Смотрите также связанные темы 07.06.2018 CVE-2010-1439 yum-rhn-plugin in Red Hat Network Client Tools (aka rhn-client-tools) on Red Hat Enterprise Linux (RHEL) 5 and Fedora uses world-readable permissions for the /var/spool/up2date/loginAuth.pkl file, which allows local users to access the Red Hat Network profile, and possibly prevent future security updates, by leveraging authentication data from this file.
09.11.2018 Антивирусники обвиняют Microsoft в недобросовестной конкуренции Не всем конкурентам понравилось, что бесплатный антивирус Security Essentials стал распространяться в рамках системы обновлений Microsoft Update. Далее
27.05.2018 Kerio Control 7 Raises the Bar For Network Security Management SAN JOSE, California – June 1, 2010 – Kerio Technologies today unveils the latest evolution of its gateway security product line, Kerio Control. Building upon Kerio WinRoute Firewall’s 13-year heritage, the new UTM server solution and software appliance offers network administrators complete network security and a wealth of tools to manage user access and optimize performance. Equipped with an embedded IDS/IPS engine, Kerio Control provides comprehensive management of rapidly evolving security threats.
10.09.2018 CVE-2008-3012 gdiplus.dll in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 does not properly perform memory allocation, which allows remote attackers to execute arbitrary code via a malformed EMF image file, aka "GDI+ EMF Memory Corrupt...
21.10.2018 The First Security Innovation Alliance Developer Conference McAfee hosted its first Security Innovation Alliance (SIA) Developer Conference today at the MGM Grand in Las Vegas, in conjunction with FOCUS 08, to help expand our partners understanding of the tools and processes that comprise the heart and soul of the SIA. Though our program is barely a year old, we’ve made some [...]
24.10.2018 Corporate News: Kaspersky Lab strongly recommends installing new Windows update Kaspersky Lab, a leading developer of secure content management solutions, is notifying computer users about the need to install the Windows operating system update MS08-067 (http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx). The vulnerability that this new update patches is a...
28.10.2018 Corporate News: Kaspersky Lab Recommends Microsoft Windows Users Urgently Install New Windows Update to Remain Safe Online Failure To Run The Update Or Not Being Protected With Up To Date Internet Security May Leave Users Vulnerable To Attack
Kaspersky Lab, a leading provider of Internet security software solutions that protect against viruses, Trojans, worms, spyware, crimeware, rootkits, phishing, hacker attacks...
07.11.2018 Network Risk Control Tim Greene at Network World just issued a nice story in support of the notion that NAC can be a sort of ‘backstop’ to security tools.
NAC is supposed to do a lot of things and once it’s installed, customers are finding that NAC often does even more than they bargained for.
For instance, NAC can act [...]
25.03.2018 CVE-2009-1107 The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier, and 5.0 Update 17 and earlier, allows remote attackers to trick a user into trusting a signed applet via unknown vectors that misrepresent the security warning dialog, related to a "Swing JLabel HTML parsing vulnerability," aka CR 6782871.
02.04.2018 CVE-2009-1227 ** DISPUTED ** NOTE: this issue has been disputed by the vendor. Buffer overflow in the PKI Web Service in Check Point Firewall-1 PKI Web Service allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) Authorization or (2) Referer HTTP header to TCP port 18624. NOTE: the vendor has disputed this issue, stating "Check Point Security Alert Team has analyzed this report. We've tried to reproduce the attack on all VPN-1 versions from NG FP2 and above with and without HFAs. The ...
|
|