The Internet Traffic Report monitors the flow of data around the world. It then displays a value between zero and 100. Higher values indicate faster and more reliable connections. Internet Storm Center Infocon Status Internet Security Systems - AlertCon(TM)
US-CERT Cyber Security Bulletins

SB10-256: Vulnerability Summary for the Week of September 6, 2010

SB10-249: Vulnerability Summary for the Week of August 30, 2010

SB10-242: Vulnerability Summary for the Week of August 23, 2010

SB10-235: Vulnerability Summary for the Week of August 16, 2010

SB10-228: Vulnerability Summary for the Week of August 9, 2010

SB10-221: Vulnerability Summary for the Week of August 2, 2010

SB10-214: Vulnerability Summary for the Week of July 26, 2010

SB10-207: Vulnerability Summary for the Week of July 19, 2010

SB10-200: Vulnerability Summary for the Week of July 12, 2010

SB10-193: Vulnerability Summary for the Week of July 5, 2010


SecurityFocus News

News: Change in Focus

News: Twitter attacker had proper credentials

News: PhotoDNA scans images for child abuse

News: Conficker data highlights infected networks

Brief: Google offers bounty on browser bugs

Brief: Cyberattacks from U.S. "greatest concern"

Brief: Microsoft patches as fraudsters target IE flaw

Brief: Attack on IE 0-day refined by researchers

News: Monster botnet held 800,000 people's details

News: Google: 'no timetable' on China talks

News: Latvian hacker tweets hard on banking whistle

News: MS uses court order to take out Waledac botnet

Infocus: Enterprise Intrusion Analysis, Part One

Infocus: Responding to a Brute Force SSH Attack

Infocus: Data Recovery on Linux and ext3

Infocus: WiMax: Just Another Security Challenge?

Gunter Ollmann: Time to Squish SQL Injection

Mark Rasch: Lazy Workers May Be Deemed Hackers

Adam O'Donnell: The Scale of Security

Mark Rasch: Hacker-Tool Law Still Does Little

More rss feeds from SecurityFocus



SecurityFocus Vulnerabilities

Vuln: Ipswitch IMail Server List Mailer 'imailsrv.exe' Buffer Overflow Vulnerability

Vuln: Squid Proxy String Processing NULL Pointer Dereference Denial Of Service Vulnerability

Vuln: Todd Miller Sudo Runas Group Local Privilege Escalation Vulnerability

Vuln: WebKit Regular Expression Handling Remote Memory Corruption Vulnerability

Bugtraq: Secunia Research: Microsoft Outlook Content Parsing Integer Underflow Vulnerability

Bugtraq: ZDI-10-177: IBM Lotus Domino iCalendar MAILTO Stack Overflow Vulnerability

Bugtraq: [ MDVSA-2010:182 ] kdegraphics

Bugtraq: [FLOCK-SA-2010-04] Flock Browser: window.open() Method Javascript Same-Origin Policy Violation (XSS)

More rss feeds from SecurityFocus


Help Net Security - Advisories

Slackware Security Advisory - sudo redo (SSA:2010-258-03)

Slackware Security Advisory - samba (SSA:2010-257-01)

Slackware Security Advisory - sudo (SSA:2010-257-02)

US-CERT Technical Cyber Security Alert - Microsoft Updates for Multiple Vulnerabilities (TA10-257A)

Ubuntu Security Notice - Samba vulnerability (USN-987-1)

Mandriva Linux Security Update Advisory - kdegraphics (MDVSA-2010:182)

Mandriva Linux Security Update Advisory - xdg-utils (MDVA-2010:191)

Mandriva Linux Security Update Advisory - ntop (MDVSA-2010:181)

Mandriva Linux Security Update Advisory - gthumb (MDVA-2010:190)

Debian Security Advisory - New quagga packages fix denial of service (DSA-2104-1)


SANS Internet Storm Center, InfoCON: green

Infocon: green

September 2010 Microsoft Black Tuesday Summary, (Tue, Sep 14th)

BlackEnergy DDoS, (Tue, Sep 14th)

Adobe Flash v10.1.82.76 and earlier vulnerability in-the-wild, (Tue, Sep 14th)

Enhanced Mitigation Experience Toolkit can block CVE-2010-2883 exploit, (Mon, Sep 13th)

Adobe SING table parsing exploit (CVE-2010-2883) in the wild , (Mon, Sep 13th)

Adobe Acrobat pushstring Memory Corruption paper, (Sun, Sep 12th)

'Here You Have' Email , (Thu, Sep 9th)

Opera 10.62 - security (the DLL path issue) and stability upate see http://www.opera.com/docs/changelogs/windows/1062/, (Thu, Sep 9th)


Help Net Security - Vulnerabilities

Zenphoto Multiple Cross-Site Scripting and SQL Injection Vulnerabilities

TYPO3 Yet Another Calendar Extension Cross-Site Scripting and SQL Injection Issue

DMXReady Polling Booth Manager "inc_pollingboothmanager.asp" SQL Injection

phpMyAdmin Debug Backtrace Cross-Site Scripting

Weborf HTTP "modURL()" Function Directory Traversal Issue

Google Chrome Multiple Security Vulnerabilities

Zope Unspecified Denial of Service Issue

Linux Kernel "irda_bind()" Null Pointer Dereference

Microsoft Internet Explorer CSS Handling Cross-Domain Information Disclosure

TYPO3 XING Button Extension Unspecified Cross-Site Scripting


CA Security Advisor Threat Alerts

Microsoft Windows DNS Server RPC interface remote code execution vulnerability

Microsoft Windows MsgBox remote code execution vulnerability

Microsoft Windows Animated Cursor remote code execution vulnerability

Microsoft UPnP HTTP Request arbitrary code execution vulnerability

Microsoft Agent URL Parsing remote code execution vulnerability


Packet Storm Security Exploits

ibmicalendar-overflow.txt

exoopport-sql.txt

moaub-iprint.txt

moaub-fdf.txt

joomlajgen-sql.txt

MVSA-10-009.txt

MVSA-10-008.txt

adobelifecycle-dllhijack.txt

joomlamosets-shell.txt

moaub-realplayer.txt


Packet Storm Security Headlines

Update Kills Code-Execution Threat In Samba

Stuxnet Attackers Used 4 Windows Zero-Day Exploits

Anti-Censorship Program Haystack Withdrawn

A Botnet For Hire Springs Up

Forget Puppies, Adopt A Hacker

Adobe Warns Of Zero-Day Hole In Flash Player

More Nasties Found On Google Code Repository

Gucci And Chanel Targeted In Brand Hijacking Scams

Appeals Court Guts Landmark Computer-Privacy Ruling

Windows Malware Dwarfs Other Viral Threats

Burglars Used Social Network Status Updates To Select Victims

Microsoft Helps Adobe Block PDF Zero-Day Exploit


Packet Storm Security Advisories

TA10-257A.txt

secunia-msoutlook.txt

ZDI-10-177.txt

MDVSA-2010-182.txt

FLOCK-SA-2010-04.txt

FLOCK-SA-2010-03.txt

FLOCK-SA-2010-02.txt

FLOCK-SA-2010-01.txt

firefox-crossdomain.pdf

HPSBMA02566-SSRT100045.txt


Packet Storm Security Tools

nmbscan-1.2.6.tar.gz

hexinject-1.1.tar.gz

cvechecker-0.6.tar.gz

DnsSpoofer.zip

netrecon-1.78.tgz

iexploder-1.7.tgz

openca-tools-1.3.0.tar.gz

malware_check_tool-1.2.zip

hyenae-0.35-2.tar.gz

joomlascan.tgz


WVE Recent Entries

WVE-2008-0013: TKIP Replay and Plaintext Discovery

WVE-2008-0012: Active Https Cookie Hijacking

WVE-2008-0011: Auto Immune Attack

WVE-2008-0010: Marvell Null SSID Association Request

WVE-2008-0009: Marvell EAPOL-Key Length Overflow

WVE-2008-0008: Atheros IE Tag Overflow

WVE-2008-0007: Weaknesses in the A5/1 Cipher

WVE-2008-0006: Block ACK DoS

WVE-2008-0005: GF Mode WIDS Rogue AP Evasion

WVE-2008-0004: HT Intolerant Degradation of Service


eEye Digital Security - Zero-Day Tracker

Excel Invalid Object

Adobe PDF Buffer Overflow

Creative Software AutoUpdate Engine ActiveX stack buffer overflow

Internet Connection Sharing DoS

RPC Memory Exhaustion

  
US-CERT Technical Alerts and Bulletins

TA10-257A: Microsoft Updates for Multiple Vulnerabilities

SB10-256: Vulnerability Summary for the Week of September 6, 2010

SB10-249: Vulnerability Summary for the Week of August 30, 2010

SB10-242: Vulnerability Summary for the Week of August 23, 2010

TA10-238A: Microsoft Windows Insecurely Loads Dynamic Libraries

SB10-235: Vulnerability Summary for the Week of August 16, 2010

TA10-231A: Adobe Reader and Acrobat Vulnerabilities

SB10-228: Vulnerability Summary for the Week of August 9, 2010

TA10-223A: Adobe Flash and AIR Vulnerabilities

TA10-222A: Microsoft Updates for Multiple Vulnerabilities


US-CERT Technical Cyber Security Alerts

TA10-257A: Microsoft Updates for Multiple Vulnerabilities

TA10-238A: Microsoft Windows Insecurely Loads Dynamic Libraries

TA10-231A: Adobe Reader and Acrobat Vulnerabilities

TA10-223A: Adobe Flash and AIR Vulnerabilities

TA10-222A: Microsoft Updates for Multiple Vulnerabilities

TA10-194B: Oracle Updates for Multiple Vulnerabilities

TA10-194A: Microsoft Updates for Multiple Vulnerabilities

TA10-162A: Adobe Flash and AIR Vulnerabilities

TA10-159B: Microsoft Updates for Multiple Vulnerabilities

TA10-159A: Adobe Flash, Reader, and Acrobat Vulnerability


SecuriTeam

Apple Webkit SVG First-Letter Style Code Execution Vulnerability

Imperva SecureSphere Web Application Firewall and Database Firewall Bypass Vulnerability

Novell Netware Groupwise Internet Gateway Code Execution Vulnerability

HP LaserJet Printers, HP Digital Senders Unauthorized File Access Vulnerability

Mozilla Firefox NodeIterator Code Execution Vulnerability

Netifera - Modular Open Source Platform for Security Tools

WarVOX - Tools for Exploring, Classifying, and Auditing Telephone Systems

Webshag - Web Server Audit Tool

Browser Fuzzer

FSpy - Linux Filesystem Activity Monitoring

Novell iPrint Client Browser Plugin operation Parameter Code Execution Vulnerability

Novell iPrint Server Queue Name Code Execution Vulnerability

Krb5 kadmind Denial Of Service vulnerability

HP Insight Control for Linux Multiple Vulnerabilities

Skype Client for Mac Chat Unicode Denial of Service vulnerability

Autonomy KeyView wkssr.dll Record Parsing Buffer Overflows

Autonomy KeyView rtfsr.dll RTF Parsing Signedness Error Vulnerability

Microsoft Internet Explorer Table Element Use-after-free Vulnerability

Microsoft Internet Explorer boundElements Property Use-after-free Vulnerability

Autonomy KeyView wkssr.dll Floating Point Conversion Buffer Overflow Vulnerability

Trango Broadband Wireless Rogue SU Authentication Bug

Exposing HMS HICP Protocol and Intellicom NetBiterConfig.exe Remote Buffer Overflow

Family Connections Multiple Remote Vulnerabilities

VideoCache vccleaner Root Vulnerability

QuickHeal Antivirus 2010 Local Privilege Escalation

Why Silent Updates Boost Security

PDF Silent HTTP Form Repurposing Attacks

Frame Pointer Overwrite Demonstration (Linux)

Format String Exploitation Demonstration (Linux)

Hacking SOHO Routers


Security Central - Infoworld

Another day, another Flash zero-day vulnerability

Criminals 'go cloud' with attacks-as-a-service

Mozilla suspends Firefox security updates

Are the Google attackers back?

Adobe sounds alarm on Flash zero-day attacks

Separate Active Directory forests don't translate into better security

ASP.Net Web apps face risk of widespread crypto attack

Microsoft releases SteadyState documents for Windows 7

Strong compliance biz behind HP's ArcSight buy

Anti-US hacker takes credit for 'Here you have' email worm

Newest Adobe zero-day PDF exploit bypasses two Microsoft defenses

Microsoft botnet 'decapitation' scores legal win against cyber crime

'Here you have' email worm spreads quickly

Microsoft plans to deliver double the dosage on Patch Tuesday next week

Dangerous Adobe Reader zero-day raises the bar

Epic failures: 11 infamous software bugs

Group sues Department of Homeland Security to stop laptop searches

Firefox among first browsers to fix DLL load hijacking bug

Microsoft investigating long-known vulnerability in IE

Imagine a world with no cyber secrets


Help Net Security - Linux Software

Aide 0.15.1

rssh 2.3.3

Stunnel 4.34 Beta 9

MIMEDefang 2.71

Samhain 2.7.2b

MailScanner 4.81.4-1

ntop 4.0.1

TuxFrw 3.01

Nagios 3.2.2

Shorewall 4.4.12.1


Microsoft Security Bulletins

MS10-069 - Important: Vulnerability in Windows Client/Server Runtime Subsystem Could Allow Elevation of Privilege (2121546)

MS10-068 - Important: Vulnerability in Local Security Authority Subsystem Service Could Allow Elevation of Privilege (983539)

MS10-067 - Important: Vulnerability in WordPad Text Converters Could Allow Remote Code Execution (2259922)

MS10-066 - Important: Vulnerability in Remote Procedure Call Could Allow Remote Code Execution (982802)

MS10-065 - Important: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Remote Code Execution (2267960)

MS10-064 - Critical: Vulnerability in Microsoft Outlook Could Allow Remote Code Execution (2315011)

MS10-063 - Critical: Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution (2320113)

MS10-062 - Critical: Vulnerability in MPEG-4 Codec Could Allow Remote Code Execution (975558)

MS10-061 - Critical: Vulnerability in Print Spooler Service Could Allow Remote Code Execution (2347290)

MS10-060 - Critical: Vulnerabilities in the Microsoft .NET Common Language Runtime and in Microsoft Silverlight Could Allow Remote Code Execution (2265906)

MS10-059 - Important: Vulnerabilities in the Tracing Feature for Services Could Allow Elevation of Privilege (982799)

MS10-058 - Important: Vulnerabilities in TCP/IP Could Allow Elevation of Privilege (978886)

MS10-057 - Important: Vulnerability in Microsoft Office Excel Could Allow Remote Code Execution (2269707)

MS10-056 - Critical: Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution (2269638)

MS10-055 - Critical: Vulnerability in Cinepak Codec Could Allow Remote Code Execution (982665)

MS10-054 - Critical: Vulnerabilities in SMB Server Could Allow Remote Code Execution (982214)

MS10-053 - Critical: Cumulative Security Update for Internet Explorer (2183461)

MS10-052 - Critical: Vulnerability in Microsoft MPEG Layer-3 Codecs Could Allow Remote Code Execution (2115168)

MS10-051 - Critical: Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution (2079403)

MS10-050 - Important: Vulnerability in Windows Movie Maker Could Allow Remote Code Execution (981997)

MS10-049 - Critical: Vulnerabilities in SChannel could allow Remote Code Execution (980436)

MS10-048 - Important: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2160329)

MS10-047 - Important: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (981852)

MS10-046 - Critical: Vulnerability in Windows Shell Could Allow Remote Code Execution (2286198)

MS10-045 - Important: Vulnerability in Microsoft Office Outlook Could Allow Remote Code Execution (978212)


SecurityDOT Articles

Using TAR with Bunzip2 files

Setting the SUID/SGID bits: Giving a program YOUR permissions when it runs

Setting up hamachi on linux

How to disable opera 9 torrents support

How Shellcodes Work

How To Automate Spamcop Submissions

How To Save Traffic With Apache2's mod_deflate

How to scan your Linux-Distro for Root Kits

How To Test Your Linux Firewall

Optimizing DSPAM + MySQL 4.1


SecurityDOT Exploits

XOOPS Module Cjay Content 3 Remote File Inclusion Vulnerability

XOOPS Module XT-Conteudo (spaw_root) RFI Vulnerability

XOOPS Module XFsection (modify.php) Remote File Inclusion Vulnerability

Microsoft Office MSODataSourceControl COM-object BoF PoC (0day)

Microsoft Speech API ActiveX control Remote BoF Exploit (xp sp2)

Microsoft Speech API ActiveX control Remote BoF Exploit (win2k sp4)

Safari 3 for Windows Beta Remote Command Execution PoC

Ace-FTP Client 1.24a Remote Buffer Overflow PoC

MoviePlay 4.76 .lst File Local Buffer Overflow Exploit

e-Vision CMS <= 2.02 SQL Injection/Remote Code Execution Exploit


Help Net Security - Windows Software

Oops!Backup

Rising PC Doctor 6.0.2.45

Comodo Internet Security 5.0.162051.1126 RC3

McAfee AVERT Stinger 10.0.1.1028

WinGuard Pro 7.3.6

East-Tec Eraser 2010 9.9.0.100

Password Manager XP 2.3.507

Password Depot Professional 5.2.2

File Encryption XP 1.5 Build 170

Crypt4Free 5.3.14


WindowSecurity.com

PsExec and the Nasty Things It Can Do

DirectAccess versus VPN: They are Not the Same

How To Protect Against Eves Droppers

Security Log Management Tips

GFI LANguard - Voted WindowSecurity.com Readers' Choice Award Winner - Patch Management

Product Review: ObserveIT Remote Access Auditor

Securing Remote Desktop Services in Windows Server 2008 R2

Analyzing Wireless Network Security at the Packet Level

  
VulnWatch

milw0rm.com

BigAnt Server <= 2.50 SP6 Local (ZIP File) Buffer Overflow PoC #2

Joomla com_mytube (user_id) Blind SQL Injection Exploit

Joomla com_jinc (newsid) Blind SQL Injection Vulnerability

Snort < 2.8.5 Unified1 Output Denial of Service Exploit

WX Guest Book 1.1.208 (SQL/XSS) Multiple Remote Vulnerabilities

Loggix Project <= 9.4.5 Multiple Remote File Inclusion Vulnerabilities

ProdLer <= 2.0 (prodler.class.php sPath) RFI Vulnerability

CMScontrol 7.x (index.php id_menu) SQL Injection Vulnerability

cP Creator 2.7.1 (Cookie tickets) Remote SQL Injection Exploit

Winplot (.wp2 File) Local Buffer Overflow Exploit


Bugtraq

[ MDVSA-2010:182 ] kdegraphics

ZDI-10-177: IBM Lotus Domino iCalendar MAILTO Stack Overflow Vulnerability

[FLOCK-SA-2010-04] Flock Browser: window.open() Method Javascript Same-Origin Policy Violation (XSS)

New writeup by Amit Klein (Trusteer): "Cross-domain information leakage in Firefox 3.6.4-3.6.8, Firefox 3.5.10-3.5.11 and Firefox 4.0 Beta1"

Secunia Research: Microsoft Outlook Content Parsing Integer Underflow Vulnerability

[FLOCK-SA-2010-03] Flock Browser: javascript: url with a leading NULL byte can bypass cross origin protection (XSS)

[FLOCK-SA-2010-02] Flock Browser: A malicious RSS feed can bypass cross origin protection (XSS)

[FLOCK-SA-2010-01] Flock Browser: A malformed favourite can bypass cross origin protection (XSS)

ZDI-10-176: Mozilla Firefox normalizeDocument Remote Code Execution Vulnerability

[USN-987-1] Samba vulnerability

[security bulletin] HPSBMA02566 SSRT100045 rev.1 - HP System Management Homepage (SMH) for Linux, Remote Disclosure of Sensitive Information

rPSA-2010-0056-1 httpd mod_ssl

[ MDVSA-2010:181 ] ntop

ZDI-10-174: Hewlett-Packard Data Protector DtbClsLogin Utf8cpy Remote Code Execution Vulnerability

Web challenges from RootedCON'2010 CTF - Contest




SecurityDot Vulnerabilities

Oracle Highly Interactive Client CVE-2009-1981 Unspecified Local Vulnerability

Oracle E-Business Suite CVE-2009-1986 Remote Oracle Applications Manager Vulnerability

Oracle PeopleSoft CVE-2009-1989 Remote PeopleSoft Enterprise FMS Vulnerability

Oracle Database CVE-2009-1020 Network Foundation Remote Vulnerability

Oracle Database CVE-2009-1969 Remote Auditing Vulnerability

Oracle PeopleSoft Enterprise HRMS eProfile Manager CVE-2009-1988 Remote Vulnerability

Oracle E-Business Suite CVE-2009-1982 Remote Oracle Applications Framework Vulnerability

Oracle Database CVE-2009-1973 Remote Virtual Private Database Vulnerability

Oracle Database CVE-2009-1015 Remote Core RDBMS Vulnerability

Oracle Database CVE-2009-1019 Remote Network Authentication Vulnerability

Oracle E-Business Suite CVE-2009-1980 Remote Vulnerability

Oracle Config Management CVE-2009-1967 Remote Unspecified Vulnerability

Oracle Complex Event Processing CVE-2009-1523 Remote Vulnerability

Oracle Secure Backup CVE-2009-1978 Remote Oracle Secure Backup Vulnerability

Oracle Database CVE-2009-1968 Remote Secure Enterprise Search Vulnerability


Hack In The Box

Privacy tool for Iranians withdrawn amid security concerns

Hackers Target and Exploit Pirate Bay Ad Server

7000 CCNY Students Feel Sting of Data Security Mishap

SQL injection used in attack against Philippine Govt site

Why Selling Exploits Is A Good Idea

Researchers clash over possible return of Google attackers

Latest Adobe Flash exploit affects Android handsets

Windows Server Security Best Practice

Calculating the truecost of cybercrime

Google Engineer Stalked Teens, Spied on Chats

Cable Security Breach: What's All The Fuss?

Stuxnet worm attacked 14 Siemens sites

Forget Puppies, Adopt a Hacker

'Don't Click on Things,' Says Cybercrime Expert

Sienna Miller to sue phone hackers

Microsoft patches new Windows bug exploited by Stuxnet

Root Android the Easy Way

Outage at J.P. Morgan Cuts Web Access

CIO allegedly hacked former employer

Security firm warns of commercial, on-demand DDoS botnet

Microsoft's anti-exploit toolkit can help mitigate PDF zero-day attacks

Novell Debuts Tool to Manage Private Clouds

Spending on IT defences to increase

Bored student creates Instant Youtube

Google Instant causes autocomplete havoc


Infosec Writers Latest Security Papers

Experimental Review of IPSec Features to Enhance IP Security

Cloud Computing Storm Clouds or is it Smooth Flying?

The Evolving World of Computer Security and Laws

Web Access Management and Single Sign-On

Reverse Honey Trap

The Phishing Guide

Shedding Light on Quantum Cryptography

Securing a Virtual Environment

Investigating the SANS/CWE Top 25 Most Dangerous Programming Errors List

Hacking Tools & Techniques and How to Protect Your Network from Them



This page should reload every hour to keep this information up to date.
If your browser does not support automatic reloads, you will need to reload your browser manually.


Copyright © 2005 - 2013 Dave Moats.  All rights reserved.  Links: Copyright © by their respective owners.
NO WARRANTIES EXTENDED.  Void where prohibited by law.  Please report any issues or broken links.
You may link to this site freely from your own site.  You may quote from this site, but please include a link to the original source on the originating site.