Skip to content

Home Early Warning System Issues
Microsoft Office and Microsoft Word Zero-Day Vulnerability
Tuesday, 11 April 2017 10:49

A vulnerability was reported in Microsoft OLE2Link Object. An unauthenticated remote attacker may be able to execute arbitrary code on a vulnerable system. No solution was available at the time of this entry. Please consider the following workarounds:
Block RTF documents in Microsoft Word
RTF documents can be blocked in Microsoft Word by using the File Block Settings in the Microsoft Office Trust Center.

Samsung Tizen OS Multiple Vulnerabilities
Monday, 10 April 2017 11:08

40 zero-day vulnerabilities were found in Samsung Tizen OS. These vulnerabilites allow someone to remotely hack any current or future device (TV, watch, or smartphone, etc.) using Tizen OS.Of all the security risks, a particularly critical vulnerability found in the Tizen Store app enabled someone to hijack the software to deliver malicious code into Samsung TV. No solution was available at the time of this entry.

DoubleAgent Attack: Taking Full Control Over Major Antiviruses and Next-Generation Antiviruses
Monday, 27 March 2017 15:37

A new Zero-Day attack for taking full control over major antiviruses and next-generation antiviruses was uncovered.DoubleAgent exploits a legitimate tool of Windows called "Microsoft Application Verifier" which is a tool included in all versions of Microsoft Windows and is used as a runtime verification tool in order to discover and fix bugs in applications. An attacker may be able to take full control over the over the antivirus by replacing the standard verifier with his own custom verifier. The list of vendors that have been tested and found to be vulnerable to DoubleAgent.

Avast (CVE-2017-5567)
AVG (CVE-2017-5566)
Avira (CVE-2017-6417)
Bitdefender (CVE-2017-6186)
Trend Micro (CVE-2017-5565)
Quick Heal

Microsoft has provided a new design concept for antivirus vendors called Protected Processes. Currently no antivirus (except Windows Defender) has implemented this design.

F-Secure AV Remote Code Execution under SYSTEM via MITM
Tuesday, 14 March 2017 11:35

A vulnerability was reported in F-Secure Software Updater. It downloads installation packages over HTTP protocol, with little or no cerification after downloading, and subsequently executes them under SYSTEM account. A remote attacker can modify the packages during downloading to gain a complete control of a target system. No solution was available at the time of this entry.

dotCMS Administration Panel Multiple Vulnerabilities
Tuesday, 07 March 2017 16:53

The dotCMS contains a cross-site request forgery, a path traversal, and an arbitrary file upload vulnerabilities. An unauthenticated remote attacker may be able to upload files to arbitrary directories on the file system or remotely execute arbitary command with the same permissions as a victim user. No solution was available at the time of this entry. Administrators can mitigate CSRF vulnerabilities by not browsing to untrusted websites while logged into their account.

<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 5 of 142
[YOUR IP: 34986] ...   [YOUR BROWSER: CCBot/2.0 (] ...