Oracle has revealed that it is going to fix a total of 40 vulnerabilities in Java SE today out of which 37 can be exploited remotely without the need of a username and password.
[Update 07/06/2013 13:00 GMT]: Parallels has issued a statement saying that the latest vulnerability so disclosed is a variant of an old vulnerability and that currently support version of Plesk viz. 9.5, 10.X and 11.X are not vulnerable.
KingCope, a hacker known for many concrete exploits, has published yet another zero-day through full disclosure mailing list – this time for Plesk, a hosting software package made by Parallels and used on thousands of servers across the web.
Highly popular enterprise email and workgroup solution IBM Notes/Domino has a huge security vulnerability that allows for installation of spyware on a client system by doing as little as opening an email.
Researchers over at McAfee Labs have uncovered a zero-day vulnerability in Adobe Reader contained in every version of the PDF reader including the latest Reader XI (11.0.2).
Exploit for one of the dozens of critical vulnerabilities patched through Java 7 Update 21 by Oracle last week has already started appearing in the wild and has reportedly found its way into different exploit kits.
Oracle has announced today that it is set to release a total of 128 fixes that address security vulnerabilities in ‘hundreds’ of its products.
Ubisoft’s uPlay is seemingly riddled with some vulnerability which Russian hackers have successfully exploited thereby gaining completely free access to the not yet released Far Cry 3: Blood Dragon.
PostgreSQL database has a ‘sufficiently bad’ security vulnerability because of which its developers have announced that they have locked down access to database’s repositories while they are fixing the issue.
Cisco’s latest attempt to make hashed values of passwords more robust against attacks specifically the brute force attacks hasn’t gone the right way thereby inadvertently weakening the security of its own appliances.
Most of the security appliances in use today ranging from software based firewalls to state of the art Unified Threat Management (UTM) systems and email and web gateways are packed with serious vulnerabilities it has been revealed.