11 retweets 14 favorites
Original release date: October 22, 2014 Microsoft has released a security advisory to provide recommended mitigations for an unpatched vulnerability, ( CVE-2014-6352 ) which affects all Microsoft Windows releases except Windows Server 2003. This vulnerability could allow an attacker to take control of an affected system if a user opens a specially crafted Microsoft Office file
This demonstration shows how to install and configure McAfee Email Gateway physical and virtual appliances. More Information can be found on the expertcenter page for email: http://mcafee.com/expe …
As part of most vulnerability assessments and penetration tests against a website, we almost always run some kind of scanner. Burp (commercial) and ZAP (free from OWASP) are two commonly used scanners. Once youve done a few website assessments, you start to get a feel for what pages and fields are likely candidates for exploit.
This demo video explains the difference between policies and tasks. It shows how to create a VirusScan Enterprise “On Demand Scan” task through ePO
Vulnerability Note VU#577193 POODLE vulnerability in SSL 3.0 Original Release date: 17 Oct 2014 | Last revised: 17 Oct 2014 Overview Many modern TLS clients can fall back to version 3.0 of the SSL protocol, which is vulnerable to a padding-oracle attack when Cypher-block chaining (CBC) mode is used. This is commonly referred to as the “POODLE” (Padding Oracle On Downgraded Legacy Encryption) attack
Original release date: October 17, 2014 Drupal has released a security advisory to address an application program interface (API) vulnerability ( CVE-2014-3704 ) that could allow an attacker to execute arbitrary SQL commands on an affected system. This vulnerability affects all Drupal core 7.x versions prior to 7.32. US-CERT advises users and administrators review Drupal’s Security Advisory and apply the necessary update or patch.