1. Startseite


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese
Anzeige

Webseiten News

News vom: 26.12.2018 um 06:20 Uhr

 

ccompliant project that can retrieve saved logins from Google Chrome, Firefox, Internet Explorer and Microsoft Edge. In the future, this project will be expanded upon to retrieve Cookies and History items from these browsers.
Standing on the Shoulders of Giants
This project uses the work of @plainprogrammer and his work on a compliant .NET 2.0 CLR compliant SQLite parser, which can be found here. In addition, @gourk created a wonderful ASN parser and cryptography helpers for decrypting and parsing the FireFox login files. It uses a revised version of his work (found here) to parse these logins out. Without their work this project would not have come together nearly as quickly as it did.
 
Weitere News Beiträge ansehen: Pentesting (2)

Startseite und alle Kategorien


Suchen

Bugtraq: [RT-SA-2016-004] Websockify: Remote Code Execution via Buffer Overflow

Exploits vom 00.00.0000 um 00:00 Uhr | Quelle securityfocus.com
[RT-SA-2016-004] Websockify: Remote Code Execution via Buffer Overflow
Newsbewertung

Weiterlesen

Guilty Pleas in Massive Software Piracy Case (December 17, 2015)

IT Security Nachrichten vom 00.00.0000 um 00:00 Uhr | Quelle sans.org

Six people have pleaded guilty to charges in what is being called "one
[of ]
the biggest software piracy cases, if not the biggest, the
[Justice ]
department has ever handled.......


Newsbewertung

Weiterlesen

Ukrainian Government Blames Russia for Airport Cyberattack (January 18, 2016)

IT Security Nachrichten vom 00.00.0000 um 00:00 Uhr | Quelle sans.org

After Black Energy malware was found on the computer network at Boryspil Airport in Kiev, Ukraine, the country's government says it suspects that Russia is responsible.......


Newsbewertung

Weiterlesen

Wendy's Investigating Reports of Breach (January 27, 2016)

IT Security Nachrichten vom 00.00.0000 um 00:00 Uhr | Quelle sans.org

The Wendy's fast food restaurant chain is looking into reports of a breach that compromised customer payment card information.......


Newsbewertung

Weiterlesen

APPLE-SA-2016-01-07-1 QuickTime 7.7.9

IT Security vom 00.00.0000 um 00:00 Uhr | Quelle prod.lists.apple.com
From: Apple Product Security
Reply to list
APPLE-SA-2016-01-07-1 QuickTime 7.7.9

[Re-sending with a valid signature]

QuickTime 7.7.9 is now available and addresses the following:

QuickTime
Available for:  Windows 7 and Windows Vista
Impact:  Viewing a maliciously crafted movie file may lead to an [...]

Newsbewertung

Weiterlesen

Bobcat

Alle Kategorien vom 00.00.0000 um 00:00 Uhr | Quelle bobketghii95061.uzblog.net
На рынок СССР техника Bobcat впервые поступила в 1977 году, преимущественно это были малогабаритные универсальные машины. В 1991 году официальный эксклюзивный дилер американской фирмы Melroe компания Scott-European Corporation открыла первый Московский дилерский центр ООО «Бобкэт». strong}
Newsbewertung

Weiterlesen

uc browser mini

Alle Kategorien vom 00.00.0000 um 00:00 Uhr | Quelle
much less guarantee and more shocking relating to battery life then 'microsoft' ridge everywhere, an people typically extremely more manipulated while the major search engines like. silver had a 55.08 per cent give of the global business over the past 12 months, when you compare something like three % for the effects, that had been considerably favorable to be able to safari, UC cell phone browser, flock, chrome, as wll as web browser. milliseconds, about the, is adament any bank outperforms safari in several significant aspects. incredible announced an advert thatreveals success of an assortment test held courtesy of - microsof company in which 720p online video experienced been streamed on their hook on three precise mobile computing devices, purchasing end, firefox additionally opera. the pc choosing sharpness lasted due to 16 evenings in addition eight time, despite the fact that one working steel survived 13 lots of and 31 a few minutes and also one firefox got around off electrical power soon after nine and 52. based on a not too long ago recent GitHub web spotted all by ZDNet, microsoft used latest forms through the surfers for test, that's held on wall newsletter pcs running on a treadmill our Windows 10 become a game makers posting (16299 production), due to settings fit to50 % andthe sound level muted. ones information exist unsurprising, originating ms, but these people are sustained by final results of another groundwork did by AVG, that also offered because boundary appears to be more favorable on behalf of battery life in order to internet explorer or firefox. In an individual advert, microsoft in speaks down Edge's increase and consequently secureness, declaring, "'microsoft' sharpness is up to 48 p'cent greater as compared with search firefox, and that "advantage hindrances 18 per a lot of phishing web when compared to what msn internet explorer, even although microsof company hasn't exposed the way it came to those data, it really is phis definitelyhing assert copied simply cyber precautions steady laboratories NSS, within turn april obtained whom sharpness grants increased defense against online burglars in comparison to what aol stainless -. from NSS Labs' examinations, 'microsoft' side block for good 92.3 per cent for phishing web addresses, search engines internet explorer obstructed 74.5 percent of them and as well,as well as the Mozilla internet explorer blocked 61.1 % ones. each of our Independent [url=http://www.ucbrowserapp.net/uc-browser-download/]uc browser mini[/url] carries contacted google when comment on windows reports, And this information be refreshed when the organization reacts. The acrossdependent's bitcocollective a good option is follow the to discussions latest also developments cryptocurrency. join the system for most up-to-date on how people are monetizing and also just how they are really losng out on the item. click the Adblock/Adblock and additionally symbol, Which is to the correct associated with the house address club. along with Adblock view "should never are operated with posts on this subject site name, in case you unique looking around in firefox, "visitor protector" May cause the adblock suspect to introduce. it will be for the time being impaired and also clicking on any "ow" tattoo inside of where they live bar council.
Newsbewertung

Weiterlesen

APPLE-SA-2016-01-25-1 tvOS 9.1.1

Exploits vom 00.00.0000 um 00:00 Uhr | Quelle prod.lists.apple.com
From: Apple Product Security
Reply to list
APPLE-SA-2016-01-25-1 tvOS 9.1.1

tvOS 9.1.1 is now available and addresses the following:

Disk Images
Available for:  Apple TV (4th generation)
Impact:  A local user may be able to execute arbitrary code with
kernel privileges
Description:  A memory corruption issue existed in the parsing of [...]

Newsbewertung

Weiterlesen

Bugtraq: [slackware-security] curl (SSA:2016-039-01)

Exploits vom 00.00.0000 um 00:00 Uhr | Quelle securityfocus.com
[slackware-security] curl (SSA:2016-039-01)
Newsbewertung

Weiterlesen

Bugtraq: [security bulletin] HPSBGN03444 rev.2 - HPE Network Automation, Remote Code Execution, Disclosure of Sensitive Information

Exploits vom 00.00.0000 um 00:00 Uhr | Quelle securityfocus.com
[security bulletin] HPSBGN03444 rev.2 - HPE Network Automation, Remote Code Execution, Disclosure of Sensitive Information
Newsbewertung

Weiterlesen

Bugtraq: [RT-SA-2015-012] XML External Entity Expansion in Paessler PRTG Network Monitor

Exploits vom 00.00.0000 um 00:00 Uhr | Quelle securityfocus.com
[RT-SA-2015-012] XML External Entity Expansion in Paessler PRTG Network Monitor
Newsbewertung

Weiterlesen

National Guard Cyber Protection Teams (December 14, 2015)

IT Security Nachrichten vom 00.00.0000 um 00:00 Uhr | Quelle sans.org

The National Guard has approved a joint cyber protection team comprising units from New Jersey and New York.......


Newsbewertung

Weiterlesen

Bugtraq: [RT-SA-2015-005] o2/Telefonica Germany: ACS Discloses VoIP/SIP Credentials

Exploits vom 00.00.0000 um 00:00 Uhr | Quelle securityfocus.com
[RT-SA-2015-005] o2/Telefonica Germany: ACS Discloses VoIP/SIP Credentials
Newsbewertung

Weiterlesen

FDA Issues Medical Device Cybersecurity Draft Guidance (January 18, 2016)

IT Security Nachrichten vom 00.00.0000 um 00:00 Uhr | Quelle sans.org

The US Food and Drug Administration (FDA) has issued draft guidance, "Postmarket Management of Cybersecurity in Medical Devices," for device manufacturers.......


Newsbewertung

Weiterlesen

cPanel Database Breach (January 27 and 28, 2016)

IT Security Nachrichten vom 00.00.0000 um 00:00 Uhr | Quelle sans.org

A cPanel customer database may have been compromised.......


Newsbewertung

Weiterlesen

APPLE-SA-2016-01-07-1 QuickTime 7.7.9

IT Security vom 00.00.0000 um 00:00 Uhr | Quelle prod.lists.apple.com
From: Apple Product Security
Reply to list
APPLE-SA-2016-01-07-1 QuickTime 7.7.9

QuickTime 7.7.9 is now available and addresses the following:

QuickTime
Available for:  Windows 7 and Windows Vista
Impact:  Viewing a maliciously crafted movie file may lead to an
unexpected application termination or arbitrary code execution [...]

Newsbewertung

Weiterlesen

APPLE-SA-2016-01-19-3 Safari 9.0.3

Exploits vom 00.00.0000 um 00:00 Uhr | Quelle prod.lists.apple.com
From: Apple Product Security
Reply to list
APPLE-SA-2016-01-19-3 Safari 9.0.3

Safari 9.0.3 is now available and addresses the following:

WebKit
Available for:  OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,
OS X El Capitan v10.11 to v10.11.2
Impact:  Visiting a maliciously crafted website may lead to arbitrary
code execution [...]

Newsbewertung

Weiterlesen

Bugtraq: [SECURITY] [DSA 3472-1] wordpress security update

Exploits vom 00.00.0000 um 00:00 Uhr | Quelle securityfocus.com
[SECURITY] [DSA 3472-1] wordpress security update
Newsbewertung

Weiterlesen

USN-2900-1: GNU C Library vulnerability

Unix Server vom 00.00.0000 um 00:00 Uhr | Quelle ubuntu.com

Ubuntu Security Notice USN-2900-1

16th February, 2016

eglibc, glibc vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 15.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

GNU C Library could be made to crash or run programs if it received specially crafted network traffic.

Software description

  • eglibc - GNU C Library
  • glibc - GNU C Library

Details

It was discovered that the GNU C Library incorrectly handled receiving
responses while performing DNS resolution. A remote attacker could use this
issue to cause the GNU C Library to crash, resulting in a denial of
service, or possibly execute arbitrary code.

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 15.10:
libc6 2.21-0ubuntu4.1
Ubuntu 14.04 LTS:
libc6 2.19-0ubuntu6.7
Ubuntu 12.04 LTS:
libc6 2.15-0ubuntu10.13

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

References

CVE-2015-7547


Newsbewertung

Weiterlesen

Bugtraq: [SECURITY] [DSA 3534-1] dhcpcd security update

Exploits vom 00.00.0000 um 00:00 Uhr | Quelle securityfocus.com
[SECURITY] [DSA 3534-1] dhcpcd security update
Newsbewertung

Weiterlesen

USN-2971-3: Linux kernel (Raspberry Pi 2) vulnerabilities

Unix Server vom 00.00.0000 um 00:00 Uhr | Quelle ubuntu.com

Ubuntu Security Notice USN-2971-3

9th May, 2016

linux-raspi2 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 15.10

Summary

Several security issues were fixed in the kernel.

Software description

  • linux-raspi2 - Linux kernel for Raspberry Pi 2

Details

Ralf Spenneberg discovered that the Aiptek Tablet USB device driver in the
Linux kernel did not properly sanity check the endpoints reported by the
device. An attacker with physical access could cause a denial of service
(system crash). (CVE-2015-7515)

Zach Riggle discovered that the Linux kernel's list poison feature did not
take into account the mmap_min_addr value. A local attacker could use this
to bypass the kernel's poison-pointer protection mechanism while attempting
to exploit an existing kernel vulnerability. (CVE-2016-0821)

Ralf Spenneberg discovered that the USB sound subsystem in the Linux kernel
did not properly validate USB device descriptors. An attacker with physical
access could use this to cause a denial of service (system crash).
(CVE-2016-2184)

Ralf Spenneberg discovered that the ATI Wonder Remote II USB driver in the
Linux kernel did not properly validate USB device descriptors. An attacker
with physical access could use this to cause a denial of service (system
crash). (CVE-2016-2185)

Ralf Spenneberg discovered that the PowerMate USB driver in the Linux
kernel did not properly validate USB device descriptors. An attacker with
physical access could use this to cause a denial of service (system crash).
(CVE-2016-2186)

Ralf Spenneberg discovered that the I/O-Warrior USB device driver in the
Linux kernel did not properly validate USB device descriptors. An attacker
with physical access could use this to cause a denial of service (system
crash). (CVE-2016-2188)

Sergej Schumilo, Hendrik Schwartke, and Ralf Spenneberg discovered that the
MCT USB RS232 Converter device driver in the Linux kernel did not properly
validate USB device descriptors. An attacker with physical access could use
this to cause a denial of service (system crash). (CVE-2016-3136)

Sergej Schumilo, Hendrik Schwartke, and Ralf Spenneberg discovered that the
Cypress M8 USB device driver in the Linux kernel did not properly validate
USB device descriptors. An attacker with physical access could use this to
cause a denial of service (system crash). (CVE-2016-3137)

Sergej Schumilo, Hendrik Schwartke, and Ralf Spenneberg discovered that the
USB abstract device control driver for modems and ISDN adapters did not
validate endpoint descriptors. An attacker with physical access could use
this to cause a denial of service (system crash). (CVE-2016-3138)

Sergej Schumilo, Hendrik Schwartke, and Ralf Spenneberg discovered that the
Linux kernel's USB driver for Digi AccelePort serial converters did not
properly validate USB device descriptors. An attacker with physical access
could use this to cause a denial of service (system crash). (CVE-2016-3140)

It was discovered that the IPv4 implementation in the Linux kernel did not
perform the destruction of inet device objects properly. An attacker in a
guest OS could use this to cause a denial of service (networking outage) in
the host OS. (CVE-2016-3156)

Andy Lutomirski discovered that the Linux kernel did not properly context-
switch IOPL on 64-bit PV Xen guests. An attacker in a guest OS could use
this to cause a denial of service (guest OS crash), gain privileges, or
obtain sensitive information. (CVE-2016-3157)

It was discovered that the Linux kernel's USB driver for IMS Passenger
Control Unit devices did not properly validate the device's interfaces. An
attacker with physical access could use this to cause a denial of service
(system crash). (CVE-2016-3689)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 15.10:
linux-image-4.2.0-1029-raspi2 4.2.0-1029.37

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References

CVE-2015-7515, CVE-2016-0821, CVE-2016-2184, CVE-2016-2185, CVE-2016-2186, CVE-2016-2188, CVE-2016-3136, CVE-2016-3137, CVE-2016-3138, CVE-2016-3140, CVE-2016-3156, CVE-2016-3157, CVE-2016-3689


Newsbewertung

Weiterlesen

Bugtraq: Re: rConfig, the open source network device configuration management tool, Vulnerable to Local File Inclusion

Exploits vom 00.00.0000 um 00:00 Uhr | Quelle securityfocus.com
Re: rConfig, the open source network device configuration management tool, Vulnerable to Local File Inclusion
Newsbewertung

Weiterlesen

Bugtraq: WP Symposium Pro Social Network Plugin XSS and Critical CSRF Vulnerability

Exploits vom 00.00.0000 um 00:00 Uhr | Quelle securityfocus.com
WP Symposium Pro Social Network Plugin XSS and Critical CSRF Vulnerability
Newsbewertung

Weiterlesen

Bitcoin Trading Site Cryptsy Alleges Cryptocurrency Theft (January 16 and 18, 2016)

IT Security Nachrichten vom 00.00.0000 um 00:00 Uhr | Quelle sans.org

Cryptocurrency trading website Cryptsy has accused the developer of Lucky7Coin of stealing currencies worth an estimated US $5.......


Newsbewertung

Weiterlesen

Mozilla Updates Firefox to Version 44 (January 26 and 28, 2016)

IT Security Nachrichten vom 00.00.0000 um 00:00 Uhr | Quelle sans.org

On Tuesday, January 26, Mozilla released Firefox 44, which addresses a dozen flaws in the company's flagship browser.......


Newsbewertung

Weiterlesen

APPLE-SA-2016-01-19-2 OS X El Capitan 10.11.3 and Security Update 2016-001

Exploits vom 00.00.0000 um 00:00 Uhr | Quelle prod.lists.apple.com
From: Apple Product Security
Reply to list
APPLE-SA-2016-01-19-2 OS X El Capitan 10.11.3 and Security Update
2016-001

OS X El Capitan 10.11.3 and Security Update 2016-001 is now available
and addresses the following:

AppleGraphicsPowerManagement
Available for:  OS X El Capitan v10.11 to v10.11. [...]

Newsbewertung

Weiterlesen

Bugtraq: [SECURITY] [DSA 3471-1] qemu security update

Exploits vom 00.00.0000 um 00:00 Uhr | Quelle securityfocus.com
[SECURITY] [DSA 3471-1] qemu security update
Newsbewertung

Weiterlesen

Bugtraq: [SE-2012-01] Broken security fix in Oracle Java SE 7/8/9

Exploits vom 00.00.0000 um 00:00 Uhr | Quelle securityfocus.com
[SE-2012-01] Broken security fix in Oracle Java SE 7/8/9
Newsbewertung

Weiterlesen

USN-2971-2: Linux kernel (Wily HWE) vulnerabilities

Unix Server vom 00.00.0000 um 00:00 Uhr | Quelle ubuntu.com

Ubuntu Security Notice USN-2971-2

9th May, 2016

linux-lts-wily vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in the kernel.

Software description

  • linux-lts-wily - Linux hardware enablement kernel from Wily for Trusty

Details

USN-2971-1 fixed vulnerabilities in the Linux kernel for Ubuntu 15.10.
This update provides the corresponding updates for the Linux Hardware
Enablement (HWE) kernel from Ubuntu 15.10 for Ubuntu 14.04 LTS.

Ralf Spenneberg discovered that the Aiptek Tablet USB device driver in the
Linux kernel did not properly sanity check the endpoints reported by the
device. An attacker with physical access could cause a denial of service
(system crash). (CVE-2015-7515)

Zach Riggle discovered that the Linux kernel's list poison feature did not
take into account the mmap_min_addr value. A local attacker could use this
to bypass the kernel's poison-pointer protection mechanism while attempting
to exploit an existing kernel vulnerability. (CVE-2016-0821)

Ralf Spenneberg discovered that the USB sound subsystem in the Linux kernel
did not properly validate USB device descriptors. An attacker with physical
access could use this to cause a denial of service (system crash).
(CVE-2016-2184)

Ralf Spenneberg discovered that the ATI Wonder Remote II USB driver in the
Linux kernel did not properly validate USB device descriptors. An attacker
with physical access could use this to cause a denial of service (system
crash). (CVE-2016-2185)

Ralf Spenneberg discovered that the PowerMate USB driver in the Linux
kernel did not properly validate USB device descriptors. An attacker with
physical access could use this to cause a denial of service (system crash).
(CVE-2016-2186)

Ralf Spenneberg discovered that the I/O-Warrior USB device driver in the
Linux kernel did not properly validate USB device descriptors. An attacker
with physical access could use this to cause a denial of service (system
crash). (CVE-2016-2188)

Sergej Schumilo, Hendrik Schwartke, and Ralf Spenneberg discovered that the
MCT USB RS232 Converter device driver in the Linux kernel did not properly
validate USB device descriptors. An attacker with physical access could use
this to cause a denial of service (system crash). (CVE-2016-3136)

Sergej Schumilo, Hendrik Schwartke, and Ralf Spenneberg discovered that the
Cypress M8 USB device driver in the Linux kernel did not properly validate
USB device descriptors. An attacker with physical access could use this to
cause a denial of service (system crash). (CVE-2016-3137)

Sergej Schumilo, Hendrik Schwartke, and Ralf Spenneberg discovered that the
USB abstract device control driver for modems and ISDN adapters did not
validate endpoint descriptors. An attacker with physical access could use
this to cause a denial of service (system crash). (CVE-2016-3138)

Sergej Schumilo, Hendrik Schwartke, and Ralf Spenneberg discovered that the
Linux kernel's USB driver for Digi AccelePort serial converters did not
properly validate USB device descriptors. An attacker with physical access
could use this to cause a denial of service (system crash). (CVE-2016-3140)

It was discovered that the IPv4 implementation in the Linux kernel did not
perform the destruction of inet device objects properly. An attacker in a
guest OS could use this to cause a denial of service (networking outage) in
the host OS. (CVE-2016-3156)

Andy Lutomirski discovered that the Linux kernel did not properly context-
switch IOPL on 64-bit PV Xen guests. An attacker in a guest OS could use
this to cause a denial of service (guest OS crash), gain privileges, or
obtain sensitive information. (CVE-2016-3157)

It was discovered that the Linux kernel's USB driver for IMS Passenger
Control Unit devices did not properly validate the device's interfaces. An
attacker with physical access could use this to cause a denial of service
(system crash). (CVE-2016-3689)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 14.04 LTS:
linux-image-4.2.0-36-generic 4.2.0-36.41~14.04.1
linux-image-4.2.0-36-powerpc64-smp 4.2.0-36.41~14.04.1
linux-image-4.2.0-36-powerpc64-emb 4.2.0-36.41~14.04.1
linux-image-4.2.0-36-powerpc-smp 4.2.0-36.41~14.04.1
linux-image-4.2.0-36-powerpc-e500mc 4.2.0-36.41~14.04.1
linux-image-4.2.0-36-lowlatency 4.2.0-36.41~14.04.1
linux-image-4.2.0-36-generic-lpae 4.2.0-36.41~14.04.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References

CVE-2015-7515, CVE-2016-0821, CVE-2016-2184, CVE-2016-2185, CVE-2016-2186, CVE-2016-2188, CVE-2016-3136, CVE-2016-3137, CVE-2016-3138, CVE-2016-3140, CVE-2016-3156, CVE-2016-3157, CVE-2016-3689


Newsbewertung

Weiterlesen

Bugtraq: Symantec EP DOS

Exploits vom 00.00.0000 um 00:00 Uhr | Quelle securityfocus.com
Symantec EP DOS
Newsbewertung

Weiterlesen

Five Arrested in Connection with MegalodonHTTP RAT (January 15 and 18, 2016)

IT Security Nachrichten vom 00.00.0000 um 00:00 Uhr | Quelle sans.org

Law enforcement agents in Norway, along with Europol agents, arrested five people who are allegedly involved with the distribution of the MegalodonHTTP remote access Trojan (RAT).......


Newsbewertung

Weiterlesen

Oracle Retiring Java Plugin (January 26 and 28, 2016)

IT Security Nachrichten vom 00.00.0000 um 00:00 Uhr | Quelle sans.org

Oracle is phasing out its Java browser plugin.......


Newsbewertung

Weiterlesen

Добрый день

Alle Kategorien vom 00.00.0000 um 00:00 Uhr | Quelle prom-electric.ru
Доброго времени суток! Выскочила неисправность a44 на softstarter altistart. Аналогичные устройства ATV61EXC5C25Y, VZA44P0BAA-S5030, C104040-1 на насосах в норме. Расшифровку нашел через гугл на сайте prom elektric Самостоятельная диагностика sofrstarter Питер. Неиcправен был процессор. Всего наилучшего!
Newsbewertung

Weiterlesen

APPLE-SA-2016-01-19-1 iOS 9.2.1

Exploits vom 00.00.0000 um 00:00 Uhr | Quelle prod.lists.apple.com
From: Apple Product Security
Reply to list
APPLE-SA-2016-01-19-1 iOS 9.2.1

iOS 9.2.1 is now available and addresses the following:

Disk Images
Available for:  iPhone 4s and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact:  A local user may be able to execute arbitrary code with
kernel privileges [...]

Newsbewertung

Weiterlesen

Bugtraq: WordPress plugin GravityForms Cross-site Scripting vulnerability

Exploits vom 00.00.0000 um 00:00 Uhr | Quelle securityfocus.com
WordPress plugin GravityForms Cross-site Scripting vulnerability
Newsbewertung

Weiterlesen

Seitennavigation

Seite 12683 von 12.712 Seiten (Bei Beitrag 443870 - 443905)
444.920x Beiträge in dieser Kategorie

Auf Seite 12682 zurück | Nächste 12684 Seite | Letzte Seite
[ 12678 ] [ 12679 ] [ 12680 ] [ 12681 ] [ 12682 ] [12683] [ 12684 ] [ 12685 ] [ 12686 ] [ 12687 ] [ 12688 ] [ 12689 ] [ 12690 ] [ 12691 ] [ 12692 ] [ 12693 ]

Folge uns auf Twitter um einen Echtzeit-Stream zu erhalten. Updates alle 5 Minuten!

Die Webseite benutzt einen Cache von 10-15 Minuten