BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:
icinga

Icinga Web Interface Cross-Site Request Forgery

Disclosed December 2, 2013    Zeroday : 334 days
Vendors: Icinga
Vulnerability Severity: Medium
Exploit Impact: Cross-Site Request Forgery
Exploit Availability: No Exploit Available
Categories:
Zeroday Tracker
microsoft

Microsoft Windows Kernel Privilege Escalation

Disclosed November 27, 2013    No Patch Available
Vendors: Microsoft
Vulnerability Severity: High
Exploit Impact: Elevation of Privilege
Exploit Availability:
Categories:
Zeroday Tracker
wondershare

Wondershare Player ws_convererex.dll Hijacking Vulnerability

Disclosed November 27, 2013    Zeroday : 339 days
Vendors: Wondershare
Vulnerability Severity: High
Exploit Impact: Remote Code Execution
Exploit Availability: Publicly Available
Categories:
Zeroday Tracker
dlink

D-Link DAP 1522 Hardcoded Telnet Credentials

Disclosed November 27, 2013    Zeroday : 339 days
Vendors: D-Link
Vulnerability Severity: High
Exploit Impact: Security Bypass
Exploit Availability: Publicly Available
Categories:
Zeroday Tracker
Audacious

Audacious MP3 File Denial of Service

Disclosed November 26, 2013    Zeroday : 340 days
Vendors: Audacious
Vulnerability Severity: Medium
Exploit Impact: Denial of Service
Exploit Availability: Publicly Available
Categories:
Zeroday Tracker

November VEF Participant Wins a Google Nexus 7

Posted November 25, 2013    Qui Cao

As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to your organization…

Categories:
Vulnerability Management
cisco

Cisco IOS ICMP Denial of Service Vulnerability

Disclosed November 22, 2013    Zeroday : 344 days
Vendors: Cisco
Vulnerability Severity: Medium
Exploit Impact: Denial of Service
Exploit Availability: No Exploit Available
Categories:
Zeroday Tracker
intergraph

ERDAS ER Viewer Insecure Library Loading

Disclosed November 21, 2013    Zeroday : 345 days
Vendors: Intergraph Corporation
Vulnerability Severity: High
Exploit Impact: Remote Code Execution
Exploit Availability: Publicly Available
Categories:
Zeroday Tracker
BeyondSaas-img1

Ask Why? BeyondSaaS will tell you.

Posted November 20, 2013    Morey Haber

Encouraging team members to “ask why” is a great way to encourage creativity, solve problems, and understand why things are being done, the way they are being done. Changes and best practices for proactive security are a great reason to empower team members with this philosophy. If changes are required, and the team does not…

Categories:
Vulnerability Management
Tags:
, , , , ,
Welcome to BeyondSaaS IMg

BeyondSaaS Adds Diversity for Vulnerability Management

Posted November 18, 2013    Morey Haber

BeyondTrust has a wide variety of architectures for Retina Enterprise Vulnerability Management. It can be installed on premise as software or appliance, on physical hardware or virtualized assets, and even in an all mixed mode environment combining any of the four. BeyondTrust has now extended that offering with BeyondSaaS to add a fifth option. This…

Categories:
Vulnerability Management
Tags:
, , , , , ,