Monday, May 24, 2010

Microsoft Vulnerability http://bit.ly/bnaspi
Solaris 10 Vulnerability http://bit.ly/c16Bxz
PostgreSQL Vulnerability http://bit.ly/d8cafw
Juniper Vulenrability: Mask Hostnames While Browsing http://bit.ly/c8D92K
Flash: Version 10.0 Denial Of Service Vulenrability http://bit.ly/a9gL1S
Kerberos Vulnerability http://bit.ly/8Z62AX
MAC: OS X 10.6 Update 2 Arbitrary Code Execution Vulnerability http://bit.ly/a9n42c
MAC: OS X 10.5 Update 7 Java Vulnerability http://bit.ly/bdAaAF
HP: System Management Homepage Vulnerability http://bit.ly/9pzysV
HP: Broadcom NIC Remote Execution of Arbitrary Code Vulnerability http://bit.ly/bZnBFT
HP: Unauthorized Access Vulnerability http://bit.ly/9ardvZ
HP-UX: ONCPlus DOS Vulnerability http://bit.ly/bpApkV
Joomla: XSS Vulnerability in JComments http://bit.ly/awqX8O
NPDS: XSS Vulnerability http://bit.ly/bIOche
Firefox: Memory Exhaustion Crash Vulnerability http://bit.ly/blUzuF
Resin: Digest.php Cross Site Scripting Vulnerability http://bit.ly/9ejD1U
Pidgin: DOS Attack Vulnerability http://bit.ly/9lsBme
KDenetWork4: Directory Traversal Vulnerability http://bit.ly/dpHmKV
Wireshark: Security Vulnerability Update http://bit.ly/bat0CK
Kerberos: GSS-API Lib Null Pointer Deref Vulnerability http://bit.ly/cDPgSo
Vulnerability: DOS in Firefox, IE, Chrome, Opera, and others http://bit.ly/cqMJx1
Red Hat: krb5 Security Vulnerability Update http://bit.ly/bg8S5P
Ubuntu: X.org Vulnerability http://bit.ly/dkGXz4
GhostScript: Parser Funcationality Vulnerability Clarification http://bit.ly/bnAXVM
Pidgin: Packages Released To Fix Vulnerability http://bit.ly/doY1TD
Aria2: Directory Traversal Vulnerability http://bit.ly/cb6Vdg
HP: OpenVMS TCP/IP Services Denial of Service Vulnerability http://bit.ly/ceyAIC
IPhone: Data Protection Vulnerability http://bit.ly/caJFfT
Joomla: Simple Download Local File Inclusion Vulnerability http://bit.ly/dsDAEb
Mandriva: Tetex, Multiple Buffer Overflow Vulnerabilities http://bit.ly/9AmyzR
Fetchmail: vulnerability http://bit.ly/dfEB7m
HTTP: Multiple Client Unexpected Download Filename Vulnerability http://bit.ly/cxXJAw
SpringSource: Unauthenticated Remote Access Vulnerability http://bit.ly/bii8L0

Saturday, May 15, 2010

PHP Groupware: Multiple Vulnerabilities http://bit.ly/akVt3L
Kapitalist: Multiple Vulnerabilities http://bit.ly/b5AseX
HP: Windows MFP Digital Software, Local Unauthorized Access Vulnerability http://bit.ly/bRZNzX
NPDS Revolution: Blind SQL Injection Vulnerability http://bit.ly/bbqwvu
NPDS Revolution: XSS Vulnerability http://bit.ly/9zJ67z
Joomla: Component Advertising File Inclusion Vulnerability http://bit.ly/9v0WsV
LinksAutomation: Multiple Remote Vulnerabilities http://bit.ly/b4jBhI
Kassler CMS: TagCloud Vulnerability http://bit.ly/adXufd

Friday, May 14, 2010

Mathematica: Mathematica on Linux /tmp/MathLink vulnerability http://bit.ly/aA0UQv
Adobe: Shockwave Player Director File Parsing ATOM size infinite loop vulnerability http://bit.ly/9F329v
Cisco: Multiple vulnerabilities in Cisco PGW Softswitch http://bit.ly/d3tVIG

Thursday, May 13, 2010

Vulnerability Management: What Vulnerability Management Solution Are You Using? http://bit.ly/cK1d5m
Ubuntu: KDENetwork vulnerability http://bit.ly/cfbths
KDE: KGet Insecure File Operation Vulnerability http://bit.ly/chCcRF
Aria: metalink "name" Directory Traversal Vulnerability http://bit.ly/bFINLo
KDE: KGet metalink "name" Directory Traversal Vulnerability http://bit.ly/9inULo
Vulnerability Management: Libxext Vulnerability http://bit.ly/8YW6rB

Vulnerability Management: Welcome to Critical Watch’s Blogger

A Vulnerability Management Leader

Founded by security practitioners with years of experience managing security for sensitive and complex IT environments, Critical Watch delivers award winning security and compliance technology to large and small enterprises world wide. Its patented assessment engine drives its FusionVM solution that is offered as a remotely hosted Software as a Service (SaaS) or as a premise-based product. Founded in 2000, and headquartered in Dallas, Texas, customers span verticals such as healthcare, energy, ecommerce, IT outsourcing and financial services. There are multiple additional patents pending on the Critical Watch technology. Critical Watch has grown profitably since 2001 and was recently named a Hot Company at the Technosium 2009 Executive Summit.

To learn more give us a call today to setup a free trial at 1-866-525-8680 or visit our website at http://www.criticalwatch.com/.