[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256288

 
 

909

 
 

199146

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 198261 Download | Alert*

Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity or strength is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password complexity is one factor in determining how long it takes to crack a password. The more complex the password, the greater the number of possible com ...

External writeable media devices must be disabled for users. External USB devices are a potential vector for malware and can be used to exfiltrate sensitive data if an approved data-loss prevention (DLP) solution is not installed.

The audit service should shut down the computer if it is unable to audit system events. Once audit failure occurs, user and system activity is no longer recorded and malicious activity could go undetected. Audit processing failures include software/hardware errors, failures in the audit capturing mechanisms, and audit storage capacity being reached or exceeded. Responses to audit failure depend on ...

The audit service should shut down the computer if it is unable to audit system events. Once audit failure occurs, user and system activity is no longer recorded and malicious activity could go undetected. Audit processing failures include software/hardware errors, failures in the audit capturing mechanisms, and audit storage capacity being reached or exceeded. Responses to audit failure depend on ...

The host is installed with Foxit PDF Reader through 12.1.0.1229 or Foxit PDF Editor before 11.1.4.1121, 12.x through 12.1.0.1229 and is prone to an use after free vulnerability. A flaw is present in the application, which fails to properly handle certain JavaScripts. Successful exploitation allows attackers to execute remote code or disclose information.

The host is installed with Foxit PDF Reader through 12.1.0.1229 or Foxit PDF Editor before 11.1.4.1121, 12.x through 12.1.0.1229 and is prone to an use after free vulnerability. A flaw is present in the application, which fails to properly handle certain JavaScripts. Successful exploitation allows attackers to execute remote code or disclose information.

The host is installed with Foxit PDF Reader through 12.1.2.15332 or Foxit PDF Editor through 10.1.12.37872 or 11.x through 11.2.6.53790 or 12.x through 12.1.2.15332 and is prone to a use after free vulnerability. A flaw is present in the applications which fails to properly handle certain JavaScripts. Successful exploitation allows attackers to cause memory corruption and execute remote code.

The host is installed with Foxit PDF Reader through 12.1.0.1229 or Foxit PDF Editor before 11.1.4.1121, 12.x through 12.1.0.1229 and is prone to an use after free vulnerability. A flaw is present in the application, which fails to properly handle certain JavaScripts. Successful exploitation allows attackers to execute remote code or disclose information.

The host is installed with Foxit PDF Reader through 12.1.3.15356 or Foxit PDF Editor through 10.1.12.37872, 11.x through 11.2.7.53812, 12.x through 12.1.3.15356 or 2023.1.0.15510 and is prone to an use after free vulnerability. A flaw is present in the applications which fails to properly handle certain JavaScripts. Successful exploitation could allow attackers to execute remote code or disclose i ...

The host is installed with Foxit PDF Reader through 12.1.0.1229 or Foxit PDF Editor before 11.1.4.1121, 12.x through 12.1.0.1229 and is prone to an use after free vulnerability. A flaw is present in the application, which fails to properly handle certain JavaScripts. Successful exploitation allows attackers to execute remote code or disclose information.


Pages:      Start    8412    8413    8414    8415    8416    8417    8418    8419    8420    8421    8422    8423    8424    8425    ..   19826

© SecPod Technologies