A fost publicată lista furnizorilor de servicii de formare pentru securitate cibernetică
Accesați pagina

Juniper: Multiple vulnerabilities in ScreenOS (CVE-2015-7755, CVE-2015-7756)

2015/12/18
Popularity 976

Specialists of the company Juniper have identified a sequence of unauthorized code within the source code of the operating system ScreenOS, which can allow a  potential attacker to gain access and control over the devices NetScreen, respectively decrypting the connection type VPN. Description & ... Read more ->


Critical vulnerability impacting Linux operating systems

2015/10/04
Popularity 1028

Qualys researchers have recently discovered a security vulnerability affecting library glibc (GNU C Library) LINUX operating systems that allows attackers to remotely connect and take control of affected systems without the need to authenticate them beforehand. The vulnerability has been named by t ... Read more ->


STAGEFRIGHT: Vulnerabilities of the Android operating system

2015/07/29
Popularity 976

Mobile devices running a version of the operating system Android, from îbetween version 2.2 and version 5.1.1_r4, contain multiple vulnerabilities of the engine of the multimedia playback Stagefright. Exploitation of these vulnerabilities may allow an attacker to access your multimed ... Read more ->


Vulnerability in a BIND

2015/07/29
Popularity 933

Introduction BIND is the software open-source DNS (en. Domain Name System) most used in the Internet. „Berkeley Internet Name Domain” was developed at the University of California, Berkeley, at îthe beginning of the 1980s. În present, the application of large volume, which im ... Read more ->


UPDATE: A new vulnerability of Adobe Flash Player

2015/07/13
Popularity 1027

UPDATE 15.07.2015 Adobe has published updates that addresses the problems arising within the last period as well : - Vulnerabilities in Adobe Flash use-after-free and corruption of memory (CVE-2015-5119, CVE-2015-5122, CVE-2015-5123) determined by the grades  ActionScript 3 ... Read more ->