Смотрите также связанные темы 04.09.2018 2008-09-03 - [slackware-security] php (SSA:2008-247-01) -----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1[slackware-security] php (SSA:2008-247-01)New php packages are available for Slackware 10.2 and 11.0 to fix securityissues. These releases are the last to contain PHP 4.4.x, which was upgradedto version 4.4.9 to fix PCRE issues and other bugs.Please note that this is the FINAL release of PHP4, and it has already passedthe announced end-of-life. Sites should seriously consider migrating to PHP5rather than upgrading to php-4.4.9.Here are the details from the Slackware 11.0 ChangeLog:+------------------------...
02.04.2018 CVE-2009-1227 ** DISPUTED ** NOTE: this issue has been disputed by the vendor. Buffer overflow in the PKI Web Service in Check Point Firewall-1 PKI Web Service allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) Authorization or (2) Referer HTTP header to TCP port 18624. NOTE: the vendor has disputed this issue, stating "Check Point Security Alert Team has analyzed this report. We've tried to reproduce the attack on all VPN-1 versions from NG FP2 and above with and without HFAs. The ...
25.09.2018 2010-09-22 - [slackware-security] 64-bit kernel (SSA:2010-265-01) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] 64-bit kernel (SSA:2010-265-01) New kernel packages are available for Slackware x86_64 13.1, and -current to fix security issues. Here are the details from the Slackware64 13.1 ChangeLog: +--------------------------+ patches/packages/linux-2.6.33.4-2/kernel-firmware-2.6.33.4-noarch-2.txz: Rebuilt. patches/packages/linux-2.6.33.4-2/kernel-generic-2.6.33.4-x86_64-2.txz: Rebuilt. This kernel has been patched to fix security problems on x86_64:  ...
12.06.2018 Think you’re compliant? Can you prove it? For years, enterprises have stretched their budgets and their IT staffs to comply with government regulations and created internal policies designed to protect customers and employees. Myriad point products and proprietary standards have sprung up, prolonging and complicating the audit process. The question these companies must now ask themselves now is “how can we prove [...]
29.07.2018 Новости компании Agnitum (июль 2008)
09.12.2018 Kaspersky Security Bulletin 2015. Развитие угроз в 2015 году Традиционно конец года – это время для размышлений, время для переосмысления жизни и мыслей о будущем. Мы бы хотели предложить наш обычный обзор основных событий, которые формировали ландшафт информационных угроз в 2015 г.
03.01.2018 CVE-2015-4946 Rational LifeCycle Project Administration in Jazz Team Server in IBM Rational Collaborative Lifecycle Management (CLM) 3.x and 4.x before 4.0.7 IF9, 5.x before 5.0.2 IF9, and 6.x before 6.0.1; Rational Quality Manager (RQM) 3.x before 3.0.1.6 IF7, 4.x before 4.0.7 IF9, 5.x before 5.0.2 IF9, and 6.x before 6.0.1; Rational Team Concert (RTC) 3.x before 3.0.1.6 IF7, 4.x before 4.0.7 IF9, 5.x before 5.0.2 IF9, and 6.x before 6.0.1; Rational Requirements Composer (RRC) 3.x before 3.0.1.6 IF7 and 4.x before 4.0.7 IF9; Rational DOORS Next Generation (RDNG) 4.x ...
07.01.2018 В серию Team Group Dark Pro вошли наборы модулей памяти DDR4-3000, DDR4-3200 и DDR4-3300 Компания Team Group объявила о выпуске наборов модулей памяти DDR4 Dark Pro, предназначенных для игровых ПК на платформе Intel Skylake. Модули объемом 4 и 8 ГБ предложены в наборах по две штуки суммарным объемом 8 и 16 ГБ. Они рассчитаны на напряжение питания 1,35 В и работают с задержками CL15-15-15-35 (DDR4-3000), CL16-16-16-36 (DDR4-3200) и CL17-18-18-39 (DDR4-3333). Модули оснащены алюминиевыми радиаторами. По словам производителя, новые модули протестированы на совместимость с системными платами Asus Maximus VIII Hero. На них предоставляется пожизненная гарантия. Источник: Team Grou...
05.06.2018 Virus.Win32.Gpcode.ak Kaspersky Lab has detected a new version of the ‘malicious blackmailer’ Gpcode - Virus.Win32.Gpcode.ak.
03.02.2018 Email-Worm.Win32.Zhelatin.o Kaspersky Lab has detected a mass mailing of Email-Worm.Win32.Zhelatin.o, which is spreading as an attachment to infected emails.
|