Google Chrome Security Vulnerabilities (CVE-2015-1265)Google Chrome Security Vulnerabilities (CVE-2015-1265)
Release date:Updated on:Affected Systems:
Google Chrome 43.0.2357.65
Description:
Bugtraq id: 74727CVE (CAN) ID: CVE-2015-1265Google Chrome is a Web browser tool developed by Google.Chrome versions earlier than 43.0.2357.65 have multiple security vulnerabilities
Google once again preemptively announces OS X System Vulnerabilities
Earlier, Google Project Zero announced the Windows 8.1 vulnerability before Microsoft released the fix update and was accused by Microsoft. This time it was Apple's OS X Yosemite. Project Zero announced three Yosemite system vulnerabilities this time, and their severity was defined as high. Google said they had privately informed Apple
Multiple McAfee Data Loss Prevention Endpoint Vulnerabilities
Release date:Updated on:
Affected Systems:McAfee Network Data Loss Prevention Unaffected system:McAfee Network Data Loss Prevention 9.3.400Description:McAfee Network Data Loss Prevention can monitor Network traffic to prevent Data Loss.
McAfee Data Loss Prevention Endpoint 9.3.300 and earlier versions have multiple security vulnerabilities. Re
Multiple security vulnerabilities in Google Chrome versions earlier than 38.0.2125.101
Release date: 2014-10-07Updated on: 2014-10-09
Affected Systems:Google Chrome Description:Bugtraq id: 70273CVE (CAN) ID: CVE-2014-3188, CVE-2014-3189, CVE-2014-3190, CVE-2014-3191, CVE-2014-3192, CVE-2014-3193, CVE-2014-3194, CVE-2014-3195, CVE-2014-3196, CVE-2014-3197
Google Chrome is a Web browser tool developed by Google.
Chrome versions earlier than 38.0.2125.10
Three steps to calmly deal with Bash Vulnerabilities
Although the bash vulnerability has caused an uproar in the industry, it has not collapsed. This is not the first and not the last one that has a huge destructive power. The problem is inevitable, but the key is what to do after the problem occurs.
Step 1: understand what happened.
Do not rush to take action first. Take some time to understand the severity, possible consequences and impacts of ba
Multiple SQL injection vulnerabilities in the Zend Framework Sqlsrv driver
Release date:Updated on:
Affected Systems:Zend FrameworkDescription:Bugtraq id: 70011
Zend Framework (ZF) is an open-source PHP5 development Framework that can be used to develop web programs and services.
Zend Framework has multiple SQL Injection Vulnerabilities. Attackers can exploit these
Detailed analysis of multiple TP-Link Network Camera VulnerabilitiesVulnerability description:Multiple vulnerabilities are found on the firmware of the TP-LinkTL-SC3171 IP Cameras Network Camera version LM.1.6.18P12 _ sign5, which allows attackers to do the following:1: [CVE-2013-2578] via file/cgi-bin/admin? Http://www.bkjia.com/kf/ware/vc/ "target =" _ blank "class =" keylink "> vc2vydmv0zxn01rtq0mjo0could/MHuoaM8YnIgLz4NCjKjuls8YSBocmVmPQ =" http:/
preparation of security issues are far behind the capabilities and Determination of professional and amateur hackers. Fortunately, many OEM security components and third-party products can provide sufficient protection for WWW, FTP, and Email Unix servers at risk.
Latency of application software in security design
At present, many applications running on the Internet are designed to defend against hacker attacks. Applications of the Client/Server structure designed for the LAN are directly conn
Release date: 2011-12-15Updated on:
Affected Systems:Seotoaster 1.9Description:--------------------------------------------------------------------------------Bugtraq id: 51077Cve id: CVE-2011-5230
Seotoaster is the seo cms and e-commerce site builder.
Seotoaster v1.9 and earlier versions have multiple SQL Injection Vulnerabilities. Successful exploitation of these vulnerabilities allows attackers to con
Release date:Updated on:
Affected Systems:Laytontechnology HelpBox 4.4.0Description:--------------------------------------------------------------------------------Bugtraq id: 56298Cve id: CVE-2012-4971, CVE-2012-4972, CVE-2012-4974, CVE-2012-4975, CVE-2012-4976
Layton Helpbox is a WEB-based desktop help system.
HelpBox 4.4.0 and other versions have multiple security vulnerabilities, attackers can exploit these
Release date:Updated on:
Affected Systems:WordPress GRAND Flash Album GalleryDescription:--------------------------------------------------------------------------------Bugtraq id: 56236
GRAND Flash Album Gallery for WordPress is a plug-in for managing image libraries, video libraries, recording sets, and Ad loop systems.
GRAND Flash Album Gallery has multiple security vulnerabilities, including SQL injection, directory traversal, and Arbitrary Fil
Release date:Updated on:
Affected Systems:ZEN Load Balancer 3.0 rc1ZEN Load Balancer 2.0Description:--------------------------------------------------------------------------------Bugtraq id: 55638
Zen Load Balancer is a device that creates a TCP Load Balancing Based On Debian.
ZEN Load Balancer 2.0 and 3.0 rc1 have security vulnerabilities. Attackers can exploit these vulnerabilities to execute arbitrary c
Multiple security vulnerabilities in Portech MV-372 VoIP Gateway
Release date:Updated on:
Affected Systems:PORTech MV-372Description:--------------------------------------------------------------------------------Bugtraq id: 48560
The MV-372 is a 2-channel VoIP GSM/CDMA/UMTS gateway for call terminals (VoIP to GSM/CDMA/UMTS to VoIP) and source (GSM/CDMA/UMTS to VoIP.
MV-372 has multiple security vulnerabilities
Multiple Ruby dragonfly Gem Remote Command Execution Vulnerabilities
Release date:Updated on:
Affected Systems:Dragonfly 1.0.5Description:--------------------------------------------------------------------------------Bugtraq id: 69395Dragonfly is an Rack framework for dynamic image processing.Dragonfly 1.0.5 and other versions have multiple Remote Command Execution Vulnerabilities. Attackers can exploit
Multiple vulnerabilities in Opera Web browser versions earlier than 12.10
Release date:Updated on:
Affected Systems:Opera Software Opera Web Browser 12.xDescription:--------------------------------------------------------------------------------Bugtraq id: 56407Opera provides free Web browsers for computers, mobile phones, and devices.Versions earlier than Opera Web Browser 12.10 have cross-site scripting, remote code execution, cross-domain informati
Multiple security vulnerabilities in Matterdaddy Market
Release date:Updated on: 2013-05-27
Affected Systems:Matterdaddy MarketDescription:--------------------------------------------------------------------------------Bugtraq id: 60150Matterdaddy Market is a Market and classified advertising script.Matterdaddy Market 1.4.2 and other versions have multiple security vulnerabilities. Remote attackers can expl
With the increasing number of video recording functions in various DV and digital cameras, there are more and more opportunities for consumers to use audio and video players to share and play personal living clips with friends and family. There are multiple buffer overflow vulnerabilities in popular Chinese Media Player "Storm audio and video" in China, some of which are under active attacks. The vulnerability is related to the ActiveX control plug-in
Jiang min reminds you today that in today's Virus, the Virus. Autorun. dr "U disk parasite" variants dr and TrojanDownloader. VB. rg "video baby" variants rg are worth noting.
Virus name: Virus. Autorun. dr
Chinese name: "U disk parasite" variant dr (also known as "Web page receiver ")
Virus length: 62512 bytes
Virus Type: Trojan
Hazard level:★★★
Affected Platforms: Win 9X/ME/NT/2000/XP/2003
Virus. Autorun. dr The "U disk parasite" variant dr is the latest variant of the "U disk parasite" family
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.