JBoss AS is prone to a cross-site request-forgery vulnerability; fixes are available. [ad_2] Source link...
HP Printers and Digital Senders are prone to a security-bypass vulnerability leading to the installation...
Apache HTTP Server ‘mod_proxy’ Reverse Proxy Security Bypass Vulnerability Apache HTTP Server is prone to...
Linux kernel is prone to multiple ‘hardlink’ stack-based buffer-overflow vulnerabilities and multiple integer-overflow vulnerabilities because...
IBM Lotus Mobile Connect is prone to a cross-site scripting vulnerability. Fixes are available. An...
The Linux kernel is prone to a remote denial-of-service vulnerability. Specifically, this issue occurs when...
The Linux kernel is prone to a remote denial-of-service vulnerability. To exploit this issue, attackers...
Microsoft Windows is prone to a remote code-execution vulnerability. A commercial exploit is available for...
Oracle Java SE is prone to a remote vulnerability in Java Runtime Environment. A commercial...
ISC BIND is prone to a remote denial-of-service vulnerability [ad_2] Source link Is your business...