Sapsi Consultores

Sapsi Consultores

Category: Content
Type: Blog Article

Generated 5 days ago

New blog articles detected

  • Microsoft retrasa sus parches de febrero hasta el 14 de marzo

    Microsoft retrasa sus parches de febrero hasta el 14 de marzo En una decisión sin precedentes, Microsoft ha anunciadoque la publicación del paquete de actualizaciones planificadas para este pasado martes 14 de febrero se retrasa hasta el próximo 14 de marzo (segundo martes del mes). Problemas de última hora sin confirmar han obligado a la […] The post Microsoft retrasa sus parches de febrero hasta...

  • MalQR – Collection of malicious QR Codes and Barcodes you can use to test the security of your scanners

    MalQR – Collection of malicious QR Codes and Barcodes you can use to test the security of your scanners MalQR is a collection of malicious QR codes and barcodes you can use to test the security of your scanners. It gives you the ability to conduct such tests with easiness : you just need to […] The post MalQR – Collection of malicious QR Codes and Barcodes you can use to test the security of your ...

  • [webapps] – Joomla! Component Spider Calendar Lite 3.2.16 – SQL Injection

    [webapps] – Joomla! Component Spider Calendar Lite 3.2.16 – SQL Injection Joomla! Component Spider Calendar Lite 3.2.16 – SQL Injection http://www.exploit-db.com/rss.xml The post [webapps] – Joomla! Component Spider Calendar Lite 3.2.16 – SQL Injection appeared first on Sapsi Security Services.

  • [webapps] – Joomla! Component Spider Catalog Lite 1.8.10 – SQL Injection

    [webapps] – Joomla! Component Spider Catalog Lite 1.8.10 – SQL Injection Joomla! Component Spider Catalog Lite 1.8.10 – SQL Injection http://www.exploit-db.com/rss.xml The post [webapps] – Joomla! Component Spider Catalog Lite 1.8.10 – SQL Injection appeared first on Sapsi Security Services.

  • [webapps] – Joomla! Component Spider Facebook 1.6.1 – SQL Injection

    [webapps] – Joomla! Component Spider Facebook 1.6.1 – SQL Injection Joomla! Component Spider Facebook 1.6.1 – SQL Injection http://www.exploit-db.com/rss.xml The post [webapps] – Joomla! Component Spider Facebook 1.6.1 – SQL Injection appeared first on Sapsi Security Services.

  • [webapps] – Joomla! Component Spider FAQ Lite 1.3.1 – SQL Injection

    [webapps] – Joomla! Component Spider FAQ Lite 1.3.1 – SQL Injection Joomla! Component Spider FAQ Lite 1.3.1 – SQL Injection http://www.exploit-db.com/rss.xml The post [webapps] – Joomla! Component Spider FAQ Lite 1.3.1 – SQL Injection appeared first on Sapsi Security Services.

  • [shellcode] – Linux – Dual/Multi mode Bind Shell Shellcode (156 bytes)

    [shellcode] – Linux – Dual/Multi mode Bind Shell Shellcode (156 bytes) Linux – Dual/Multi mode Bind Shell Shellcode (156 bytes) http://www.exploit-db.com/rss.xml The post [shellcode] – Linux – Dual/Multi mode Bind Shell Shellcode (156 bytes) appeared first on Sapsi Security Services.

  • [webapps] – WordPress Plugin Corner Ad 1.0.7 – Cross-Site Scripting

    [webapps] – WordPress Plugin Corner Ad 1.0.7 – Cross-Site Scripting WordPress Plugin Corner Ad 1.0.7 – Cross-Site Scripting http://www.exploit-db.com/rss.xml The post [webapps] – WordPress Plugin Corner Ad 1.0.7 – Cross-Site Scripting appeared first on Sapsi Security Services.

  • [webapps] – dotCMS 3.6.1 – Blind Boolean SQL Injection

    [webapps] – dotCMS 3.6.1 – Blind Boolean SQL Injection dotCMS 3.6.1 – Blind Boolean SQL Injection http://www.exploit-db.com/rss.xml The post [webapps] – dotCMS 3.6.1 – Blind Boolean SQL Injection appeared first on Sapsi Security Services.

  • Apple publica una nueva actualización de seguridad para GarageBand

    Apple publica una nueva actualización de seguridad para GarageBand Hace menos de un mes Apple publicó una actualización de seguridad para GarageBand (su popular programa de composición musical) para OS X, destinada a solucionar un fallo que podía permitir la ejecución remota de código. Lamentablemente el problema no quedó totalmente solucionado, y se hace necesaria […] The post Apple publica una n...

Sapsi Consultores

Category: Content
Type: Blog Article

Generated 1 week ago

New blog articles detected

  • [webapps] – Mobiketa 3.5 – SQL Injection

    [webapps] – Mobiketa 3.5 – SQL Injection Mobiketa 3.5 – SQL Injection http://www.exploit-db.com/rss.xml The post [webapps] – Mobiketa 3.5 – SQL Injection appeared first on Sapsi Security Services.

  • [webapps] – Sendroid 5.2 – SQL Injection

    [webapps] – Sendroid 5.2 – SQL Injection Sendroid 5.2 – SQL Injection http://www.exploit-db.com/rss.xml The post [webapps] – Sendroid 5.2 – SQL Injection appeared first on Sapsi Security Services.

  • [webapps] – Fome SMS Portal 2.0 – SQL Injection

    [webapps] – Fome SMS Portal 2.0 – SQL Injection Fome SMS Portal 2.0 – SQL Injection http://www.exploit-db.com/rss.xml The post [webapps] – Fome SMS Portal 2.0 – SQL Injection appeared first on Sapsi Security Services.

  • [webapps] – SOA School Management – SQL Injection

    [webapps] – SOA School Management – SQL Injection SOA School Management – SQL Injection http://www.exploit-db.com/rss.xml The post [webapps] – SOA School Management – SQL Injection appeared first on Sapsi Security Services.

  • [webapps] – Client Expert 1.0.1 – SQL Injection

    [webapps] – Client Expert 1.0.1 – SQL Injection Client Expert 1.0.1 – SQL Injection http://www.exploit-db.com/rss.xml The post [webapps] – Client Expert 1.0.1 – SQL Injection appeared first on Sapsi Security Services.

  • [webapps] – Client Expert 1.0.1 – SQL Injection

    [webapps] – Client Expert 1.0.1 – SQL Injection Client Expert 1.0.1 – SQL Injection http://www.exploit-db.com/rss.xml The post [webapps] – Client Expert 1.0.1 – SQL Injection appeared first on Sapsi Security Services.

  • [webapps] – EXAMPLO – SQL Injection

    [webapps] – EXAMPLO – SQL Injection EXAMPLO – SQL Injection http://www.exploit-db.com/rss.xml The post [webapps] – EXAMPLO – SQL Injection appeared first on Sapsi Security Services.

  • Google soluciona 58 vulnerabilidades en Android

    Google soluciona 58 vulnerabilidades en Android Google ha publicado el boletín de seguridad Androidcorrespondiente al mes de febrero en el que corrige un total de 58 vulnerabilidades, 10 de ellas calificadas como críticas. Como es habitual, Google divide las vulnerabilidades corregidas en dos bloques principales en función de los componentes afectados. En el nivel de […] The post Google soluciona ...

  • Smith – A Very Quick And Very Dirty Client/Server Tool For Testing Firewalls

    Smith – A Very Quick And Very Dirty Client/Server Tool For Testing Firewalls A client/server style agent meant for testing connectivity to and from a machine on a network. Installation python setup.py install or pip install . should install smith. Note: If you want to use the tcp/udp protocol options, you’ll need to install scapy […] The post Smith – A Very Quick And Very Dirty Client/Server Tool ...

  • [shellcode] – Linux/x86 – Reverse TCP Alphanumeric Staged Shellcode (103 bytes)

    [shellcode] – Linux/x86 – Reverse TCP Alphanumeric Staged Shellcode (103 bytes) Linux/x86 – Reverse TCP Alphanumeric Staged Shellcode (103 bytes) http://www.exploit-db.com/rss.xml The post [shellcode] – Linux/x86 – Reverse TCP Alphanumeric Staged Shellcode (103 bytes) appeared first on Sapsi Security Services.

Sapsi Consultores

Category: Content
Type: Blog Article

Generated 2 weeks ago

New blog articles detected

  • [dos] – Apple WebKit – ‘HTMLKeygenElement’ Type Confusion

    [dos] – Apple WebKit – ‘HTMLKeygenElement’ Type Confusion Apple WebKit – ‘HTMLKeygenElement’ Type Confusion http://www.exploit-db.com/rss.xml The post [dos] – Apple WebKit – ‘HTMLKeygenElement’ Type Confusion appeared first on Sapsi Security Services.

  • [shellcode] – Linux – Multi/Dual mode Reverse Shell Shellcode (129 bytes)

    [shellcode] – Linux – Multi/Dual mode Reverse Shell Shellcode (129 bytes) Linux – Multi/Dual mode Reverse Shell Shellcode (129 bytes) http://www.exploit-db.com/rss.xml The post [shellcode] – Linux – Multi/Dual mode Reverse Shell Shellcode (129 bytes) appeared first on Sapsi Security Services.

  • [local] – Ghostscript 9.20 – ‘Filename’ Command Execution

    [local] – Ghostscript 9.20 – ‘Filename’ Command Execution Ghostscript 9.20 – ‘Filename’ Command Execution http://www.exploit-db.com/rss.xml The post [local] – Ghostscript 9.20 – ‘Filename’ Command Execution appeared first on Sapsi Security Services.

  • [webapps] – WordPress 4.7.0/4.7.1 – Unauthenticated Content Injection (PoC)

    [webapps] – WordPress 4.7.0/4.7.1 – Unauthenticated Content Injection (PoC) WordPress 4.7.0/4.7.1 – Unauthenticated Content Injection (PoC) http://www.exploit-db.com/rss.xml The post [webapps] – WordPress 4.7.0/4.7.1 – Unauthenticated Content Injection (PoC) appeared first on Sapsi Security Services.

  • [webapps] – WordPress 4.7.0/4.7.1 – Unauthenticated Content Injection Arbitrary Code Execution

    [webapps] – WordPress 4.7.0/4.7.1 – Unauthenticated Content Injection Arbitrary Code Execution WordPress 4.7.0/4.7.1 – Unauthenticated Content Injection Arbitrary Code Execution http://www.exploit-db.com/rss.xml The post [webapps] – WordPress 4.7.0/4.7.1 – Unauthenticated Content Injection Arbitrary Code Execution appeared first on Sapsi Security Services.

  • Routers Netgear pueden permitir acceder a la clave de administrador

    Routers Netgear pueden permitir acceder a la clave de administrador Un investigador de Trustwave ha anunciado una vulnerabilidad que afecta a múltiples modelos de routers Netgear y que podría permitir conseguir de una forma sencilla la contraseña de administrador de la interfaz web del dispositivo. El problema, descubierto por Simon Kenin de Trustwave, podría permitir […] The post Routers Netgear ...

  • Faraday v2.3 – Collaborative Penetration Test and Vulnerability Management Platform

    Faraday v2.3 – Collaborative Penetration Test and Vulnerability Management Platform Faraday is the Integrated Multiuser Risk Environment you were looking for! It maps and leverages all the knowledge you generate in real time, letting you track and understand your audits. Our dashboard for CISOs and managers uncovers the impact and risk being assessed by the audit in […] The post Faraday v2.3 – Col...

  • [webapps] – LogoStore – ‘query’ Parameter SQL Injection

    [webapps] – LogoStore – ‘query’ Parameter SQL Injection LogoStore – ‘query’ Parameter SQL Injection http://www.exploit-db.com/rss.xml The post [webapps] – LogoStore – ‘query’ Parameter SQL Injection appeared first on Sapsi Security Services.

  • [dos] – Apple WebKit – ‘HTMLFormElement::reset()’ Use-After Free

    [dos] – Apple WebKit – ‘HTMLFormElement::reset()’ Use-After Free Apple WebKit – ‘HTMLFormElement::reset()’ Use-After Free http://www.exploit-db.com/rss.xml The post [dos] – Apple WebKit – ‘HTMLFormElement::reset()’ Use-After Free appeared first on Sapsi Security Services.

  • [dos] – Google Chrome – ‘HTMLKeygenElement::shadowSelect()’ Type Confusion

    [dos] – Google Chrome – ‘HTMLKeygenElement::shadowSelect()’ Type Confusion Google Chrome – ‘HTMLKeygenElement::shadowSelect()’ Type Confusion http://www.exploit-db.com/rss.xml The post [dos] – Google Chrome – ‘HTMLKeygenElement::shadowSelect()’ Type Confusion appeared first on Sapsi Security Services.

Sapsi Consultores

Category: Content
Type: Blog Article

Generated 4 months ago

New blog articles detected

  • Nuevas versiones de BIND 9

    Nuevas versiones de BIND 9 ISC ha publicado nuevas versiones del servidor DNS BIND 9, destinadas a solucionar una vulnerabilidad considerada crítica que podría causar condiciones de denegación de servicioa través de consultas especialmente manipuladas. El servidor de nombres BIND es uno de los más usados en Internet. Creado en 1988, en la universidad de […] The post Nuevas versiones de BIND 9 appe...

  • Droid-Hunter – Android Application Vulnerability Analysis And Android Pentest Tool

    Droid-Hunter – Android Application Vulnerability Analysis And Android Pentest Tool .---. .----------- / \ __ / ------ / / \( )/ ----- ╔╦╗╦═╗╔═╗╦╔╦╗ ╦ ╦╦ ╦╔╗╔╔╦╗╔═╗╦═╗ ////// ' \/ ` --- ║║╠╦╝║ ║║ ║║───╠═╣║ ║║║║ ║ ║╣ ╠╦╝ //// / // : : --- ═╩╝╩╚═╚═╝╩═╩╝ ╩ ╩╚═╝╝╚╝ ╩ ╚═╝╩╚═ // / / /` '-- By […] The post Droid-Hunter – Android Application Vulnerability Analysis And Android Pentest Tool appeared first on...

  • [dos] – VLC Media Player 2.2.1 – Buffer Overflow

    [dos] – VLC Media Player 2.2.1 – Buffer Overflow VLC Media Player 2.2.1 – Buffer Overflow http://www.exploit-db.com/rss.xml The post [dos] – VLC Media Player 2.2.1 – Buffer Overflow appeared first on Sapsi Security Services.

  • [webapps] – Symantec Messaging Gateway 10.6.1 – Directory Traversal

    [webapps] – Symantec Messaging Gateway 10.6.1 – Directory Traversal Symantec Messaging Gateway 10.6.1 – Directory Traversal http://www.exploit-db.com/rss.xml The post [webapps] – Symantec Messaging Gateway 10.6.1 – Directory Traversal appeared first on Sapsi Security Services.

  • [webapps] – Symantec Messaging Gateway <= 10.6.1 – Directory Traversal

    [webapps] – Symantec Messaging Gateway <= 10.6.1 – Directory Traversal Symantec Messaging Gateway <= 10.6.1 – Directory Traversal http://www.exploit-db.com/rss.xml The post [webapps] – Symantec Messaging Gateway <= 10.6.1 – Directory Traversal appeared first on Sapsi Security Services.

  • Windows-Exploit-Suggester v3.2 – Compares a targets patch levels against the Microsoft vulnerability database

    Windows-Exploit-Suggester v3.2 – Compares a targets patch levels against the Microsoft vulnerability database This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins. It requires […] The post Win...

  • ZDI-16-528: Adobe Digital Editions ePub Font Parsing Use-After-Free Remote Code Execution Vulnerability

    ZDI-16-528: Adobe Digital Editions ePub Font Parsing Use-After-Free Remote Code Execution Vulnerability This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Digital Editions. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. http://feeds.feedburner.com/ZDI-Publishe...

  • ZDI-16-527: Apple Safari HTMLVideoElement Use-After-Free Remote Code Execution Vulnerability

    ZDI-16-527: Apple Safari HTMLVideoElement Use-After-Free Remote Code Execution Vulnerability This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. http://feeds.feedburner.com/ZDI-Published-Advisories The post...

  • [remote] – Android 5.0 <= 5.1.1 – Stagefright .MP4 tx3g Integer Overflow (Metasploit)

    [remote] – Android 5.0 <= 5.1.1 – Stagefright .MP4 tx3g Integer Overflow (Metasploit) Android 5.0 <= 5.1.1 – Stagefright .MP4 tx3g Integer Overflow (Metasploit) http://www.exploit-db.com/rss.xml The post [remote] – Android 5.0 <= 5.1.1 – Stagefright .MP4 tx3g Integer Overflow (Metasploit) appeared first on Sapsi Security Services.

  • [remote] – NetMan 204 – Backdoor Account

    [remote] – NetMan 204 – Backdoor Account NetMan 204 – Backdoor Account http://www.exploit-db.com/rss.xml The post [remote] – NetMan 204 – Backdoor Account appeared first on Sapsi Security Services.

Sapsi Consultores

Category: Content
Type: Blog Article

Generated 5 months ago

New blog articles detected

  • [dos] – Symantec rar Decomposer Engine (Multiple Products) – Out-of-Bounds Read / Out-of-Bounds Write

    [dos] – Symantec rar Decomposer Engine (Multiple Products) – Out-of-Bounds Read / Out-of-Bounds Write Symantec rar Decomposer Engine (Multiple Products) – Out-of-Bounds Read / Out-of-Bounds Write http://www.exploit-db.com/rss.xml The post [dos] – Symantec rar Decomposer Engine (Multiple Products) – Out-of-Bounds Read / Out-of-Bounds Write appeared first on Sapsi Security Services.

  • [dos] – Microsoft Office PowerPoint 2010 – Invalid Pointer Reference

    [dos] – Microsoft Office PowerPoint 2010 – Invalid Pointer Reference Microsoft Office PowerPoint 2010 – Invalid Pointer Reference http://www.exploit-db.com/rss.xml The post [dos] – Microsoft Office PowerPoint 2010 – Invalid Pointer Reference appeared first on Sapsi Security Services.

  • [remote] – Kaltura 11.1.0-2 – Remote Code Execution (Metasploit)

    [remote] – Kaltura 11.1.0-2 – Remote Code Execution (Metasploit) Kaltura 11.1.0-2 – Remote Code Execution (Metasploit) http://www.exploit-db.com/rss.xml The post [remote] – Kaltura 11.1.0-2 – Remote Code Execution (Metasploit) appeared first on Sapsi Security Services.

  • [webapps] – VegaDNS 0.13.2 – Remote Command Injection

    [webapps] – VegaDNS 0.13.2 – Remote Command Injection VegaDNS 0.13.2 – Remote Command Injection http://www.exploit-db.com/rss.xml The post [webapps] – VegaDNS 0.13.2 – Remote Command Injection appeared first on Sapsi Security Services.

  • [local] – PHP 5.0.0 – ‘tidy_parse_file()’ Buffer Overflow

    [local] – PHP 5.0.0 – ‘tidy_parse_file()’ Buffer Overflow PHP 5.0.0 – ‘tidy_parse_file()’ Buffer Overflow http://www.exploit-db.com/rss.xml The post [local] – PHP 5.0.0 – ‘tidy_parse_file()’ Buffer Overflow appeared first on Sapsi Security Services.

  • [webapps] – WordPress Plugin Order Export Import for WooCommerce – Order Information Disclosure

    [webapps] – WordPress Plugin Order Export Import for WooCommerce – Order Information Disclosure WordPress Plugin Order Export Import for WooCommerce – Order Information Disclosure http://www.exploit-db.com/rss.xml The post [webapps] – WordPress Plugin Order Export Import for WooCommerce – Order Information Disclosure appeared first on Sapsi Security Services.

  • [local] – EKG Gadu 1.9~pre+r2855-3+b1 – Local Buffer Overflow

    [local] – EKG Gadu 1.9~pre+r2855-3+b1 – Local Buffer Overflow EKG Gadu 1.9~pre+r2855-3+b1 – Local Buffer Overflow http://www.exploit-db.com/rss.xml The post [local] – EKG Gadu 1.9~pre+r2855-3+b1 – Local Buffer Overflow appeared first on Sapsi Security Services.

  • [local] – SolarWinds Kiwi Syslog Server 9.5.1 – Unquoted Service Path Privilege Escalation

    [local] – SolarWinds Kiwi Syslog Server 9.5.1 – Unquoted Service Path Privilege Escalation SolarWinds Kiwi Syslog Server 9.5.1 – Unquoted Service Path Privilege Escalation http://www.exploit-db.com/rss.xml The post [local] – SolarWinds Kiwi Syslog Server 9.5.1 – Unquoted Service Path Privilege Escalation appeared first on Sapsi Security Services.

  • [local] – Docker Daemon – Privilege Escalation (Metasploit)

    [local] – Docker Daemon – Privilege Escalation (Metasploit) Docker Daemon – Privilege Escalation (Metasploit) http://www.exploit-db.com/rss.xml The post [local] – Docker Daemon – Privilege Escalation (Metasploit) appeared first on Sapsi Security Services.

  • [webapps] – Kajona 4.7 – Cross-Site Scripting / Directory Traversal

    [webapps] – Kajona 4.7 – Cross-Site Scripting / Directory Traversal Kajona 4.7 – Cross-Site Scripting / Directory Traversal http://www.exploit-db.com/rss.xml The post [webapps] – Kajona 4.7 – Cross-Site Scripting / Directory Traversal appeared first on Sapsi Security Services.

Sapsi Consultores

Category: Content
Type: Blog Article

Generated 5 months ago

New blog articles detected

  • [local] – PrivateTunnel Client 2.7.0 (x64) – Local Credentials Disclosure

    [local] – PrivateTunnel Client 2.7.0 (x64) – Local Credentials Disclosure PrivateTunnel Client 2.7.0 (x64) – Local Credentials Disclosure http://www.exploit-db.com/rss.xml The post [local] – PrivateTunnel Client 2.7.0 (x64) – Local Credentials Disclosure appeared first on Sapsi Security Services.

  • Microsoft publica 14 boletines de seguridad y soluciona 50 vulnerabilidades

    Microsoft publica 14 boletines de seguridad y soluciona 50 vulnerabilidades Este martes Microsoft ha publicado 14 boletines de seguridad (del MS16-104 al MS16-117) correspondientes a su ciclo habitual de actualizaciones. Según la propia clasificación de Microsoft siete de los boletines presentan un nivel de gravedad “crítico“mientras que los siete restantes son “importantes“. En total se […] The p...

  • Microsoft publica 14 boletines de seguridad y soluciona 50 vulnerabilidades

    Microsoft publica 14 boletines de seguridad y soluciona 50 vulnerabilidades Este martes Microsoft ha publicado 14 boletines de seguridad (del MS16-104 al MS16-117) correspondientes a su ciclo habitual de actualizaciones. Según la propia clasificación de Microsoft siete de los boletines presentan un nivel de gravedad “crítico“mientras que los siete restantes son “importantes“. En total se […] The p...

  • Microsoft publica 14 boletines de seguridad y soluciona 50 vulnerabilidades

    Microsoft publica 14 boletines de seguridad y soluciona 50 vulnerabilidades Este martes Microsoft ha publicado 14 boletines de seguridad (del MS16-104 al MS16-117) correspondientes a su ciclo habitual de actualizaciones. Según la propia clasificación de Microsoft siete de los boletines presentan un nivel de gravedad “crítico“mientras que los siete restantes son “importantes“. En total se […] The p...

  • Microsoft publica 14 boletines de seguridad y soluciona 50 vulnerabilidades

    Microsoft publica 14 boletines de seguridad y soluciona 50 vulnerabilidades Este martes Microsoft ha publicado 14 boletines de seguridad (del MS16-104 al MS16-117) correspondientes a su ciclo habitual de actualizaciones. Según la propia clasificación de Microsoft siete de los boletines presentan un nivel de gravedad “crítico“mientras que los siete restantes son “importantes“. En total se […] The p...

  • Microsoft publica 14 boletines de seguridad y soluciona 50 vulnerabilidades

    Microsoft publica 14 boletines de seguridad y soluciona 50 vulnerabilidades Este martes Microsoft ha publicado 14 boletines de seguridad (del MS16-104 al MS16-117) correspondientes a su ciclo habitual de actualizaciones. Según la propia clasificación de Microsoft siete de los boletines presentan un nivel de gravedad “crítico“mientras que los siete restantes son “importantes“. En total se […] The p...

  • Microsoft publica 14 boletines de seguridad y soluciona 50 vulnerabilidades

    Microsoft publica 14 boletines de seguridad y soluciona 50 vulnerabilidades Este martes Microsoft ha publicado 14 boletines de seguridad (del MS16-104 al MS16-117) correspondientes a su ciclo habitual de actualizaciones. Según la propia clasificación de Microsoft siete de los boletines presentan un nivel de gravedad “crítico“mientras que los siete restantes son “importantes“. En total se […] The p...

  • Microsoft publica 14 boletines de seguridad y soluciona 50 vulnerabilidades

    Microsoft publica 14 boletines de seguridad y soluciona 50 vulnerabilidades Este martes Microsoft ha publicado 14 boletines de seguridad (del MS16-104 al MS16-117) correspondientes a su ciclo habitual de actualizaciones. Según la propia clasificación de Microsoft siete de los boletines presentan un nivel de gravedad “crítico“mientras que los siete restantes son “importantes“. En total se […] The p...

  • Microsoft publica 14 boletines de seguridad y soluciona 50 vulnerabilidades

    Microsoft publica 14 boletines de seguridad y soluciona 50 vulnerabilidades Este martes Microsoft ha publicado 14 boletines de seguridad (del MS16-104 al MS16-117) correspondientes a su ciclo habitual de actualizaciones. Según la propia clasificación de Microsoft siete de los boletines presentan un nivel de gravedad “crítico“mientras que los siete restantes son “importantes“. En total se […] The p...

  • Microsoft publica 14 boletines de seguridad y soluciona 50 vulnerabilidades

    Microsoft publica 14 boletines de seguridad y soluciona 50 vulnerabilidades Este martes Microsoft ha publicado 14 boletines de seguridad (del MS16-104 al MS16-117) correspondientes a su ciclo habitual de actualizaciones. Según la propia clasificación de Microsoft siete de los boletines presentan un nivel de gravedad “crítico“mientras que los siete restantes son “importantes“. En total se […] The p...

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in