The goal of this project is to make virtual world a safer and better place without child pornography, major computer crime and RIAA.
Login As
You can log in if you are registered at one of these services:
Security Bulletins
Latest Malware Updates

Infostealer.Posteal

02/26/2015

Downloader.Busadom

02/26/2015

Trojan.Ladocosm

02/26/2015

SONAR.SuspDocRun

02/25/2015

SONAR.SuspHelpRun

02/25/2015

Zero-day vulnerability in Microsoft Internet Explorer

Zero-day vulnerability in Microsoft Internet Explorer

Last Wednesday websites of Department of Labor and Department of Energy suffered a couple of cyberattacks. There was a code posted on the websites, which exploited vulnerability in Microsoft Internet Explorer. Initially security experts at Invincea assumed that attackers exploited existing bug in IE. But a more detailed investigation showed that cybercriminals used vulnerability identified as CVE-2013-1347.

On Friday, Microsoft issued a security advisory stating that the company was “investigating” reports and was aware of attacks that attempt to exploit a vulnerability, confirming it as a remote code execution vulnerability. is a zero-day vulnerability in the most popular version of the web-browser – Internet Explorer 8.

This is a remote code execution vulnerability. The vulnerability exists in the way that Internet Explorer accesses an object in memory that has been deleted or has not been properly allocated. The vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer. An attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the website, stated Microsoft.

The bug exists due to the use after free error: via a specially created page the remote user can execute arbitrary code on the targeted system with the privileges of the current user.

According to Neowin, IE8 is the most popular browser in the world, occupying 23.08% of the browser market.

More detailed description of the vulnerabilty may be foundhere.

NakedSecurity recommends avoid using a vulnerable version of Internet Explorer until the patch is released.

(c) Naked Security


Security Advisories Database

Remote Code Execution Vulnerability in Microsoft OpenType Font Driver

A remote attacker can execute arbitrary code on the target system.

07/21/2015

SQL Injection Vulnerability in Piwigo

SQL inection vulnerability has been discovered in Piwigo.

02/05/2015

Cross-site Scripting Vulnerability in DotNetNuke

A cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke.

02/05/2015

Cross-site Scripting Vulnerability in Hitachi Command Suite

A cross-site scripting vulnerability was found in Hitachi Command Suite.

02/02/2015

Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk Handling

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-Forwards

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in MalwareBytes Anti-Exploit "mbae.sys"

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Linux Kernel splice

An attacker can perform a denial of service attack.

01/29/2015

Denial of service vulnerability in Python Pillow Module PNG Text Chunks Decompression

An attacker can perform a denial of service attack.

01/20/2015