Technology Made Simple
Thursday August 17th 2017

Insider

Archives

Posts Tagged ‘Vulnerabilities’

Browser Update: Google release new Chrome Update

Browser Update: Google release new Chrome Update

Google has released Chrome 5.0.375.125 for Linux, Mac, and Windows to address multiple vulnerabilities. These vulnerabilities may allow an attacker to execute arbitrary code or obtain sensitive information. Please see the Chromium security page for more detail. Note that the referenced bugs may be kept private until a majority of the users are up [...]

Software Update: Firefox 3.6.7 and Firefox 3.5.11

Software Update: Firefox 3.6.7 and Firefox 3.5.11

The Mozilla Foundation has released Firefox 3.6.7 and Firefox 3.5.11 for Windows, Mac and Linux to address multiple vulnerabilities. These vulnerabilities may allow an attacker to execute arbitrary code, obtain sensitive information, bypass security restrictions, or conduct cross-site scripting attacks. Some of these vulnerabilities also affect [...]

Security Alert: Shortcut file Vulnerability

Security Alert:  Shortcut file Vulnerability

This vulnerability is due to the failure of Microsoft Windows to properly obtain icons for LNK files. Microsoft uses LNK files, commonly referred to as "shortcuts," as references to files or applications. By convincing a user to display a specially-crafted LNK file, an attacker may be able to execute arbitrary code that would give the attacker [...]

Apple Launches iTunes 9.2

Apple Launches iTunes 9.2

     I’ve been waiting since last week for iTunes to be updated to support the new iPhone, but along with making the software ready for the iPhone, there are some security issues that this new version of iTunes fixes. Apple has released iTunes 9.2 for Windows systems to address multiple vulnerabilities affecting the [...]

Cisco Security Advisory: Multiple Vulnerabilities in Cisco Network Building Mediator

Cisco Security Advisory: Multiple Vulnerabilities in Cisco Network Building Mediator

Multiple vulnerabilities exist in the Cisco Network Building Mediator (NBM) products. These vulnerabilities also affect the legacy Richards-Zeta Mediator products. This security advisory outlines details of the following vulnerabilities: Default credentials Privilege escalation Unauthorized information interception Unauthorized [...]