Смотрите также связанные темы 02.02.2018 Organizations responsible for third party security? A new Massachusetts law called 201 CMR 17.00 from the Office of Consumer Affairs and Business Regulation (OCABR) was passed in order to add additional protection requirements around personal information disclosure. This new regulation is specifically targeted to reduce the incidence of identity theft that comes from personal data maintained by businesses and organizations that do business in Massachusetts. This regulation is an extension of [...]
09.01.2018 CVE-2013-0001 The Windows Forms (aka WinForms) component in Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.0 SP2, 4, and 4.5 does not properly initialize memory arrays, which allows remote attackers to obtain sensitive information via (1) a crafted XAML browser application (XBAP) or (2) a crafted .NET Framework application that leverages a pointer to an unmanaged memory location, aka "System Drawing Information Disclosure Vulnerability."
25.02.2018 CVE-2010-0705 Aavmker4.sys in avast! 4.8 through 4.8.1368.0 and 5.0 before 5.0.418.0 running on Windows 2000 and XP does not properly validate input to IOCTL 0xb2d60030, which allows local users to cause a denial of service (system crash) or execute arbitrary code to gain privileges via IOCTL requests using crafted kernel addresses that trigger memory corruption.
04.06.2018 Kerio Executive to Lead Mobile Email Session at Microsoft Tech-Ed North America 2008 IT Professionals Conference SAN JOSE, CA--(Marketwire - June 4, 2008) - Kerio Technologies, Inc., a provider of award-winning internet security and messaging software, today announced it will lead a Birds-of-a-Feather session at Tech-Ed North America 2008 IT Professionals Conference. Attendees will learn how to have a collaboration-centric enterprise infrastructure that has the freedom to choose virtually any email and calendar application and be able to synchronize data throughout the organization.
WHAT: Birds-of-a-Feather (BOF) Session titled, "Extending the Desktop to Mobile Devices Anytime, Anywhere"
WHO: Chris Pel...
17.01.2018 CVE-2015-4958 IBM InfoSphere Master Data Management - Collaborative Edition 9.1, 10.1, 11.0 before 11.0.0.0 IF11, 11.3 before 11.3.0.0 IF7, and 11.4 before 11.4.0.4 IF1 does not properly restrict browser caching, which allows local users to obtain sensitive information by reading cache files.
27.02.2018 CVE-2016-2521 Untrusted search path vulnerability in the WiresharkApplication class in ui/qt/wireshark_application.cpp in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 on Windows allows local users to gain privileges via a Trojan horse riched20.dll.dll file in the current working directory, related to use of QLibrary.
22.08.2018 CVE-2008-3775 Folder Lock 5.9.5 and earlier uses weak encryption (ROT-25) for the password, which allows local administrators to obtain sensitive information by reading and decrypting the QualityControl_pack registry value.
27.08.2018 CVE-2008-3851 Multiple directory traversal vulnerabilities in Pluck CMS 4.5.2 on Windows allow remote attackers to include and execute arbitrary local files via a .. (dot dot backslash) in the (1) blogpost, (2) cat, and (3) file parameters to data/inc/themes/predefined_variables.php, as reachable through index.html; and the (4) blogpost and (5) cat parameters to data/inc/blog_include_react.php, as reachable through index.html. NOTE: the issue involving vectors 1 through 3 reportedly exists because of an incomplete fix for CVE-2008-3194.
03.09.2018 CVE-2008-3901 Software suspend 2 2-2.2.1, when used with the Linux kernel 2.6.16, stores pre-boot authentication passwords in the BIOS Keyboard buffer and does not clear this buffer after use, which allows local users to obtain sensitive information by reading the physical memory locations associated with this buffer.
08.10.2018 Identity Finder Professional Edition v3.4.10.4 Identity Finder Professional — программа для поиска и обнаружения конфиденциальных данных и их защиты от кражи посторонними лицами. Данная программа поможет вам снизить риск утечки вашей конфиденциальной информации. Вы сможете найти много областей вашего компьютера с частными данными и предотвратить их утечку с помощью данного ПО. Программа имеет приятный пользовательский интерфейс в стиле Office 2007. Работает на платформах Windows 2000/XP/Vista. Скачать (Identity Finder Professional Edition v3.4.10.4).
|