Latest Arbitrary code execution Stories

2013-09-09 23:04:51

Trustlook releases a dynamic detection solution for the Android WebView AddJavascriptInterface Remote Code Execution vulnerability within only 12 hours. San Francisco, CA (PRWEB) September 09, 2013 Trustlook, Inc., providers of innovative next-generation mobile security solutions for the enterprise industry, announced today that within twelve hours of the malware’s initial report, the company has released a dynamic detection solution for the Android WebView AddJavascriptInterface Remote...

2010-12-23 12:30:00

Microsoft has issued a new warning about severe vulnerability issues with all versions of its widely-popular Internet Explorer (IE) browser, saying booby-trapped webpages could allow attackers to take control of an unprotected computer. BBC News reports that code to exploit the bug has already been published, though Microsoft said it had no evidence that the malicious strain was currently being used by hi-tech criminals. While Microsoft works on a permanent fix for the issue, it has...

2010-12-14 13:00:00

SUNNYVALE, Calif., Dec. 14, 2010 /PRNewswire/ -- Palo Alto Networks(TM), the network security company, today announced that its Threat Research Team has discovered two vulnerabilities in today's Microsoft Patch Tuesday security bulletin, both of which could allow for remote code execution using Microsoft Office graphics filters. Microsoft credited Palo Alto Networks' Threat Research Team with finding CVE-2010-3945 (CGM Image Converter Buffer Overrun Vulnerability) and CVE-2010-3946 (PICT...

2009-10-13 14:59:00

SUNNYVALE, Calif., Oct. 13 /PRNewswire/ -- Palo Alto Networks(TM), the leader in next-generation firewalls, today announced that its Threat Research Team discovered three vulnerabilities, two of which are rated as "critical," that Microsoft has published in its Patch Tuesday security bulletin today. Vulnerable systems are susceptible to an attacker taking complete control of them. Microsoft credits Palo Alto Networks' Threat Research Team for identifying the following three...

2008-08-14 12:00:28

Palo Alto Networks today announced that its Threat Research Team discovered two of the 11 vulnerabilities discovered in Microsoft's Patch Tuesday security bulletin this week. The first discovery is an Internet Explorer vulnerability rated "critical." Microsoft credited Palo Alto Networks exclusively for the "HTML Object Memory Corruption Vulnerability" (CVE-2008-2254), which could enable an attacker to exploit the vulnerability by constructing a specially crafted Web page. When a user...

Word of the Day
  • A spider.
  • Figuratively, a peevish, testy, ill-natured person.
'Attercop' comes from the Old English 'atorcoppe,' where 'atter' means 'poison, venom' and‎ 'cop' means 'spider.' 'Coppa' is a derivative of 'cop,' top, summit, round head, or 'copp,' cup, vessel, which refers to 'the supposed venomous properties of spiders,' says the OED. 'Copp' is still found in the word 'cobweb.'