[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

254802

 
 

909

 
 

198617

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 197732 Download | Alert*

The host is installed with XnView Classic 2.48 and is prone to an user mode write AV vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.

The host is installed with XnView Classic 2.49.1 and is prone to an user mode write AV vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause out-of-bounds write.

The host is installed with XnView Classic 2.49.1 and is prone to an user mode write AV vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause out-of-bounds write.

Idle activation of the screen lock should be enabled.

The kernel module rds should be disabled.

Record attempts to alter time through adjtimex.

Record Events that Modify the System's Discretionary Access Controls - chmod. The changing of file permissions and attributes should be audited.

The SSH ClientAliveCountMax should be set to an appropriate value (and dependencies are met)

The password hashing algorithm should be set correctly in /etc/pam.d/system-auth.


Pages:      Start    11385    11386    11387    11388    11389    11390    11391    11392    11393    11394    11395    11396    11397    11398    ..   19773

© SecPod Technologies