Смотрите также связанные темы 18.01.2018 Attending a Top Level Political-Economic Event? Beware the Cyber-spies targeting your Mobile As the World Economic Forum in Davos approaches, Kaspersky Lab experts want to warn attendees about the risk of cyber-espionage attacks using malware designed for mobile devices.
27.02.2018 CVE-2016-2521 Untrusted search path vulnerability in the WiresharkApplication class in ui/qt/wireshark_application.cpp in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 on Windows allows local users to gain privileges via a Trojan horse riched20.dll.dll file in the current working directory, related to use of QLibrary.
13.03.2018 CVE-2016-1963 The FileReader class in Mozilla Firefox before 45.0 allows local users to gain privileges or cause a denial of service (memory corruption) by changing a file during a FileReader API read operation.
06.05.2018 One-In-Ten Have Lost Money by Being Targeted Online XX May 2016 With the diversity and quantity of online financial threats increasing, recent research from Kaspersky Lab and B2B International has found that 48% of consumers have been targeted by scams designed to defraud and trick them into revealing sensitive and financial information for criminal gain
25.08.2018 CVE-2008-3778 The remote management interface in SIP Enablement Services (SES) Server in Avaya SIP Enablement Services 5.0, and Communication Manager (CM) 5.0 on the S8300C with SES enabled, proceeds with Core router updates even when a login is invalid, which allows remote attackers to cause a denial of service (messaging outage) or gain privileges via an update request.
10.09.2018 CVE-2008-4018 swcons in bos.rte.console in IBM AIX 5.2.0 through 6.1.1 allows local users in the system group to create or overwrite an arbitrary file, and establish weak permissions and root ownership for this file, via unspecified vectors. NOTE: this can be leveraged to gain privileges. NOTE: this issue exists because of an incomplete fix for CVE-2007-5805.
06.10.2018 CVE-2008-4279 Unspecified vulnerability in the CPU hardware emulation for 64-bit guest operating systems in VMware Workstation 6.0.x before 6.0.5 build 109488 and 5.x before 5.5.8 build 108000; Player 2.0.x before 2.0.5 build 109488 and 1.x before 1.0.8; Server 1.x before 1.0.7 build 108231; and ESX 2.5.4 through 3.5 allows authenticated guest OS users to gain additional guest OS privileges via unknown vectors that cause "the virtual CPU to jump to an incorrect memory address."
23.10.2018 A Security Vulnerability in the Sun Integrated Lights-Out Manager (ILOM) may Allow Unauthorized Access Through the Web Interface A security vulnerability in the Sun Integrated Lights-Out Manager (ILOM) may allow unprivileged users who have access to the ILOM web interface to gain unauthorized access to the service processor (SP).
28.10.2018 Security Vulnerability in the Search Feature of the Sun Java System LDAP JDK A security vulnerability in the search feature of the Sun Java System LDAP JDK may allow local unprivileged users to gain access to unauthorized information from applications that use the LDAP JDK library.
12.12.2018 A Security Vulnerability in Solaris Secure Shell (SSH) May Expose Some Plain Text From Encrypted Traffic A security vulnerability in the Solaris Secure Shell (SSH) software (see ssh(1)), when used with CBC-mode ciphers and (SSH protocol version 2), may allow a remote unprivileged user who is able to intercept SSH network traffic to gain access to a portion of plain text information from intercepted traffic which would otherwise be encrypted.
|