Смотрите также связанные темы 03.10.2018 Уязвимость в IPv6 Neighbor Discovery протоколе в FreeBSD Удаленный пользователь может произвести спуфинг атаку, получить доступ к важным данным и вызвать отказ в обслуживании.
05.09.2018 Achieving Enterprise Compliance Validation with SCAP McAfee achieved a milestone last week when Policy Auditor received its Secure Content Automation Protocol (SCAP) Certification as a Federal Desktop Core Configuration (FDCC) Scanner, an Authenticated Configuration Scanner and an Authenticated Vulnerability and Patch Scanner.
What is SCAP and why was achieving a NIST SCAP certification a milestone? First the NIST Security Content Automation Protocol [...]
27.01.2018 CVE-2009-0304 The kernel in Sun Solaris 10 and 11 snv_101b, and OpenSolaris before snv_108, allows remote attackers to cause a denial of service (system crash) via a crafted IPv6 packet, related to an "insufficient validation security vulnerability," as demonstrated by SunOSipv6.c.
11.06.2018 Resource 207: Kaspersky Lab Research Proves that Stuxnet and Flame Developers are Connected The discovery of the Flame malware in May 2012 revealed the most complex cyber-weapon to date. At the time of its discovery, there was no strong evidence of Flame being developed by the same team that delivered Stuxnet and Duqu. The approach to the development of Flame and Duqu/Stuxnet was different as well, which lead to the conclusion that these projects were created by separate teams. However, the following in-depth research, conducted by Kaspersky Lab’s experts, reveals that these teams in fact cooperated at least once during the early stages of development.Quick FactsKaspersky Lab discove...
26.03.2018 HP Intelligent Management Center Arbitrary File Upload Exploit ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = GreatRanking HttpFingerprint = { :pattern => [ /Apache-Coyote/ ] } include Msf::Exploit::Remote::HttpClient include Msf::Exploit::FileDropper def initialize(info = {}) super&...
12.07.2018 CVE-2012-2486 The Cisco Discovery Protocol (CDP) implementation on Cisco TelePresence Multipoint Switch before 1.9.0, Cisco TelePresence Immersive Endpoint Devices before 1.9.1, Cisco TelePresence Manager before 1.9.0, and Cisco TelePresence Recording Server before 1.8.1 allows remote attackers to execute arbitrary code by leveraging certain adjacency and sending a malformed CDP packet, aka Bug IDs CSCtz40953, CSCtz40947, CSCtz40965, and CSCtz40953.
16.10.2018 CVE-2012-3158 Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Protocol.
20.08.2018 CVE-2010-3060 Unspecified vulnerability in the message-protocol implementation in the Server in IBM Tivoli Storage Manager (TSM) FastBack 5.x.x before 5.5.7, and 6.1.0.0, allows remote attackers to cause a denial of service (daemon outage) via unknown vectors.
28.02.2018 Kerio Control 7.3 Gets Organizations Ready to Transition to IPv6 Kerio’s Latest Unified Threat Management Firewall Provides Comprehensive Network Security and Intelligence SAN JOSE, Calif., Feb. 28, 2012 – Kerio Technologies today began assisting organizations with the upcoming transition from IPv4 to IPv6. As the Internet community phases in the new protocol, Kerio Control 7.3, a comprehensive UTM security appliance, will allow organizations to securely test IPv6 traffic over their corporate networks. read more
26.10.2018 Множественные уязвимости в FreeBSD Удаленный пользователь может раскрыть важные данные, неавторизованно изменить данные, осуществить DoS-атаку и обойти ограничения безопасности.
|