Videosorveglianza Saisystem

 numeroverde saisystem

×
 x 

Carrello vuoto

CENTRALE RYNO SMART "TUYA"

Proteggi la tua casa e la tua famiglia

Sistema antifurto GSM . WIFI con sistema FHSS
OFFERTA Prezzo: 273,00 € 

CLICCA QUI

 

TRASPORTO IN TUTTA ITALIA
SPEDIZIONE GRATIS

Per ordini superiori a 300 €

 

INTERRUTTORI DOMOTICI

Funzionano con Google Home e Alexa

Controlla casa tua da remoto grazie ai moduli WIFI di Saisystem
Moduli compatti e facili da installare con app in italiano

TELESOCCORSO SOS GSM

Proteggi le persone che ami usa Vigilo

Sistema di soccorso GSM con pulsante SOS e controllo caduta (Uomo a Terra)
Prezzo: 149,00 €

TELECAMERE 4X1

NUOVO DESIGN CON SENSORI SONY 

La nuova 4x1 AHD/CVI/TVI/CVBS ti consente di collegarti a qualsiasi dvr in commercio

ACQUISTA ADESSO A PARTIRE DA 29,00 €

TELECAMERE VIMTAG 

LA TUA TELECAMERA IP CON EASY CONNECT

Facili da installare grazie alla sua app completamente in italiano che ti guida passo passo

TUA A PARTIRE DA 58,00 €

bodycam

Illuminaizone led

Sospeso Joomla! Security News

    • Project: Joomla!
    • SubProject: CMS
    • Impact: Low
    • Severity: Low
    • Versions:3.0.0 - 3.9.25
    • Exploit type: LFI
    • Reported Date: 2021-01-03
    • Fixed Date: 2021-04-13
    • CVE Number: CVE-2021-26031

    Description

    Inadequate filters on module layout settings could lead to an LFI.

    Affected Installs

    Joomla! CMS versions 3.0.0 - 3.9.25

    Solution

    Upgrade to version 3.9.26

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:Lee Thao from Viettel Cyber Security
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Low
    • Severity: Low
    • Versions:3.0.0 - 3.9.25
    • Exploit type: XSS
    • Reported Date: 2021-03-09
    • Fixed Date: 2021-04-13
    • CVE Number: CVE-2021-26030

    Description

    Inadequate escaping allowed XSS attacks using the logo parameter of the default templates on error pages.

    Affected Installs

    Joomla! CMS versions 3.0.0 - 3.9.25

    Solution

    Upgrade to version 3.9.26

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:HOANG NGUYEN
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Low
    • Severity: Low
    • Versions:3.2.0 - 3.9.24
    • Exploit type: Improper Input Validation
    • Reported Date: 2020-05-07
    • Fixed Date: 2021-03-02
    • CVE Number: CVE-2021-23131

    Description

    Missing input validation within the template manager.

    Affected Installs

    Joomla! CMS versions 3.2.0 - 3.9.24

    Solution

    Upgrade to version 3.9.25

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:Bui Duc Anh Khoa from Viettel Cyber Security
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Low
    • Severity: Low
    • Versions:3.2.0 - 3.9.24
    • Exploit type: Insecure Randomness
    • Reported Date: 2021-01-12
    • Fixed Date: 2021-03-02
    • CVE Number: CVE-2021-23126CVE-2021-23127

    Description

    Usage of the insecure rand() function within the process of generating the 2FA secret.
    Usage of an insufficient length for the 2FA secret accoring to RFC 4226 of 10 bytes vs 20 bytes.

    Additional details as well as a more contexts for exising sites can be found in the docs: https://docs.joomla.org/J3.x:Changes_to_the_2FA_token_generation_recommendations_for_existing_sites

    This issue has been coordinated with Akeeba Ltd as contributor of the original FOF codebase to the core.

    Affected Installs

    Joomla! CMS versions 3.2.0 - 3.9.24

    Solution

    Upgrade to version 3.9.25

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:Hanno Böck
    • Project: Joomla!
    • SubProject: CMS
    • Impact: Low
    • Severity: Low
    • Versions:3.2.0 - 3.9.24
    • Exploit type: Insecure Randomness
    • Reported Date: 2021-01-13
    • Fixed Date: 2021-03-02
    • CVE Number: CVE-2021-23128

    Description

    The core shipped but unused randval implementation within FOF (FOFEncryptRandval) used an potential insecure implemetation. That has now been replaced with a call to "random_bytes()" and its backport that is shipped within random_compat.

    This issue has been coordinated with Akeeba Ltd as contributor of the original FOF codebase to the core.

    Affected Installs

    Joomla! CMS versions 3.2.0 - 3.9.24

    Solution

    Upgrade to version 3.9.25

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:Hanno Böck

nebbiogeni wireless

controllo satellitare

categoria illuminazione led

categoria videocitofoni

×

TOP