MCAFEE FOUNDSTONE FSL UPDATE

Size: px
Start display at page:

Download "MCAFEE FOUNDSTONE FSL UPDATE"

Transcription

1 MCAFEE FOUNDSTONE FSL UPDATE 2012-JUN-13 To better protect your environment McAfee has created this FSL check update for the Foundstone Product Suite. The following is a detailed summary of the new and updated checks included with this release. NEW CHECKS HP System Health Application And Command Line Utilities For Linux Unspecified Vulnerabilities Category: SSH Module -> NonIntrusive -> SSH Miscellaneous CVE: CVE Multiple unspecified vulnerabilities are present in some versions of HP System Health Application and Command Line Utilities for Linux. The HP System Health Application and Command Line Utilities is collection of applications and tools which enables monitoring of fans, power supplies, temperature sensors, and other management events. Multiple unspecified vulnerabilities are present in some versions of HP System Health Application and Command Line Utilities for Linux. The flaw is caused by an unspecified error. No further information is currently available. Successful exploitation could allow an attacker to execute arbitrary code via unknown vectors (HPSBUX02784) HP-UX Java Multiple Vulnerabilities Category: SSH Module -> NonIntrusive -> HP-UX Patches and Hotfixes CVE: CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE Multiple vulnerabilities are present in some versions of HP-UX Java JRE and JDK. HP-UX Java Runtime Environment (JRE) and Java Developer Kit (JDK) are an Oracle Java technology implementation for HP-UX systems. Multiple vulnerabilities are present in some versions of HP-UX Java JRE and JDK. The flaws are present in multiple components of Java. Successful exploitation could allow a remote attacker to cause denial of service, information disclosure and gain unauthorized access to the vulnerable system IBM DB2 Accessories Suite Outside In Technology Multiple Vulnerabilities Category: Windows Host Assessment -> Miscellaneous CVE: CVE , CVE , CVE

2 Multiple vulnerabilities is present in some versions of IBM DB2. IBM DB2 is a popular relational database management server. Multiple vulnerabilities is present in some versions of IBM DB2. The falws are present in CorelDRAW file parser, File ID SDK and file filters in Oracle Outside In Technology component. Successful exploitation could allow remote attacker to execute arbitrary code (MS12-038) Microsoft.NET Framework Clipboard Unsafe Memory Access Remote Code Execution ( ) CVE: CVE Microsoft ID: MS Microsoft KB: A remote code execution vulnerability is present in some versions of Microsoft.NET Framework. A remote code execution vulnerability is present in some versions of Microsoft.NET Framework. The flaw lies in the improper execution of function pointers. Successful exploitation could allow an attacker to execute remote code. The exploit requires the user to visit a malicious website or open a malicious file (MS12-036) Microsoft Windows Remote Desktop Protocol Remote Code Execution ( ) CVE: CVE Microsoft ID: MS Microsoft KB: A remote code execution vulnerability is present in some versions of Microsoft Windows. A remote code execution vulnerability is present in some versions of Microsoft Windows. The flaw lies in the improper handling of objects in memory. Successful exploitation could allow an attacker to execute remote code (MS12-036) Vulnerability In Remote Desktop Could Allow Remote Code Execution ( ) Category: Windows Host Assessment -> Patches Only

3 CVE: CVE Microsoft ID: MS A remote code execution vulnerability is present in some versions of Microsoft Windows. A remote code execution vulnerability is present in some versions of Microsoft Windows. The flaw lies in the improper handling of memory by RDP components. Successful exploitation could allow an attacker to execute remote code. Microsoft has provided MS to address this issue. The host appears to be missing this patch (MS12-037) Microsoft Internet Explorer OnRowsInserted Event Remote Code Execution ( ) CVE: CVE The flaw lies in the access to deleted elements. Successful exploitation could allow an attacker to execute remote code. The exploit requires the user to visit a malicious website (MS12-037) Microsoft Internet Explorer InsertRow Remote Code Execution ( ) CVE: CVE The flaw lies in the access to deleted elements. Successful exploitation could allow an attacker to execute remote code. The exploit requires the user to visit a malicious website.

4 (MS12-037) Microsoft Internet Explorer InsertAdjacentText Remote Code Execution ( ) CVE: CVE The flaw lies in the access to deleted elements. Successful exploitation could allow an attacker to execute remote code. The exploit requires the user to visit a malicious website (MS12-037) Microsoft Internet Explorer OnBeforeDeactivate Event Remote Code Execution ( ) CVE: CVE The flaw lies in the access to deleted elements. Successful exploitation could allow an attacker to execute remote code. The exploit requires the user to visit a malicious website (MS12-037) Microsoft Internet Explorer Developer Toolbar Remote Code Execution ( ) CVE: CVE

5 The flaw lies in the handling of previously deleted elements. Successful exploitation could allow an attacker to execute remote code. The exploit requires the user to visit a malicious website (MS12-037) Microsoft Internet Explorer Col Element Remote Code Execution ( ) CVE: CVE The flaw lies in the access to Col elements that do not exist. Successful exploitation could allow an attacker to execute remote code. The exploit requires the user to visit a malicious website (MS12-037) Microsoft Internet Explorer Center Element Remote Code Execution ( ) CVE: CVE The flaw lies in an error handling a Center Element previously deleted. Successful exploitation could allow an attacker to execute remote code. The exploit requires the user to visit a malicious website (MS12-037) Microsoft Internet Explorer Title Element Change Remote Code Execution ( ) CVE: CVE

6 The flaw is specific to an invalid access condition within Title elements. Successful exploitation could allow an attacker to execute remote code. The exploit requires the user to visit a malicious website (MS12-037) Cumulative Security Update For Internet Explorer ( ) Category: Windows Host Assessment -> Patches Only CVE: CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE Multiple remote code execution vulnerabilities are present in some versions of Microsoft Internet Explorer. Multiple remote code execution vulnerabilities are present in some versions of Microsoft Internet Explorer. Multiple components of Microsoft Internet Explorer are affected. Successful exploitation could allow an attacker to execute remote code. The exploit requires the user to visit a malicious website. Microsoft has provided MS to address these issues. The host appears to be missing this patch (MS12-038) Vulnerability in.net Framework Could Allow Remote Code Execution ( ) Category: Windows Host Assessment -> Patches Only CVE: CVE Microsoft ID: MS A vulnerability exists in some versions of Microsoft.NET Framework. The Microsoft.NET framework is a runtime and software framework for the Windows operating system. A vulnerability exists in some versions of Microsoft.NET Framework. The flaw lies in the improper execution of function pointers. Successful exploitation could allow an attacker to execute remote code. Microsoft has provided MS to address this issue. The host appears to be missing this patch Microsoft Windows XML Core Services Could Allow Remote Code Execution ( ) CVE: CVE Microsoft KB: KB

7 A remote code execution exists in some versions of Microsoft XML Core Services, as implemented in Microsoft Windows and Microsoft Office. A remote code execution exists in some versions of Microsoft XML Core Services, as implemented in Microsoft Windows and Microsoft Office. The flaw is specific to a function in MSXML and may lead to remote code execution or a denial of service (crash) condition. In particular conditions the problematic function attempts to access objects in memory which have not been properly or fully initialized. This ultimately lead to memory corruption. Exploitation can occur via a maliciously-crafted website or rich content document. Current intelligence indicates that active an functional attacks are targeting this flaw, leveraging objxml.definition called via JavaScript (MS12-039) Microsoft Lync Insecure Library Loading Remote Code Execution ( ) CVE: CVE Microsoft ID: MS Microsoft KB: A remote code execution vulnerability is present in some versions of Microsoft Lync. A remote code execution vulnerability is present in some versions of Microsoft Lync. The flaw lies in the loading of DLL files. Successful exploitation could allow an attacker to execute remote code. The exploit requires the user to download and open a malicious.ocsmeet file (MS12-039) Microsoft Windows TrueType Font Parsing II Remote Code Execution ( ) CVE: CVE Microsoft ID: MS Microsoft KB: A remote code execution vulnerability is present in some versions of Microsoft Lync. A remote code execution vulnerability is present in some versions of Microsoft Lync. The flaw lies in the TrueType font parsing engine. Successful exploitation could allow an attacker to execute remote code. The exploit requires the user to visit a malicious website.

8 (MS12-039) Microsoft Windows TrueType Font Parsing Remote Code Execution ( ) CVE: CVE Microsoft ID: MS Microsoft KB: A remote code execution vulnerability exists in some versions of Microsoft Lync and related products. A remote code execution vulnerability exists in some versions of Microsoft Lync and related products. A vulnerability in some versions of Microsoft Lync could lead to remote code execution. The flaw lies in the W32k TrueType fontparsing engine. Successful exploitation could allow an attacker to execute commands in kernel mode. This flaw is exploited in the wild as part of the "Duqu" attacks. The victim must open a maliciously crafted Word document that contains the associated exploit code Microsoft IIS 7.5 Classic ASP Authentication Bypass Remote Code Execution Category: Windows Host Assessment -> Miscellaneous A remote code execution vulnerability is present in some versions of Microsoft IIS. A remote code execution vulnerability is present in some versions of Microsoft IIS. The flaw allows an attacker to bypass password protected directories. Successful exploitation by a remote attacker could result in the execution of arbitrary code Microsoft IIS 6.0 PHP Authentication Bypass Remote Code Execution Category: Windows Host Assessment -> Miscellaneous A remote code execution vulnerability is present in some versions of Microsoft IIS. A remote code execution vulnerability is present in some versions of Microsoft IIS. The flaw allows an attacker to bypass password protected directories. Successful exploitation by a remote attacker could result in the execution of arbitrary code Microsoft IIS 7.5.NET Authentication Bypass Remote Code Execution

9 Category: Windows Host Assessment -> Miscellaneous A remote code execution vulnerability is present in some versions of Microsoft IIS. A remote code execution vulnerability is present in some versions of Microsoft IIS. The flaw allows an attacker to bypass password protected directories. Successful exploitation by a remote attacker could result in the execution of arbitrary code Skywiper Category: Windows Host Assessment -> Trojans, Backdoors, Viruses, and Malware Skywiper coverage malware dessicated with a long-standing, high-evolved, information theft and monitoring campaign, targeted at specific entities in the Middle East and Europe. Skywiper coverage malware dessicated with a long-standing, high-evolved, information theft and monitoring campaign, targeted at specific entities in the Middle East and Europe. McAfee Labs has observed publicly available reports from anti-spyware companies, and log files in public help forums, which could indicate infections of early variants of SkyWiper in Europe and Iran several years ago (for example: March 2010). The threat propagates via its' own native mechanisms, as well as leveraging vulnerabilities described in (MS10-061) and (MS10-046). Skywiper is a modular, extendable and updateable threat. It is capable, but not limited to the following key espionage functions: - Scanning network resources - Stealing information as specified - Communicate to C&C Servers over SSH and HTTPS protocols - Detect the presence of over 100 security products (AV, Anti-Spyware, FW, etc) - Both kernel and user mode logic is used - Complex internal functionality utilizing Windows APC calls and and threads start manipulation, and code injections to key processes - It loads as part of Winlogon.exe then injects to Explorer and Services - Conceals its present as ~ named temp files, just like Stuxnet and Duqu - Capable of attacking new systems over USB Flash Memory and local network (slowly spreads) - Creates screen captures - Records voice conversations - Runs on Windows XP, Windows Vista and Windows 7 systems - Contains known exploits, such as the Print Spooler and lnk exploit found in Stuxnet - Uses SQLite Database to store collected information - Uses custom DB for attack modules (This is very unusual, but shows the modularity and extendibility of the malware) - Often located on nearby systems: a local network for both C&C and target infection cases - Utilizes PE encrypted resources (MS12-041) Microsoft Windows Clipboard Format Atom Name Handling Privilege Escalation ( )

10 CVE: CVE Microsoft ID: MS Microsoft KB: The flaw lies in the handling of kernel-mode driver objects. Successful exploitation could allow an attacker to obtain elevated privileges. The exploit requires the user to have valid credentials to the vulnerable system (MS12-037) Microsoft Internet Explorer Scrolling Events Information Disclosure ( ) CVE: CVE An information disclosure vulnerability is present in some versions of Microsoft Internet Explorer. An information disclosure vulnerability is present in some versions of Microsoft Internet Explorer. The flaw lies in the en error in the Scrolling event. Successful exploitation could allow an attacker to obtain sensitive information. The exploit requires the user to visit a malicious website (MS12-037) Microsoft Internet Explorer Null Byte Information Disclosure ( ) CVE: CVE An information disclosure vulnerability is present in some versions of Microsoft Internet Explorer. An information disclosure vulnerability is present in some versions of Microsoft Internet Explorer. The flaw lies in the handling of null bytes. Successful exploitation could allow an attacker ot obtain sensitive information. The exploit requires the user to visit a malicious website.

11 (MS12-037) Microsoft Internet Explorer EUC-JP Character Encoding Information Disclosure ( ) CVE: CVE An information disclosure vulnerability is present in some versions of Microsoft Internet Explorer. An information disclosure vulnerability is present in some versions of Microsoft Internet Explorer. The flaw lies in the handling of special encoding characters. Successful exploitation could allow an attacker to obtain sensitive information. The exploit requires the user to visit a malicious website (MS12-037) Microsoft Internet Explorer HTML Sanitization Information Disclosure ( ) CVE: CVE An information disclosure vulnerability is present in some versions of Microsoft Internet Explorer. An information disclosure vulnerability is present in some versions of Microsoft Internet Explorer. The flaw lies in the sanitization of HTML elements. Successful exploitation could allow an attacker to obtain sensitive information. The exploit requires the user to visit a malicious website (MS12-040) Microsoft Dynamic AX Cross Site Scripting Privilege Escalation ( ) CVE: CVE Microsoft ID: MS Microsoft KB: A privilege escalation vulnerability is present in some versions of Microsoft Dynamic AX.

12 A privilege escalation vulnerability is present in some versions of Microsoft Dynamic AX. The flaw lies in the handling of JavaScript code that can cause a cross site scripting error. Successful exploitation could allow an attacker to obtain elevated privileges. The exploit requires the victim to visit a Dynamic AX website using a malicious URL (MS12-040) Vulnerability in Microsoft Dynamics AX Enterprise Portal Could Allow Elevation of Privilege ( ) Category: Windows Host Assessment -> Patches Only CVE: CVE Microsoft ID: MS A vulnerability exists in some versions of Microsoft Dynamic AX. Microsoft Dynamic AX is an enterprise resource planning (ERP) software. A vulnerability exists in some versions of Microsoft Dynamic AX. The flaw lies in the way that Dynamix AX handles JavaScript code, that could cause a cross site scripting error. Successful exploitation could allow an attacker to obtain elevated privileges. Microsoft has provided MS to address this issue. The host appears to be missing this patch (MS12-041) Microsoft Windows Font Resource Refcount Interger Overflow Privilege Escalation ( ) CVE: CVE Microsoft ID: MS Microsoft KB: The flaw lies in the memory allocation for handling fonts. Successful exploitation could allow an attacker to obtain elevated privileges. The exploit requires the user to have valid credentials to the vulnerable system (MS12-041) Microsoft Windows String Atom Class Name Handling Privilege Escalation I ( ) CVE: CVE Microsoft ID: MS Microsoft KB:

13 The flaw lies in the handling of kernel-mode driver objects. Successful exploitation could allow an attacker to obtain elevated privileges. The exploit requires the attacker to have valid credentials to the vulnerable system (MS12-041) Microsoft Windows String Atom Class Name Handling Privilege Escalation II ( ) CVE: CVE Microsoft ID: MS Microsoft KB: The flaw lies in the handling of kernel-mode driver objects. Successful exploitation could allow an attacker to obtain elevated privileges. The exploit requires the user to have valid credentials to the vulnerable system (MS12-041) Microsoft Windows Win32k.sys Race Condition Privilege Escalation ( ) CVE: CVE Microsoft ID: MS Microsoft KB: The flaw lies in the attempts to create specific threads. Successful exploitation could allow an attacker to obtain elevated privileges. The exploit requires the user to have valid credentials to the vulnerable system (MS12-042) Microsoft Windows BIOS ROM Corruption Privilege Escalation ( ) CVE: CVE

14 Microsoft ID: MS Microsoft KB: The flaw lies in the handling of BIOS memory. Successful exploitation could allow an attacker to obtain elevated privileges. the exploit requires the attacker to have valid credentials to the vulnerable system (MS12-042) Microsoft Windows User Mode Scheduler Memory Corruption Privilege Escalation ( ) CVE: CVE Microsoft ID: MS Microsoft KB: The flaw lies in the handling of system requests by the User Mode Scheduler. Successful exploitation could allow an attacker to obtain elevated privileges. The exploit requires the user to have valid credentials to the vulnerable system (MS12-039) Microsoft Windows HTML Sanitization Information Disclosure ( ) CVE: CVE Microsoft ID: MS Microsoft KB: An information disclosure vulnerability is present in some versions of Microsoft Windows. An information disclosure vulnerability is present in some versions of Microsoft Windows. The flaw lies in the filtering of HTML code. Successful exploitation could allow an attacker to obtain sensitive information (MS12-041) Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege ( ) Category: Windows Host Assessment -> Patches Only

15 Risk Level: Informational CVE: CVE , CVE , CVE , CVE , CVE Microsoft ID: MS Multiple vulnerabilities are present in Windows kernel-mode drivers. Multiple vulnerabilities are present in Windows kernel-mode drivers. The vulnerabilities could allow elevation of privilege if an attacker logs on to a system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit any of these vulnerabilities. Microsoft has provided MS to address these issues. The host appears to be missing this patch (MS12-042) Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege ( ) Category: Windows Host Assessment -> Patches Only Risk Level: Informational CVE: CVE , CVE Microsoft ID: MS Multiple vulnerabilities are present in the Windows kernel. Multiple vulnerabilities are present in the Windows kernel. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application that exploits the vulnerability. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. Microsoft has provided MS to address these issues. The host appears to be missing this patch (MS12-039) Vulnerabilities in Lync Could Allow Remote Code Execution ( ) Category: Windows Host Assessment -> Patches Only Risk Level: Informational CVE: CVE , CVE , CVE , CVE Microsoft ID: MS Multiple vulnerabilities are present in Microsoft Lync. Multiple vulnerabilities are present in Microsoft Lync. The vulnerabilities could allow remote code execution if a user views shared content that contains specially crafted TrueType fonts. The vulnerabilities are a result of how specially crafted True Type Font files are handled, the manner in which Microsoft

16 Lync loads external libraries, and the way that SafeHTML function sanitizes HTML content. Microsoft has provided MS to address these issues. The host appears to be missing this patch. ENHANCED CHECKS The following checks have been updated. Enhancements may include optimizations, changes that reflect new information on a vulnerability and anything else that improves upon an existing FSL check (MS12-034) Microsoft Windows TrueType Font Parsing II ( ) CVE: CVE DISA IAVA: 2012-A-0079 Microsoft ID: MS Microsoft KB: Update Details is updated. is updated (MS12-034) Microsoft Windows TrueType Font Parsing ( ) CVE: CVE DISA IAVA: 2012-A-0079,2011-A-0170 Microsoft ID: MS Microsoft KB: BID: Update Details is updated. is updated Tftpd32 DNS Server Denial Of Service Vulnerability Category: Windows Host Assessment -> Miscellaneous BID: Update Details Recommendation is updated.

17 (MS12-037) Microsoft Internet Explorer Same ID Property Remote Code Execution ( ) CVE: CVE Update Details Name is updated. is updated. is updated. Recommendation is updated. CVE is updated. FASLScript is updated Sun Java Web Console Help JSP File Cross-Site Scripting Vulnerability Category: General Vulnerability Assessment -> NonIntrusive -> Web Server CVE: CVE Update Details Recommendation is updated McAfee Web Gateway Multiple File Processing Vulnerabilities Category: SSH Module -> NonIntrusive -> SSH Miscellaneous CVE: CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE Update Details Recommendation is updated netbios-helpers.fasl3.inc Category: General Vulnerability Assessment -> NonIntrusive -> Invalid Category Risk Level: Informational Update Details FASLScript is updated. HOW TO UPDATE FS1000 APPLIANCE customers should follow the instructions for Enterprise/Professional customers, below. In addition, we strongly urge all appliance customers to authorize and install any Windows Update critical patches. The appliance will auto-download any critical updates but will wait for your explicit authorization before installing.

18 FOUNDSTONE ENTERPRISE and PROFESSIONAL customers may obtain these new scripts using the FSUpdate Utility by selecting "FoundScan Update" on the help menu. Make sure that you have a valid FSUpdate username and password. The new vulnerability scripts will be automatically included in your scans if you have selected that option by right-clicking the selected vulnerability category and checking the "Run New Checks" checkbox. MANAGED SERVICE CUSTOMERS already have the newest update applied to their environment. The new vulnerability scripts will be automatically included when your scans are next scheduled, provided the Run New Scripts option has been turned on. MCAFEE TECHNICAL SUPPORT ServicePortal: Multi-National Phone Support available here: Non-US customers - Select your country from the list of Worldwide Offices. This may contain confidential and privileged material for the sole use of the intended recipient. Any review or distribution by others is strictly prohibited. If you are not the intended recipient please contact the sender and delete all copies. Copyright 2010 McAfee, Inc. McAfee is a registered trademark of McAfee, Inc. and/or its affiliates

MCAFEE FOUNDSTONE FSL UPDATE

MCAFEE FOUNDSTONE FSL UPDATE MCAFEE FOUNDSTONE FSL UPDATE 2013-FEB-25 To better protect your environment McAfee has created this FSL check update for the Foundstone Product Suite. The following is a detailed summary of the new and

More information

MCAFEE FOUNDSTONE FSL UPDATE

MCAFEE FOUNDSTONE FSL UPDATE 2015-SEP-03 FSL version 7.5.737 MCAFEE FOUNDSTONE FSL UPDATE To better protect your environment McAfee has created this FSL check update for the Foundstone Product Suite. The following is a detailed summary

More information

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange

More information

FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that

More information

McAfee Web Gateway 7.4.1

McAfee Web Gateway 7.4.1 Release Notes Revision B McAfee Web Gateway 7.4.1 Contents About this release New features and enhancements Resolved issues Installation instructions Known issues Find product documentation About this

More information

The Leader in Cloud Security SECURITY ADVISORY

The Leader in Cloud Security SECURITY ADVISORY The Leader in Cloud Security SECURITY ADVISORY Security Advisory - December 14, 2010 Zscaler Provides Protection in the Face of Significant Microsoft Year End Patch Cycle Zscaler, working with Microsoft

More information

Patch Assessment Content Update Release Notes for CCS 11.0. Version: 2012-2 Update

Patch Assessment Content Update Release Notes for CCS 11.0. Version: 2012-2 Update Patch Assessment Content Update Release Notes for CCS 11.0 Version: 2012-2 Update Patch Assessment Content Update 2012-2 Release Notes for CCS 11.0 Legal Notice Copyright 2012 Symantec Corporation. All

More information

The Top Web Application Attacks: Are you vulnerable?

The Top Web Application Attacks: Are you vulnerable? QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding

More information

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]

More information

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration

More information

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development

More information

What is Web Security? Motivation

What is Web Security? Motivation [email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web

More information

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked. This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out

More information

IBM Advanced Threat Protection Solution

IBM Advanced Threat Protection Solution IBM Advanced Threat Protection Solution Fabio Panada IBM Security Tech Sales Leader 1 Advanced Threats is one of today s key mega-trends Advanced Threats Sophisticated, targeted attacks designed to gain

More information

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

SECURITY TRENDS & VULNERABILITIES REVIEW 2015 SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall

More information

Thick Client Application Security

Thick Client Application Security Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two

More information

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011 Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing

More information

Install this update to increase the performance of web sites that use Ajax. After you install this item, you may have to restart your computer.

Install this update to increase the performance of web sites that use Ajax. After you install this item, you may have to restart your computer. Windows XP Pro Service Pack 2 Approved Window Update Windows XP (KB896423) Update Description A security issue has been identified in the Print Spooler service that could allow an attacker to compromise

More information

IN10A. MICROSOFT WINDOWS CRITICAL UPDATES October 2014

IN10A. MICROSOFT WINDOWS CRITICAL UPDATES October 2014 IN10A MICROSOFT WINDOWS CRITICAL UPDATES October 2014 The following list of security patch updates have been tested and approved for IN10A R1.0 Imaging and Workflow Management System compatibility. Prior

More information

Virtualization System Security

Virtualization System Security Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability

More information

Penetration Testing Report Client: Business Solutions June 15 th 2015

Penetration Testing Report Client: Business Solutions June 15 th 2015 Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]

More information

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org

More information

MatriXay WEB Application Vulnerability Scanner V 5.0. 1. Overview. (DAS- WEBScan ) - - - - - The best WEB application assessment tool

MatriXay WEB Application Vulnerability Scanner V 5.0. 1. Overview. (DAS- WEBScan ) - - - - - The best WEB application assessment tool MatriXay DAS-WEBScan MatriXay WEB Application Vulnerability Scanner V 5.0 (DAS- WEBScan ) - - - - - The best WEB application assessment tool 1. Overview MatriXay DAS- Webscan is a specific application

More information

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not

More information

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation

More information

External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION

External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security

More information

Understanding Web Application Security Issues

Understanding Web Application Security Issues Understanding Web Application Security Issues Pankaj Sharma January 30, 2009 Indian Computer Emergency Response Team ( CERT - IN ) Department Of Information Technology 1 Agenda Introduction What are Web

More information

============================================================= =============================================================

============================================================= ============================================================= Stephan Lantos Subject: FW: @RISK: The Consensus Security Vulnerability Alert: Vol. 13, Num. 23 In partnership with SANS and Sourcefire, Qualys is pleased to provide you with the @RISK Newsletter. This

More information

SSA-345442: Multiple Vulnerabilities in WinCC flexible and WinCC V11 (TIA Portal)

SSA-345442: Multiple Vulnerabilities in WinCC flexible and WinCC V11 (TIA Portal) SSA-345442: Multiple Vulnerabilities in WinCC flexible and WinCC V11 (TIA Portal) Publishing Date 2012-01-24 Last Update 2012-01-24 Current Version V1.5 CVSS Overall Score 8.7 Summary: Multiple vulnerabilities

More information

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top

More information

Windows Operating Systems. Basic Security

Windows Operating Systems. Basic Security Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System

More information

Cross-Site Scripting

Cross-Site Scripting Cross-Site Scripting (XSS) Computer and Network Security Seminar Fabrice Bodmer ([email protected]) UNIFR - Winter Semester 2006-2007 XSS: Table of contents What is Cross-Site Scripting (XSS)? Some

More information

McAfee Vulnerability Manager 7.0.2

McAfee Vulnerability Manager 7.0.2 McAfee Vulnerability Manager 7.0.2 The McAfee Vulnerability Manager 7.0.2 quarterly release adds features to the product without having to wait for the next major release. This technical note contains

More information

This report is a detailed analysis of the dropper and the payload of the HIMAN malware.

This report is a detailed analysis of the dropper and the payload of the HIMAN malware. PAGE 5 Check Point Malware Research Group HIMAN Malware Analysis December 12, 2013 Researcher: Overview This report is a detailed analysis of the dropper and the payload of the HIMAN malware. This malware

More information

Web Application Report

Web Application Report Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012

More information

CORPORATE AV / EPP COMPARATIVE ANALYSIS

CORPORATE AV / EPP COMPARATIVE ANALYSIS CORPORATE AV / EPP COMPARATIVE ANALYSIS Exploit Protection 2013 Randy Abrams, Dipti Ghimire, Joshua Smith Tested Vendors AVG, ESET, F- Secure, Kaspersky, McAfee, Microsoft, Norman, Panda, Sophos, Symantec,

More information

Complete Patch Management

Complete Patch Management Complete Patch Management Complete - Flexible Unique In- Depth Secunia CSI 7 Corporate Software Inspector Take control of the vulnerability threat and optimize your IT security investments. The Secunia

More information

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0. Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0 Page 1 of 9 Table of Contents Table of Contents... 2 Executive Summary...

More information

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA Emerging Network Security Threats and what they mean for internal auditors December 11, 2013 John Gagne, CISSP, CISA 0 Objectives Emerging Risks Distributed Denial of Service (DDoS) Attacks Social Engineering

More information

Web Application Security

Web Application Security E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary

More information

IBM Protocol Analysis Module

IBM Protocol Analysis Module IBM Protocol Analysis Module The protection engine inside the IBM Security Intrusion Prevention System technologies. Highlights Stops threats before they impact your network and the assets on your network

More information

The Sandbox Roulette: are you ready to gamble? Rafal Wojtczuk [email protected] Rahul Kashyap [email protected]

The Sandbox Roulette: are you ready to gamble? Rafal Wojtczuk rafal@bromium.com Rahul Kashyap rahul@bromium.com The Sandbox Roulette: are you ready to gamble? Rafal Wojtczuk [email protected] Rahul Kashyap [email protected] What is a sandbox? Environment designed to run untrusted (or exploitable) code, in a manner

More information

MCAFEE FOUNDSTONE FSL UPDATE

MCAFEE FOUNDSTONE FSL UPDATE MCAFEE FOUNDSTONE FSL UPDATE 2014-JUL-16 To better protect your environment McAfee has created this FSL check update for the Foundstone Product Suite. The following is a detailed summary of the new and

More information

Recommended Practice Case Study: Cross-Site Scripting. February 2007

Recommended Practice Case Study: Cross-Site Scripting. February 2007 Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber

More information

Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security

Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security The IT Security Office (ITSO) What We Do? Risk Assessment Network and System Security Monitoring Vulnerability Scanning

More information

Web application security

Web application security Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0

More information

Remote Administration

Remote Administration Windows Remote Desktop, page 1 pcanywhere, page 3 VNC, page 7 Windows Remote Desktop Remote Desktop permits users to remotely execute applications on Windows Server 2008 R2 from a range of devices over

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair dave.wichers@owasp.

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair dave.wichers@owasp. and Top 10 (2007 Update) Dave Wichers The Foundation Conferences Chair [email protected] COO, Aspect Security [email protected] Copyright 2007 - The Foundation This work is available

More information

IBM Security Strategy

IBM Security Strategy IBM Security Strategy Intelligence, Integration and Expertise Kate Scarcella CISSP Security Tiger Team Executive M.S. Information Security IBM Security Systems IBM Security: Delivering intelligence, integration

More information

Secrets of Vulnerability Scanning: Nessus, Nmap and More. Ron Bowes - Researcher, Tenable Network Security

Secrets of Vulnerability Scanning: Nessus, Nmap and More. Ron Bowes - Researcher, Tenable Network Security Secrets of Vulnerability Scanning: Nessus, Nmap and More Ron Bowes - Researcher, Tenable Network Security 1 About me Ron Bowes (@iagox86) My affiliations (note: I m here to educate, not sell) 2 SkullSpace

More information

Intellex Platform Security Update Process. Microsoft Security Updates. Version 11-12

Intellex Platform Security Update Process. Microsoft Security Updates. Version 11-12 Intellex Platform Security Update Process Microsoft Security Updates Version 11-12 Contents Intellex Platform Security Update Process... 1 Introduction... 3 Installing updates on an Intellex Ultra running

More information

OWASP AND APPLICATION SECURITY

OWASP AND APPLICATION SECURITY SECURING THE 3DEXPERIENCE PLATFORM OWASP AND APPLICATION SECURITY Milan Bruchter/Shutterstock.com WHITE PAPER EXECUTIVE SUMMARY As part of Dassault Systèmes efforts to counter threats of hacking, particularly

More information

Gateway Apps - Security Summary SECURITY SUMMARY

Gateway Apps - Security Summary SECURITY SUMMARY Gateway Apps - Security Summary SECURITY SUMMARY 27/02/2015 Document Status Title Harmony Security summary Author(s) Yabing Li Version V1.0 Status draft Change Record Date Author Version Change reference

More information

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities

More information

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure

More information

Penetration Test Report

Penetration Test Report Penetration Test Report Acme Test Company ACMEIT System 26 th November 2010 Executive Summary Info-Assure Ltd was engaged by Acme Test Company to perform an IT Health Check (ITHC) on the ACMEIT System

More information

Patch Assessment Content Update Release Notes for CCS 11.1. Version: 2016-02 Update

Patch Assessment Content Update Release Notes for CCS 11.1. Version: 2016-02 Update Patch Assessment Content Update Release Notes for CCS 11.1 Version: 2016-02 Update Patch Assessment Content Update 2016-02 Release Notes for CCS 11.1 Legal Notice Copyright 2016 Symantec Corporation. All

More information

Security Research Advisory IBM inotes 9 Active Content Filtering Bypass

Security Research Advisory IBM inotes 9 Active Content Filtering Bypass Security Research Advisory IBM inotes 9 Active Content Filtering Bypass Table of Contents SUMMARY 3 VULNERABILITY DETAILS 3 TECHNICAL DETAILS 4 LEGAL NOTICES 7 Active Content Filtering Bypass Advisory

More information

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00 Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak Capture Link Server V1.00 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents

More information

Criteria for web application security check. Version 2015.1

Criteria for web application security check. Version 2015.1 Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-

More information

Enterprise Application Security Workshop Series

Enterprise Application Security Workshop Series Enterprise Application Security Workshop Series Phone 877-697-2434 fax 877-697-2434 www.thesagegrp.com Defending JAVA Applications (3 Days) In The Sage Group s Defending JAVA Applications workshop, participants

More information

SQL Injection January 23, 2013

SQL Injection January 23, 2013 Web-based Attack: SQL Injection SQL Injection January 23, 2013 Authored By: Stephanie Reetz, SOC Analyst Contents Introduction Introduction...1 Web applications are everywhere on the Internet. Almost Overview...2

More information

Using Foundstone CookieDigger to Analyze Web Session Management

Using Foundstone CookieDigger to Analyze Web Session Management Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.

More information

Intellex Platform Security Update Process. Microsoft Security Updates. Version 06-10

Intellex Platform Security Update Process. Microsoft Security Updates. Version 06-10 Intellex Platform Security Update Process Microsoft Security Updates Version 06-10 Contents Intellex Platform Security Update Process... 1 Introduction... 3 Installing updates on an Intellex Ultra running

More information

Webapps Vulnerability Report

Webapps Vulnerability Report Tuesday, May 1, 2012 Webapps Vulnerability Report Introduction This report provides detailed information of every vulnerability that was found and successfully exploited by CORE Impact Professional during

More information

IBM Security QRadar SIEM Version 7.1.0 MR1. Vulnerability Assessment Configuration Guide

IBM Security QRadar SIEM Version 7.1.0 MR1. Vulnerability Assessment Configuration Guide IBM Security QRadar SIEM Version 7.1.0 MR1 Vulnerability Assessment Configuration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks

More information

Check list for web developers

Check list for web developers Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation

More information

AJAX Storage: A Look at Flash Cookies and Internet Explorer Persistence

AJAX Storage: A Look at Flash Cookies and Internet Explorer Persistence AJAX Storage: A Look at Flash Cookies and Internet Explorer Persistence Corey Benninger The AJAX Storage Dilemna AJAX (Asynchronous JavaScript and XML) applications are constantly looking for ways to increase

More information

Enterprise Security Critical Standards Summary

Enterprise Security Critical Standards Summary Enterprise Security Critical Standards Summary The following is a summary of key points in the Orange County Government Board of County Commissioners (OCGBCC) security standards. It is necessary for vendors

More information

Lotus Domino Security

Lotus Domino Security An X-Force White Paper Lotus Domino Security December 2002 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Introduction Lotus Domino is an Application server that provides groupware

More information

Defending Against Attacks by Modeling Threat Behaviors

Defending Against Attacks by Modeling Threat Behaviors Defending Against Attacks by Modeling Threat Behaviors John Benninghoff Transvasive Security Transparent and Pervasive Security 2013 Verizon DBIR Recommendations What can we do about it? Collect, analyze

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

Java Web Application Security

Java Web Application Security Java Web Application Security RJUG Nov 11, 2003 Durkee Consulting www.rd1.net 1 Ralph Durkee SANS Certified Mentor/Instructor SANS GIAC Network Security and Software Development Consulting Durkee Consulting

More information

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security

More information

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security

More information

ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young

ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction

More information

Hacking Database for Owning your Data

Hacking Database for Owning your Data Hacking Database for Owning your Data 1 Introduction By Abdulaziz Alrasheed & Xiuwei Yi Stealing data is becoming a major threat. In 2012 alone, 500 fortune companies were compromised causing lots of money

More information

Common Security Vulnerabilities in Online Payment Systems

Common Security Vulnerabilities in Online Payment Systems Common Security Vulnerabilities in Online Payment Systems Author- Hitesh Malviya(Information Security analyst) Qualifications: C!EH, EC!SA, MCITP, CCNA, MCP Current Position: CEO at HCF Infosec Limited

More information

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to

More information

Where every interaction matters.

Where every interaction matters. Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper

More information

Desktop Release Notes. Desktop Release Notes 5.2.1

Desktop Release Notes. Desktop Release Notes 5.2.1 Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

24x7 Scheduler Multi-platform Edition 5.2

24x7 Scheduler Multi-platform Edition 5.2 24x7 Scheduler Multi-platform Edition 5.2 Installing and Using 24x7 Web-Based Management Console with Apache Tomcat web server Copyright SoftTree Technologies, Inc. 2004-2014 All rights reserved Table

More information

Detecting and Exploiting XSS with Xenotix XSS Exploit Framework

Detecting and Exploiting XSS with Xenotix XSS Exploit Framework Detecting and Exploiting XSS with Xenotix XSS Exploit Framework [email protected] keralacyberforce.in Introduction Cross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s.

More information

McAfee Policy Auditor Content Update Summary. New Checks

McAfee Policy Auditor Content Update Summary. New Checks 2016-Jul-14 McAfee Policy Auditor Content Update Summary Product / Version Content Version McAfee Policy Auditor 6.x 1191 New Checks Oval ID oval:com.mcafee.oval.common:def:2486147 oval:com.mcafee.oval.common:def:2486149

More information

ASL IT Security Advanced Web Exploitation Kung Fu V2.0

ASL IT Security Advanced Web Exploitation Kung Fu V2.0 ASL IT Security Advanced Web Exploitation Kung Fu V2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: There is a lot more in modern day web exploitation than the good old alert( xss ) and union

More information

Rational AppScan & Ounce Products

Rational AppScan & Ounce Products IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168

More information

Student Tech Security Training. ITS Security Office

Student Tech Security Training. ITS Security Office Student Tech Security Training ITS Security Office ITS Security Office Total Security is an illusion security will always be slightly broken. Find strategies for living with it. Monitor our Network with

More information

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003 Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while

More information

FREQUENTLY ASKED QUESTIONS

FREQUENTLY ASKED QUESTIONS FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may

More information

EAS-SEC Project: Securing Enterprise Business Applications

EAS-SEC Project: Securing Enterprise Business Applications EAS-SEC Project: Securing Enterprise Business Applications SESSION ID: SEC-W06 Alexander Polyakov CTO ERPScan @Twitter sh2kerr Alexander Polyakov CTO of the ERPScan inc EAS-SEC.org President Business application

More information

Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities?

Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities? ANALYST BRIEF Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities? Author Randy Abrams Tested Products Avast Internet Security 7 AVG Internet Security 2012 Avira Internet Security

More information

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12 Course Page - Page 1 of 12 Windows 7 Enterprise Desktop Support Technician M-50331 Length: 5 days Price: $2,795.00 Course Description This five-day instructor-led course provides students with the knowledge

More information