industrial control system products made by Schneider Electric, the company has released updated firmware that fix the problems. The vulnerabilities, which were discovered by researcher Ruben Santamarta and published in December 2011, affect dozens of products
http://threatpost.com/ics-vendor-fixes-hard-coded-credential-bugs-nearly-two-years-after-advisory/102391
Security Bulletin: Multiple vulnerabilities exist in IBM Data Studio Web Console, Optim Performance Manager, IBM InfoSphere Optim Configuration Manager, and DB2 Recovery Expert for Linux, UNIX and Windows (CVE-2013-4025, CVE-2013-4024, CVE-2013-4022)
Multiple vulnerabilities exist in IBM Data Studio Web Console, Optim Performance Manager, IBM InfoSphere Optim Configuration Manager, and DB2 Recovery Expert for Linux, UNIX and Windows which could allow an attacker to view sensitive information or perform actions as a compromised user. CVE(s): CVE-2013-4025, CVE-2013-4024, CVE-2013-4022 Affected product(s) and affected version(s): IBM Data Studio Web Console versions v3.1.x Optim Performance Manager for DB2 on LUW v5.1.x IBM InfoSphere
https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_multiple_vulnerabilities_exist_in_ibm_data_studio_web_console_optim_performance_manager_ibm_infosphere_optim_configuration_manager_and_db2_recovery_expert_for_linux_unix_and_wind
Vuln: Moodle CVE-2013-4313 SQL Injection Vulnerability
Moodle CVE-2013-4313 SQL Injection Vulnerability
http://www.securityfocus.com/bid/62410
Citrix XenClient XT Multiple Vulnerabilities
Citrix XenClient XT Multiple Vulnerabilities
https://secunia.com/advisories/54625
Cybercriminals experiment with Android compatible, Python-based SQL injecting releases
Throughout the years, cybercriminals have been perfecting the process of automatically abusing Web application vulnerabilities to achieve their fraudulent and malicious objectives. From the utilization of botnets and search engines to perform active reconnaissance, the general availability of DIY mass SQL injecting tools as well as proprietary malicious script injecting exploitation platforms, the results have been evident ever since in the form of tens of thousands of affected Web sites on a
http://feedproxy.google.com/~r/WebrootThreatBlog/~3/uFxqe3lj6ak/
Joomla JVideoClip Blind SQL Injection
Topic: Joomla JVideoClip Blind SQL Injection Risk: Medium Text: == Joomla Component com_jvideoclip (cid|uid|id) Blind SQL Injection / SQL Injection ...
http://cxsecurity.com/issue/WLB-2013090161
WordPress fGallery_Plus Cross Site Scripting
Topic: WordPress fGallery_Plus Cross Site Scripting Risk: Low Text: # Iranian Exploit DataBase Forum #
http://iedb.ir/acc #
http://iedb...
http://cxsecurity.com/issue/WLB-2013090160
AspxCommerce 2.0 Shell Upload
Topic: AspxCommerce 2.0 Shell Upload Risk: High Text:# Exploit Title: AspxCommerce v2.0 - Arbitrary File Upload Vulnerability # Exploit Author: SANTHO (@s4n7h0) # Vendor Homepage...
http://cxsecurity.com/issue/WLB-2013090159
H1 2013 Threat Report
Our H1 2013 Threat Report is now online:Youll find it as well as our previous reports available for download: here. On 24/09/13 At 06:57 AM
http://www.f-secure.com/weblog/archives/00002611.html
Attacks Using Microsoft IE Exploit Tied to Hacking Crew Linked to Bit9 Breach
Security researchers at FireEye have observed a campaign targeting organizations in Japan that is leveraging the Internet Explorer zero-day Microsoft warned users about last week. The campaign has been dubbed Operation DeputyDog, and is believed to have begun as early as August 19. According to FireEye, the attackers behind the operation may be the same ones involved in last years attack on Bit9 a group researchers at Symantec recently identified as a hacking crew called Hidden Lynx
http://www.securityweek.com/attacks-using-microsoft-ie-exploit-tied-hacking-crew-linked-bit9-breach
D-Link DSL-2740B Router Cross-Site Request Forgery Vulnerability
D-Link DSL-2740B Router Cross-Site Request Forgery Vulnerability
https://secunia.com/advisories/54795
Blog: Exposing the security weaknesses we tend to overlook
http://www.securelist.com/en/blog/8132/Exposing_the_security_weaknesses_we_tend_to_overlook
Cyberwar gegen das Heidiland - Protokoll einer Attacke
Sie versuchen Beweise zu zerstören. Der IT-Forensiker ist seit Wochen auf der Fährte von Hackern, die eine der grössten Cyberattacken weltweit lanciert haben. Eine Offensive gegen militärische und zivile Ziele. Gegen einen Telekommunikationskonzern in Norwegen, gegen den Autohersteller Porsche, einen internationalen Flughafen in Indien und politische Gruppierungen in Pakistan.
http://www.sonntagszeitung.ch/wirtschaft/artikel-detailseite/?newsid=262774
"3": Schwere Sicherheitslücke ermöglichte Zugriff auf Kundendaten
Fehlerhafte Passwortröcksetzung erlaubte unter anderem Zugriff auf Kontaktdaten und Sprachnachrichten
http://derstandard.at/1379291849554
Inoffizielle iMessage-App für Android schürt Sicherheitsbedenken
App soll Kommunikation über Server in China leiten - User werden vor Nutzung gewarnt
http://derstandard.at/1379291880414
TRENDnet Multiple Products libupnp Buffer Overflow Vulnerabilities
TRENDnet Multiple Products libupnp Buffer Overflow Vulnerabilities
https://secunia.com/advisories/54762
[remote] - Raidsonic NAS Devices Unauthenticated Remote Command Execution
Raidsonic NAS Devices Unauthenticated Remote Command Execution
http://www.exploit-db.com/exploits/28508
[local] - IBM AIX 6.1 / 7.1 - Local root Privilege Escalation
IBM AIX 6.1 / 7.1 - Local root Privilege Escalation
http://www.exploit-db.com/exploits/28507
Tenable SecurityCenter "message" Cross-Site Scripting Vulnerability
Tenable SecurityCenter "message" Cross-Site Scripting Vulnerability
https://secunia.com/advisories/54997
IBM Rational ClearCase / ClearQuest GSKit Information Disclosure Weakness
IBM Rational ClearCase / ClearQuest GSKit Information Disclosure Weakness
https://secunia.com/advisories/54928
7 Characteristics of a Secure Mobile App
Keeping a mobile application secure is tough, but not impossible, and certain aspects of session management can go a long way in helping.
http://www.csoonline.com/article/740266/7-characteristics-of-a-secure-mobile-app?source=rss_application_security