Смотрите также связанные темы 09.04.2018 Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA Adaptive Security Appliance and Cisco PIX Security Appliances -----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA AdaptiveSecurity Appliance and Cisco PIX Security AppliancesAdvisory ID: cisco-sa-20090408-asahttp://www.cisco.com/warp/public/707/cisco-sa-20090408-asa.shtmlRevision 1.0For Public Release 2009 April 08 1600 UTC (GMT)Summary=======Multiple vulnerabilities exist in the Cisco ASA 5500 Series AdaptiveSecurity Appliances and Cisco PIX Security Appliances. This securityadvisory outlines the details of these vulnerabilities: * VPN Authentication Bypass when Account Override F...
05.06.2018 Virus.Win32.Gpcode.ak Kaspersky Lab has detected a new version of the ‘malicious blackmailer’ Gpcode - Virus.Win32.Gpcode.ak.
20.09.2018 [ MDVSA-2008:199 ] wireshark A number of vulnerabilities were discovered in Wireshark that could
cause it to crash while processing malicious packets (CVE-2008-3146,
CVE-2008-3932, CVE-2008-3933, CVE-2008-3934).
27.10.2018 [ MDVSA-2008:215 ] wireshark A number of vulnerabilities were discovered in Wireshark that could
cause it to crash or abort while processing malicious packets
(CVE-2008-4680, CVE-2008-4681, CVE-2008-4682, CVE-2008-4683,
CVE-2008-4684, CVE-2008-4685).
25.12.2018 Security Vulnerability in Solaris IP Tunnel Parameter Processing May Lead to a System Panic or Possible Execution of Arbitrary Code by Unprivileged Users A security vulnerability in the Solaris 10 IP tunnel parameter processing (see tun(7M)) may allow a local unprivileged user the ability to panic the system or execute arbitrary commands with all (super-user) privileges.
13.01.2018 Multiple Security Vulnerabilities in the Flash Player Plugin for Solaris Multiple security vulnerabilities in the Flash Player plugin distributed with Solaris may allow a remote unprivileged user the ability to execute arbitrary code with the privileges of a local user on the system while loading a malicious SWF file with the affected plugin.
28.10.2018 NetBSD Security Advisory 2008-015: ICMPv6 Packet Too Big messages -----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1 NetBSD Security Advisory 2008-015 =================================Topic: ICMPv6 Packet Too Big messagesVersion: NetBSD-current: affected NetBSD 4.0.*: not affected NetBSD 4.0: &...
03.02.2018 2009-02-02 - [slackware-security] xdg-utils (SSA:2009-033-01) -----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1[slackware-security] xdg-utils (SSA:2009-033-01)New xdg-utils packages are available for Slackware 12.2 and -current tofix security issues. Applications that use /etc/mailcap could be trickedinto running an arbitrary script through xdg-open, and a separate flaw inxdg-open could allow the execution of arbitrary commands embedded in untrustedinput provided to xdg-open.More details about the issues may be found in the CommonVulnerabilities and Exposures (CVE) database: http://cve.mitre.org/cgi-bin/cvename...
23.03.2018 CVE-2009-0584 icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code by using a device file for processing a crafted image file associated with large integer values for certain sizes, related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.
09.04.2018 Critical Infrastructure Attacks Aren’t Science Fiction It’s a scary story reminiscent of the cold war era that sounds like it comes right out of a science fiction novel: Spies linked to Russia and China penetrated the U.S. electrical grid.
The cyberspies have left behind software programs that could be used to disrupt the system, according a report Wednesday on the front page [...]
|