Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | |||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.810636 |
Categoría: | General |
Título: | Adobe Flash Player Within Google Chrome Security Update (apsb16-36) - Mac OS X |
Resumen: | Adobe Flash Player is prone to a remote code execution vulnerability. |
Descripción: | Summary: Adobe Flash Player is prone to a remote code execution vulnerability. Vulnerability Insight: The flaw exists due to a use-after-free vulnerability Vulnerability Impact: Successful exploitation of this vulnerability will allow remote attackers to take control of the affected system. Affected Software/OS: Adobe Flash Player for chrome versions before 23.0.0.205 on Mac OS X. Solution: Upgrade to Adobe Flash Player for chrome version 23.0.0.205 or later. CVSS Score: 9.3 CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
BugTraq ID: 93861 Common Vulnerability Exposure (CVE) ID: CVE-2016-7855 http://www.securityfocus.com/bid/93861 https://security.gentoo.org/glsa/201610-10 https://security.googleblog.com/2016/10/disclosing-vulnerabilities-to-protect.html Microsoft Security Bulletin: MS16-128 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-128 RedHat Security Advisories: RHSA-2016:2119 http://rhn.redhat.com/errata/RHSA-2016-2119.html http://www.securitytracker.com/id/1037111 |
Copyright | Copyright (C) 2017 Greenbone Networks GmbH |
Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |