Смотрите также связанные темы 09.04.2018 Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA Adaptive Security Appliance and Cisco PIX Security Appliances -----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA AdaptiveSecurity Appliance and Cisco PIX Security AppliancesAdvisory ID: cisco-sa-20090408-asahttp://www.cisco.com/warp/public/707/cisco-sa-20090408-asa.shtmlRevision 1.0For Public Release 2009 April 08 1600 UTC (GMT)Summary=======Multiple vulnerabilities exist in the Cisco ASA 5500 Series AdaptiveSecurity Appliances and Cisco PIX Security Appliances. This securityadvisory outlines the details of these vulnerabilities: * VPN Authentication Bypass when Account Override F...
12.06.2018 CVE-2008-1085 Use-after-free vulnerability in Microsoft Internet Explorer 5.01 SP4, 6 through SP1, and 7 allows remote attackers to execute arbitrary code via a crafted data stream that triggers memory corruption, as demonstrated using an invalid MIME-type that does not have a registered handler.
18.09.2018 Vulnerability in Internet Explorer Could Allow Remote Code Execution Microsoft is investigating public reports of a vulnerability in Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, and Internet Explorer 9. Internet Explorer 10 is not affected. Microsoft is aware of targeted attacks that attempt to exploit this vulnerability.
08.11.2018 Kaspersky Lab’s Technology Proactively Blocks Attacks via Zero-Day Vulnerability in Microsoft Office Kaspersky Lab’s Automatic Exploit Prevention (AEP) technology successfully blocks attacks via the recently discovered system vulnerability in Microsoft Office software.
30.12.2018 CVE-2012-4792 Use-after-free vulnerability in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly allocated or (2) is deleted, as demonstrated by a CDwnBindInfo object, and exploited in the wild in December 2012.
11.05.2018 Описания: Exploit.JS.Aurora.a Вредоносная программа-эксплоит, использующая для своего выполнения на компьютере пользователя уязвимость в Microsoft Internet Explorer. Представляет собой HTML документ, который содержит в себе...
21.02.2018 Panda Cloud Antivirus получил логотип «Совместимо с Windows 8» Новый Panda Cloud Antivirus 2.1.1 предлагает улучшенное эвристическое обнаружение и технологии защиты от эксплойтов.21 февраля 2013 г. Компания Panda Security, производитель облачных решений безопасности и ведущий поставщик программ защиты от вредоносного программного обеспечения и вирусов, объявила о получении логотипа Microsoft «Совместимо с Windows 8» для своего бесплатного облачного антивирусного продукта Panda Cloud Antivirus. Таким образом, пользователи новой операционной системы Microsoft смогут воспользоваться всеми преимуществами защиты, предлагаемой версией 2.1.1 решени...
11.09.2018 CVE-2013-3862 Double free vulnerability in Microsoft Windows 7 and Server 2008 R2 SP1 allows local users to gain privileges via a crafted service description that is not properly handled by services.exe in the Service Control Manager (SCM), aka "Service Control Manager Double Free Vulnerability."
02.07.2018 CVE-2010-2549 Use-after-free vulnerability in Microsoft Windows Vista and Server 2008 allows local users to cause a denial of service (crash) by using a large number of calls to the NtUserCheckAccessForIntegrityLevel function to trigger a failure in the LockProcessByClientId function, which causes a process object to be deleted while it is still in use.
05.08.2018 Kerio Showcases Kerio Exchange Migration Tool Advanced Offering Provides Businesses with Fast and Easy Migration from Microsoft Exchange to Kerio MailServer on Multiple Platforms
|