Смотрите также связанные темы 26.11.2018 CVE-2015-6848 EMC Isilon OneFS 7.1.x before 7.1.1.5, 7.2.0.x before 7.2.0.3, and 7.2.1.x before 7.2.1.1, when the RFC 2307 feature is configured but SFU is not universally present, allows remote authenticated AD users to obtain root privileges via unspecified vectors.
19.08.2018 В Windows активно эксплуатируется уязвимость нулевого дня Удачная эксплуатация уязвимости позволит злоумышленнику выполнить произвольный код на целевой системе с привилегиями пользователя, запустившего приложение.
19.11.2018 CVE-2012-5519 CUPS 1.4.4, when running in certain Linux distributions such as Debian GNU/Linux, stores the web interface administrator key in /var/run/cups/certs/0 using certain permissions, which allows local users in the lpadmin group to read or write arbitrary files as root by leveraging the web interface.
04.12.2018 CVE-2012-5975 The SSH USERAUTH CHANGE REQUEST feature in SSH Tectia Server 6.0.4 through 6.0.20, 6.1.0 through 6.1.12, 6.2.0 through 6.2.5, and 6.3.0 through 6.3.2 on UNIX and Linux, when old-style password authentication is enabled, allows remote attackers to bypass authentication via a crafted session involving entry of blank passwords, as demonstrated by a root login session from a modified OpenSSH client with an added input_userauth_passwd_changereq call in sshconnect2.c.
03.12.2018 2009-12-02 - [slackware-security] bind (SSA:2009-336-01) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] bind (SSA:2009-336-01) New bind packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, 11.0, 12.0, 12.1, 12.2, 13.0, and -current to fix a security issue. More details about this issue may be found here: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4022 http://www.kb.cert.org/vuls/id/418861 Here are the details from the Slackware 13.0 ChangeLog: +--------------------------+ Wed Dec 2 20:51:55 UTC 2009 patches/packages/bind-9.4.3_P4-i486-...
09.12.2018 2009-12-08 - [slackware-security] kernel (SSA:2009-342-01) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] kernel (SSA:2009-342-01) New Linux kernel packages are available for Slackware 13.0 and -current to address a security issue. A kernel bug discovered by David Ford may allow remote attackers to crash the kernel by sending an oversized IP packet. While the impact on ordinary servers is still unclear (the problem was noticed while running openvasd), we are issuing these kernel packages as a preemptive measure. For more information, see: http://cve.mitre.o...
10.12.2018 2009-12-10 - [slackware-security] ntp (SSA:2009-343-01) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] ntp (SSA:2009-343-01) New ntp packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, 11.0, 12.0, 12.1, 12.2, 13.0, and -current to fix a security issue. If a spoofed mode 7 packet is sent to a vulnerable NTP daemon it may cause CPU and/or disk space exhaustion, resulting in a denial of service. More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3563 Her...
12.12.2018 2009-12-11 - [slackware-security] gimp (SSA:2009-345-01) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] gimp (SSA:2009-345-01) New gimp packages are available for Slackware 12.1, 12.2, 13.0, and -current to fix security issues. More details about these issues may be found in the Common Vulnerabilities and Exposures (CVE) database: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1570 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3909 Here are the details from the Slackware 13.0 ChangeLog: +--------------------------+ patches/packages/gimp-2.6.8-i486-1...
19.12.2018 2009-12-18 - [slackware-security] seamonkey (SSA:2009-352-01) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] seamonkey (SSA:2009-352-01) New seamonkey packages are available for Slackware 12.2, 13.0, and -current to fix security issues. More details about the issues may be found on the Mozilla web site: http://www.mozilla.org/security/known-vulnerabilities/seamonkey20.html Here are the details from the Slackware 13.0 ChangeLog: +--------------------------+ patches/packages/seamonkey-2.0.1-i486-1_slack13.0.txz: Upgraded. Upgraded to seamonkey-2.0.1 shared libraries. pa...
06.01.2018 2010-01-05 - [slackware-security] mozilla-firefox (SSA:2009-351-01) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] mozilla-firefox (SSA:2009-351-01) New mozilla-firefox packages are available for Slackware 12.2, 13.0, and -current to fix security issues. The Firefox 3.0.16 package may also be used with Slackware 11.0 or newer. More details about the issues may be found on the Mozilla website: http://www.mozilla.org/security/known-vulnerabilities/firefox30.html http://www.mozilla.org/security/known-vulnerabilities/firefox35.html Here are the details from the Slackware 13.0 ChangeLog: +--...
|
|