Summary
Over the past week published information about the closure of a number of vulnerabilities. The most up-to-date update is required for Microsoft and Adobe products.
Among the most critical vulnerabilities are remote execution of arbitrary code in Microsoft Internet Explorer versions 6 to 10, Microsoft .NET Framework from 2 to 4.5, Silverlight 5, as well as Adobe ColdFusion 10 and Adobe Flash Player; privilege elevation in Microsoft Windows and Windows Defender.
In open access, there are published exploits for executing arbitrary code in Corel PDF Fusion, exploits for Google Chrome, AOL Instant Messenger and Huawei 3G Mobile Hotspot, as well as examples for executing SQL injection and XSS in McAfee ePO anti-virus control panels.
')
In the statistics of mass and targeted attacks, more than half (52%) of the detected exploits fall within the vulnerability of CVE-2010-0188 in Adobe Reader. Among the rest of the exploits, most are aimed at exploiting various Java vulnerabilities.
The materials for technical specialists include analysis of the code for APK substitution with preservation of digital signatures on Android devices, the basics of investigating incidents in Linux OS, analyzing a number of vulnerabilities in popular services, and releasing a utility for parsing PE files that have a built-in disassembler.
In the news - a brief overview of the current situation with the zero-day exploit market for government structures, recent opinions and political events in the cyber confrontation of the USA and China, an interesting study and review of technologies and an open-source distribution for “backward penetration” and tracking of attackers, as well as marketing solutions and search creators Styx Exploit Pack.
The full version of the report is available
at the link in PDF format.