According to foreign media reports, a statement released by the Oracle website this week said that Oracle will release 78 security patches next Tuesday to fix security vulnerabilities in its databases, middleware software, and applications.
Oracle said 27 patches were used to fix security vulnerabilities in the MySQL database. One of the security vulnerabilities
You may not be able to reach the application level, but there are many things you can do at the server level to make your IIS-based system more secure. By reviewing my many years of site security assessment projects, you can identify the following IIS vulnerabilities that most affect Windows serversYou may not be able to reach the application level, but there are many things you can do at the server level to make your IIS-based system more secure. By
How do I know if your website has any vulnerabilities? Recently, many websites have suffered various forms of attacks. The motivations for hacker attacks are different, and the target of hacker attacks is also uncertain, as a corporate network administrator or CEO, are you worried that your website will suffer the same fate?What types of websites are prone to hacker intrusion?Some people say that I am a person with a low profile and cannot offend peop
Whether you believe it or not, ASP can easily intrude into the web server, steal files on the server, and capture user passwords of Web databases, even maliciously deleting files on the server until the system is damaged, these are all sensational and have actually occurred. This article will reveal the vulnerabilities in ASP to you one by one, and put forward some preventive opinions.
The previous article focuses on how to display the database by pag
Summary of Critical and exploitable iOS vulnerabilities in 2016author:min (Spark) Zheng, Cererdlong, Eakerqiu @ Team Oversky0x00 IntroductionIOS security is far more fragile than you believe. And there is lots of critical and exploitable iOS vulnerabilities in the wild. We summarized these critical iOS vulnerabilities which can be used for remote code execution o
Author: Mark Vogels
Translation: the soul [S.S.T]
In this document, I will try to provide you with a basic understanding of the bugs, the vulnerabilities that are caused by those errors, and their exploits. That does not mean that you can fully understand exploits and loopholes, but it can help you learn to understand possible vulnerabilities and how to deal with them.
There are generally 3 different type
In the system developed by Microsoft, there are more than a few security vulnerabilities, these vulnerabilities are always threatening the security of the user's operating system, today we are together to recognize these common security vulnerabilities, so that we can do to treat them.
First, the LSASS-related vulnerability is a buffer overflow vulnerability in
Original link: http://www.ibm.com/developerworks/cn/web/1012_weiqiang_webattack/
Introduction: WEB Security issues are often overlooked by programmers because they believe that there will be a professional operational staff or security Service team to help them find vulnerabilities and instruct them to modify them. And for small companies, there is no such professional staff and how to do it. Security vulnerabili
Article Title: Root Cause of anonymous (spam)-vulnerabilities that are unavoidable on almost all servers on the Internet ". Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
When you see the title of this article, many people may know this "Vulnerability". Some people know this "Vulnerability" during reading the arti
See a foreign MVP Troy Hunt article: 67% of the ASP. Websites has serious configuration related security vulnerabilities, to the effect of the statistics he collects , about 67% of the ASP. NET site is misconfigured and has a security risk.Troy Hunt The analysis of the article came from a simple website scan service--asafaweb He developed, automated Security Analyser for ASP. Users who provide url,asafaweb that expose an ASP. NET site on the Internet
Yesterday, Microsoft pushed the July security patch, the MS13-055 is for IE Cumulative Security Patch, fixed 17 secret reporting vulnerabilities, these vulnerabilities may cause remote code execution, affects IE6, IE7, IE8, IE9, and IE10. Several hours after the patch was released, Microsoft quietly modified its page. Before that, Microsoft said no one had used these vu
Release date:Updated on:
Affected Systems:Astium VoIP PBX Description:--------------------------------------------------------------------------------Bugtraq id: 57097Astium is a network telephone switch.Astium PBX 2.1 and earlier versions have multiple security vulnerabilities. These vulnerabilities allow attackers to bypass authentication on login pages through SQL injection, access them as administrators
Multiple Remote Security Vulnerabilities in FFmpeg
Release date:Updated on: 2012-04-10
Affected Systems:FFmpeg 0.xDescription:--------------------------------------------------------------------------------FFmpeg is a free software that allows you to perform video, transfer, and stream functions in multiple formats of audio and video.
When FFmpeg parses some parameters, processes some action data, and decodes some proportional data, the function "s
Multiple local security vulnerabilities in Linux Kernel Econet
Release date:Updated on:
Affected Systems:Debian Linux 5.0 xLinux kernel 2.6.0-2.6.36Linux kernel 2.6.0-2.6.26Ubuntu Linux 9.10-10.04Unaffected system:Linux kernel 2.6.37-rc2Linux kernel 2.6.37-rc2Description:--------------------------------------------------------------------------------Bugtraq id: 45072Cve id: CVE-2010-3848, CVE-2010-3849, CVE-2010-3850
Linux Kernel is the Kernel used
Release date:Updated on:
Affected Systems:IBM Lotus Notes 8.xIBM Lotus Notes 7.xIBM Lotus Notes 6.xAutonomy KeyviewDescription:--------------------------------------------------------------------------------Bugtraq id: 47962Cve id: CVE-2011-1512
The IBM Lotus Notes software provides users with single-point access, helping them create, query, and share knowledge, collaborate with teams, and take appropriate actions.
IBM Lotus Notes has multiple buffer overflow
Android reproduce security vulnerabilities, and hackers can use lengthy characters to crack them.
Many security vulnerabilities on smartphones are related to screen locking. However, this new vulnerability directly bypasses the vulnerability to hack into the mobile phone. A hacker discovered that in the Android 5.x Lollipop system, he could use lengthy characters to break its security. He only needs to ope
Kaspersky security software detects vulnerabilities that can be exploited
Google's Project Zero security team published a blog saying that the Russian security company Kaspersky's anti-virus software has discovered multiple serious vulnerabilities, ranging from network intrusion detection, SSL interception, and file scanning, integrate with browsers and enhance local privileges. Security researchers said t
Multiple Memory Corruption Vulnerabilities in Kaspersky Antivirus
Affected Systems:
Kaspersky Labs Kaspersky AntivirusDescription:
Bugtraq id: 77608
Kaspersky Antivirus is a very popular anti-virus software.
Kaspersky Antivirus has multiple memory corruption vulnerabilities. Attackers can exploit these vulnerabilities to execute arbitrary code in the affecte
WordPress released patches to fix just-exposed Security Vulnerabilities
WordPress Content Management System has been exposed to two cross-site scripting vulnerabilities, allowing attackers to embed malicious code in the WordPress Comment area to steal and modify the administrator password, and create a new Administrator account, execute arbitrary code on the server. Vu
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.