BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:
src

The Silk Road to the FBI is Paved with Bitcoin

Posted October 3, 2013    BeyondTrust Research Team

The FBI has seized control of one of the online black market’s most prominent marketplaces, Silk Road. Silk Road was an online marketplace used by miscreants who bought and sold illegal merchandise, such as drugs, weapons, and other illicit materials. It was not accessible without the use of routing software known as Tor (the onion…

Categories:
Vulnerability Management
iconcool

PDFCool Buffer Overflow

Disclosed October 2, 2013    Zeroday : 349 days
Vendors: IconCool Software
Vulnerability Severity: High
Exploit Impact: Remote Code Execution
Exploit Availability: Privately Available, Publicly Available
Categories:
Zeroday Tracker
zeroday-default

libtar Directory Traversal Vulnerabilities

Disclosed October 1, 2013    Fully Patched
Vendors: libtar
Vulnerability Severity: Low
Exploit Impact: Security Bypass
Exploit Availability: No Exploit Available
Categories:
Zeroday Tracker
hp

HP 2620 Switch Series Cross-Site Request Forgery

Disclosed September 26, 2013    Zeroday : 355 days
Vendors: HP
Vulnerability Severity: High
Exploit Impact: Cross-Site Request Forgery
Exploit Availability: Publicly Available
Categories:
Zeroday Tracker
Retina Security Scanner

Scalability When You Need It

Posted September 25, 2013    Morey Haber

I think we have all been there before. We pilot a solution, run the gambit of tests in the lab, and when it comes to production, the scalability falls flat on its face. It does not matter if the solution was architected correctly for the environment with multiple nodes, high performance database, and tons of…

Categories:
Vulnerability Management
Tags:
, , ,

September VEF Participant Wins an iPad mini

Posted September 24, 2013    Qui Cao

As you all know, every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to your organization…

Categories:
Vulnerability Management
solarwinds

SolarWinds Server and Application Monitor Buffer Overflow

Disclosed September 23, 2013    Workaround Available, Zeroday
Vendors: SolarWinds
Vulnerability Severity: High
Exploit Impact: Remote Code Execution
Exploit Availability: Publicly Available
Categories:
Zeroday Tracker
Retina CS

Building Automated Vulnerability Audit Groups

Posted September 20, 2013    Bill Tillson

From time to time, the field engineering team and I see the same request cross our desks in a short period of time. This time it was how to remove certain types of audits from running when performing a vulnerability scan originating from Retina CS. The old way of doing things would have required the…

Categories:
Vulnerability Management
Tags:
, , , , , , ,
redhat

systemd Multiple Vulnerabilities

Disclosed September 20, 2013    Fully Patched
Vendors: Red Hat
Vulnerability Severity: High
Exploit Impact: Remote Code Execution
Exploit Availability: No Exploit Available
Categories:
Zeroday Tracker
Monstra

Monstra CMS Blind SQL Injection Vulnerability

Disclosed September 20, 2013    Zeroday : 361 days
Vendors: Sergey Romanenko
Vulnerability Severity: Medium
Exploit Impact: SQL Injection
Exploit Availability: No Exploit Available
Categories:
Zeroday Tracker