Consider Linux kernel vulnerabilities-general Linux technology-Linux technology and application information. For more information, see the following section. We discuss Linux security from Linux kernel vulnerabilities and the impacts of these vulnerabilities. This article focuses on several types of special vulnerabilities
The customer company evaluated our project with the evaluation software and found several security vulnerabilities, SQL injection and xss attacks. I read the server program code that has security vulnerabilities, it is found that the vulnerability occurs in the location where the page sends get or post data to the server. the back-end receives data using the CI framework...
The customer company evaluated ou
Three Windows Server SSL/TLS security vulnerabilities and their remedy
Not long ago, the simple use of SSL on Windows servers, or its successor TLS, were considered safe communication methods. But now the era has changed, and SSL and TLS have become corrupted. In the past few years, many serious security vulnerabilities that are worth your attention have been exposed one by one. Some have affected Windows s
Vulnerabilities
The following describes a series of common security vulnerabilities and briefly explains how these vulnerabilities are generated.
Known vulnerabilities and error configurations
Known vulnerabilities include operating systems used by Web applications and all
On Tuesday 2, Microsoft released the largest update since January February. A total of nine announcements were released to fix 14 vulnerabilities, including Office, IE, and various versions of Windows; nine of these vulnerabilities are critical, which is the highest level of Microsoft risk.Severity Level 6:MS07-042 (KB 936227): fixes Microsoft XML Core Service vulnerabi
High risk: Adobe fixed 35 vulnerabilities in Flash this week.
This week, Adobe released the latest version of Flash Player 18.0.0.133, which is a restoration enhanced version by convention. According to the update logs published today, as a result, up to 35 security vulnerabilities have been fixed at one time, and eight other regular updates have been made.
According to the Security Bulletin APSB15-19,
Analysis and Handling of Website Security Vulnerabilities1. Analysis and Handling of vulnerabilities in Web website programmingAuthor: Lu YuCurrently, there are many network security industries in China, from anti-virus software and software firewalls for personal computers provided by anti-virus software companies such as Kingsoft, rising star, and Jiangmin to hardware firewalls for servers, more and more mature technologies. It can be said that it i
Author: Mark Vogels
Translation: Ghost [S.S. T]
In this document, I will try to provide you with a basic understanding of errors, vulnerabilities caused by those errors, and their exploits. It never means that you can fully understand exploits and vulnerabilities, but it helps you learn about possible vulnerabilities and how to handle them.
Generally, three diff
The Open Web Application Security Project (OWASP) will soon release a list of 10 Web Application Security Vulnerabilities this year. This list is not much different from last year, indicating that the person in charge of application design and development still fails to solve the previous obvious mistakes. Many of the most common Web application vulnerabilities still exist widely. Many malware search and at
The Windows system is by far the most frequently used operating system, although its security has increased with the release of the update, but due to human-written reasons for the existence of vulnerabilities and defects. But mircosoft the security of the system by releasing patches to make Windows systems no longer compromised. As a result, users need to understand not only the Windows operating system's vulnera
Linux has become more and more popular among computer users. As a result, many people begin to learn about Linux. Today, we will explain how to use BackTrack to check Linux security vulnerabilities. I hope you will learn how to apply BackTrack to check Linux security vulnerabilities. It has always been a supporter of good commercial security testing tools, but you may no longer use paid tools. In fact, the
Whether you believe it or not, through the ASP, it may be easy to invade the Web server, the theft of files on the server, capture the Web database, such as the user password, or even malicious delete files on the server until the system damage, these are not sensational, and indeed have happened, This article will give you one by one to reveal the vulnerabilities of these ASP, and put forward some preventive advice.
In the last article, we focus on
Whether you believe it or not, through the ASP, it may be easy to invade the Web server, the theft of files on the server, capture the Web database, such as the user password, or even malicious delete files on the server until the system damage, these are not sensational, and indeed have happened, This article will give you one by one to reveal the vulnerabilities of these ASP, and put forward some preventive advice.
In the last article, we focus on t
The script looks at the current network security, the most attention and contact with the most Web page vulnerability should be ASP, in this respect, small bamboo is an expert, I have no say. However, in PHP, there are also serious security issues, but there are not many articles. Here, Let's talk a little bit about the vulnerabilities of PHP pages.
I have done a summary of the current common PHP vulnerabilities
About the importance of patches and security software from the exploitation of Nday VulnerabilitiesI. Blood cases caused by CVE-2014-6332
At the end of last year, 360 security center monitoring found that the number of webpage Trojans that had been relatively calm for a period of time had soared, and the spread of malware began to surge, A large number of cases of Trojan attacks caused by vulnerabilities continue to emerge. 360 web page protection is
Anti-virus attack and defense: Exploitation of simple program vulnerabilitiesI. PrefaceAll the "viruses" mentioned in the previous article are executable files (in the EXE format) and are malicious programs in the traditional sense. They start to execute their own code after being double-clicked and run by users, implement relevant functions to threaten users' computers. This time, I plan to discuss a special situation, that is, to use the vulnerabilities
Major Web Server Vulnerabilities include physical path leakage, CGI Source Code leakage, directory traversal, arbitrary command execution, buffer overflow, denial of service, SQL injection, conditional competition, and cross-site scripting, it is similar to CGI vulnerabilities, but more places are actually different. However, no matter what the vulnerabilities ar
The server vulnerability is the origin of security problems, the hacker attacks on the site are mostly from the search for each other's vulnerabilities began. Therefore, only by understanding their own vulnerabilities, site managers can take appropriate countermeasures to prevent foreign attacks. Here are some common vulnerabilities for servers, including Web ser
Multiple critical security vulnerabilities in OS X Yosemite
Emil Kvarnhammar from Swedish security company Truesec found multiple security vulnerabilities in OS X 10.10, codenamed Yosemite. He named it rootpipe. He published an article explaining how to discover these vulnerabilities and how to prevent them. These security v
I'm glad that the strong winds of one of Alibaba's young literary youths began to write blogs again, and they are all good young people who write blogs and share their technologies. Young people in literature are passionate. If you don't have to worry about writing a blog, you will write n Articles. Among them, "questions about is_a () function Execution Code of PHP", who will pay for vulnerabilities?" It is related to is_a () of php. "Security issues
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.