Смотрите также связанные темы 23.07.2018 July 22, 2008 New Kerio MailServer virtual appliance is now available with Kerio MailServer 6.5.2 running on CentOS 5.2. kms_vmware_virtual_appliance;Learn more
29.12.2018 Раскрытие важных данных в EMC Secure Remote Services Virtual Edition Удаленный пользователь может раскрыть важные данные.
21.02.2018 CVE-2015-7425 The Data Protection component in the VMware vSphere GUI in IBM Tivoli Storage Manager for Virtual Environments: Data Protection for VMware (aka Spectrum Protect for Virtual Environments) 6.3 before 6.3.2.5, 6.4 before 6.4.3.1, and 7.1 before 7.1.4 and Tivoli Storage FlashCopy Manager for VMware (aka Spectrum Protect Snapshot) 3.1 before 3.1.1.3, 3.2 before 3.2.0.6, and 4.1 before 4.1.4 allows remote attackers to obtain administrative privileges via a crafted URL that triggers back-end function execution.
01.07.2018 Corporate News: Kaspersky Lab Provides Complete Threat Protection With Launch Of Its 2009 Home User Technology Kaspersky Internet Security 2009 All-In-One Security Solution Includes New Virtual Keyboard For Safer Online Banking
06.10.2018 CVE-2008-4279 Unspecified vulnerability in the CPU hardware emulation for 64-bit guest operating systems in VMware Workstation 6.0.x before 6.0.5 build 109488 and 5.x before 5.5.8 build 108000; Player 2.0.x before 2.0.5 build 109488 and 1.x before 1.0.8; Server 1.x before 1.0.7 build 108231; and ESX 2.5.4 through 3.5 allows authenticated guest OS users to gain additional guest OS privileges via unknown vectors that cause "the virtual CPU to jump to an incorrect memory address."
10.02.2018 CVE-2008-6107 The (1) sys32_mremap function in arch/sparc64/kernel/sys_sparc32.c, the (2) sparc_mmap_check function in arch/sparc/kernel/sys_sparc.c, and the (3) sparc64_mmap_check function in arch/sparc64/kernel/sys_sparc.c, in the Linux kernel before 2.6.25.4, omit some virtual-address range (aka span) checks when the mremap MREMAP_FIXED bit is not set, which allows local users to cause a denial of service (panic) via unspecified mremap calls, a related issue to CVE-2008-2137.
14.03.2018 CVE-2009-0824 Elaborate Bytes ElbyCDIO.sys 6.0.2.0 and earlier, as distributed in SlySoft AnyDVD before 6.5.2.6, Virtual CloneDrive 5.4.2.3 and earlier, CloneDVD 2.9.2.0 and earlier, and CloneCD 5.3.1.3 and earlier, uses the METHOD_NEITHER communication method for IOCTLs and does not properly validate a buffer associated with the Irp object, which allows local users to cause a denial of service (system crash) via a crafted IOCTL call.
09.04.2018 Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA Adaptive Security Appliance and Cisco PIX Security Appliances -----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA AdaptiveSecurity Appliance and Cisco PIX Security AppliancesAdvisory ID: cisco-sa-20090408-asahttp://www.cisco.com/warp/public/707/cisco-sa-20090408-asa.shtmlRevision 1.0For Public Release 2009 April 08 1600 UTC (GMT)Summary=======Multiple vulnerabilities exist in the Cisco ASA 5500 Series AdaptiveSecurity Appliances and Cisco PIX Security Appliances. This securityadvisory outlines the details of these vulnerabilities: * VPN Authentication Bypass when Account Override F...
22.05.2018 CVE-2009-1785 Cross-site scripting (XSS) vulnerability in Ulteo Open Virtual Desktop 1.0 allows remote attackers to inject arbitrary web script or HTML via the error parameter to header.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
23.04.2018 Kerio MailServer Achieves VMware Ready Status SAN JOSE, Calif., — March 9, 2009 — Kerio Technologies, Inc., a leading provider of award-winning Internet security and messaging solutions and select member of the VMware Technology Alliance Partner (TAP) program, is announcing the immediate availability of the Kerio MailServer Virtual Appliance, which has achieved VMware Ready status. This designation indicates that Kerio MailServer Virtual Appliance has passed a detailed evaluation and testing process managed by VMware.
|