DATE: July 18 - 19, 2006
LIVE EVENT: A Survey of Computer Forensics Tools ...
LOCATION: San Francisco, CA
Register Now
DATE: 6/22/2006 2:00 p.m. New York / 7:00 ...
WEBINAR: How to Reduce the Cost & Complexity of ...
SPONSORS: PatchLink
Register Now
Home > Topics

Dark Reading Keywords : Perimeter Security : 802.11x  

 Documents in this Topic
News Analysis News Wire
Dark Reading News Analysis: Wireless Requires Flexibility, Security
  June 06, 2006 : Commercial mortgage exec warns not to overlook users' needs
Dark Reading News Analysis: AirMagnet: Life Beyond Security
  May 18, 2006 : Vendor broadens focus in anticipation of a shakeout in wireless intrusion detection market
Archive 
 
News Wire News Analysis
Dark Reading News Feed: TeamF1, AMCC Team Up
  June 05, 2006 : TeamF1 and AMCC announced expanded support of TeamF1's secure networking solutions on AMCC's PowerPC family
Dark Reading News Feed: IMS Imperils Mobile Security
  May 24, 2006 : Security and IP mobility challenges are driving demand for a new category of convergence gateway equipment, according to Unstrung Insider
Archive 
 
Dark Reading's repository of intel on IT security. More of a 'megabase' than a database, Dark Entries lets you dig for information, or share your expertise. The choice is yours, grasshopper.
ENTERPRISE VULNERABILITIES
Vulnerability: ISPConfig ISPConfig
Published: 2006-06-15
Severity: HIGH
Description: Multiple PHP
remote file inclusion
vulnerabilities in ISPConfig
2.2.3 allow remote attackers to
execute arbitrary PHP code via
a URL in the (1)
go_info[isp][classes_root]
parameter in (a)
server.inc.php, and the (2)
go_info[server][classes_root]
parameter in (b) app.inc.php,
(c) login.php, and (d)
trylogin.php.

Vulnerability: Codewalkers ltwCalendar
Published: 2006-06-15
Severity: HIGH
Description: ** DISPUTED **
PHP remote file inclusion
vulnerability in
Ltwcalendar/calendar.php in
Codewalkers Ltwcalendar 4.1.3
allows remote attackers to
execute arbitrary PHP code via
a URL in the
ltw_config[include_dir]
parameter. NOTE: CVE disputes
this claim, since the
$ltw_config[include_dir]
variable is defined as a static
value in an include file before
it is referenced in an
include() statement.

Vulnerability: Amr Talkbox Amr Talkbox
Published: 2006-06-15
Severity: HIGH
Description: ** DISPUTED **
PHP remote file inclusion
vulnerability in talkbox.php in
Amr Talkbox allows remote
attackers to execute arbitrary
PHP code via a URL in the
direct parameter. NOTE: this
issue has been disputed by CVE,
sine the $direct variable is
set to a static value just
before the include statement.

Vulnerability: Cescripts Realty Home Rent
Published: 2006-06-15
Severity: LOW
Description: Cross-site
scripting (XSS) vulnerability
in index.php in Cescripts
Realty Home Rent allows remote
attackers to inject arbitrary
web script or HTML via the
sel_menu parameter.

Vulnerability: Cescripts Realty Room Rent
Published: 2006-06-15
Severity: LOW
Description: Cross-site
scripting (XSS) vulnerability
in index.php in Cescripts
Realty Room Rent allows remote
attackers to inject arbitrary
web script or HTML via the
sel_menu parameter.

POWERFUL INFORMATION
AT YOUR FINGERTIPS
(SPONSORED LINKS)
Application Security  |  Attacks / Exploits / Threats  |  Authentication  |  Browser security  |  Buffer overflows  |  Computer crime  |  Encryption  |  Encryption  |  End-user monitoring   |  Financials  |  Firewalls  |  Host intrusion prevention  |  Host Protection  |  Industry Trends   |  IPS  |  Law enforcement  |  Legal & Regulatory Topics  |  Legislation  |  Malware  |  Managed services  |  Market Research  |  Messaging Security  |  Microsoft  |  NAC  |  Patch management  |  Perimeter Security  |  Phishing  |  Policy management  |  Rootkits  |  Security Administration / Management  |  Security Industry  |  Security Services  |  Social engineering  |  Spyware  |  SSL  |  Storage Security  |  Stored data losses  |  Symantec  |  Trojans  |  User privacy  |  Vendors  |  Viruses  |  VOIP security  |  VPNs  |  Vulnerabilities  |  Vulnerability Management  |  Vulnerability management  |  Web application firewall  |  WLANs  |  Worms
Dark Reader Weekly Newsletter
Dark Reading Daily Newsletter
MORE INFO
Copyright © 2000-2006 Light Reading Inc. - All rights reserved.
RSS FEED  |   ARCHIVE  |   FREE NEWSLETTER  |   ORDER REPRINTS  |   ADVERTISE WITH US  |   TECHWEB  |   CONTACT US  |   USER PREFERENCES  |   HELP
Companies
Aventail (3), CA (3), Check Point (8), Cisco (10), Enterasys (2), F-Secure (2), HP (1), IBM (4), Intel (1), ISS (3), Juniper (6), Lucent (1), McAfee (8), Microsoft (92), Nortel (3), Oracle (4), RSA (3), Secure Computing (1), Sun (3), Symantec (24), Trend Micro (2), VeriSign (3)

Application and Perimeter Security (Sponsored by Microsoft)
802.11x (4), Anomaly detection (2), Anti-spam (8), Application quality assurance (2), Application scanning (6), Auditing (3), Buffer overflows (11), CERT (2), Consultants (1), Cross-site scripting (4), Database encryption (3), Digital vaults (2), DOS (9), EAP/LEAP (1), Email gateways (2), Encryption (7), Filtering (7), Firewalls (28), FIRST (1), HIPAA (10), Host-based IDS (3), Host/server configuration (3), Host/server encryption (1), IDS (4), IDS (16), IM (6), IPS (21), ISO 17799 (4), Key management (5), Least-privilege user (1), License management (3), Malware (54), NAC (24), Network IDS (5), NIST (4), OWASP (2), OWASP (4), Patch management (19), PCI (6), Penetration testing (3), Phishing (30), PKI (3), Rootkits (9), SAML (1), Software metering (1), Source-code auditing (3), SOX (11), SSL (19), VPNs (26), Vulnerability assessment (11), Web App Security Consortium (3), Web App Security Consortium (2), Web application firewall (10), Web services security (10), WLANs (16), Worms (17), WPA (4), XML (3)

Discovery and management
Anomaly detection (2), Application scanning (6), COBIT (5), Consultants (1), Content filtering (9), End-user monitoring (15), Filtering (7), FISMA (4), HIPAA (10), Host intrusion prevention (19), Host-based IDS (3), IDS (16), IDS (4), IPS (21), ISACA (1), ISO 17799 (4), Log aggregation (1), Network IDS (5), OWASP (4), OWASP (2), PCI (6), Penetration testing (3), Penetration testing (2), SAML (1), SIM/SEM (12), Source-code auditing (3), SOX (11), Vulnerability assessment (11), Vulnerability management (21), Web App Security Consortium (3)

Host security
802.11x (4), Anti-spam (8), Antivirus (16), Application quality assurance (2), Authentication (26), Backup security (5), Biometrics (11), Buffer overflows (11), Digital certificates (4), Disk encryption (4), DRM (7), Encryption (3), End-user monitoring (15), File/folder encryption (7), HIPAA (10), Host anti-spam (4), Host anti-spyware (1), Host antivirus (6), Host intrusion prevention (19), Host-based IDS (3), Host/server configuration (3), Host/server encryption (1), Host/server patching (3), IEEE (3), IM (6), ISO 17799 (4), Least-privilege user (1), License management (3), NAC (24), P2P management (2), Patch management (19), PGP (2), Port control (1), Rootkits (9), Single sign-on (9), Smart cards (6), Software metering (1), SOX (11), Spyware (17), TCG (3), Tokens (3), Trojans (21), User privacy (26), Viruses (21), Worms (17), WPA (4)

Security services
Agency application (2), Application quality assurance (2), Application scanning (6), COBIT (5), Consultants (1), FISMA (4), HIPAA (10), ISO 17799 (4), Managed services (23), PCI (6), Penetration testing (2), PKI (3), Policy management (26), SIM/SEM (12), Source-code auditing (3), SOX (11)

Storage Security
AES (4), Backup security (5), COBIT (5), Database encryption (3), DES (1), Digital vaults (2), Disk encryption (4), Encryption (7), File/folder encryption (7), FISMA (4), HIPAA (10), Host/server encryption (1), Identity management (10), ISO 17799 (4), Key management (5), Law enforcement (21), Legislation (28), Offsite backup (3), PCI (6), PKI (3), SOX (11), Stored data losses (16), Triple DES (1), User privacy (26)

Wireless Security
802.11x (4), AES (4), Auditing (3), COBIT (5), DES (1), Digital certificates (4), Digital signatures (2), DOS (9), EAP/LEAP (1), FISMA (4), HIPAA (10), Host/server encryption (1), IEEE (3), IETF (2), ISO 17799 (4), Key management (5), NAC (24), Network IDS (5), PCI (6), Penetration testing (2), PKI (3), Port control (1), Tokens (3), Triple DES (1), VPNs (26), Vulnerability assessment (11), WLANs (16), WPA (4)