security vulnerability database

Learn about security vulnerability database, we have the largest and most updated security vulnerability database information on alibabacloud.com

SYMANTEC Firewall kernel Overflow Vulnerability exploitation-Security Return Method

SYMANTEC Firewall kernel Overflow Vulnerability exploitation-Security Return Method SoBeItThis vulnerability occurs in SYMDNS. in SYS, when a DNS response is processed, because the total domain name length is not verified, you can enter a domain name that is too long to cause overflow. overflow occurs in RING0, IRQL = 2 (DISPATCH_LEVEL) process PID is 0 (idle pr

[Web Security] XXe Vulnerability Defense Learning (i)

, internal entity declarations and external entity declarations.Internal entity declaration: ENTITY entity-name "Entity-value" >Instance: XML version= "1.0" >External entity declaration: ENTITY entity-name SYSTEM "Url/url" >Default protocolPHP Extension ProtocolInstance: XML cersion= "1.0" >In the preceding code, the external entity "XXe" of the XML is given the value: FILE:///ETC/PASSWDWhen parsing an XML document, XXe is replaced with file:///ect/passwd content.Parameter entity + External enti

Linux Kernel Local Security Restriction Bypass Vulnerability (CVE-2015-6666)

Linux Kernel Local Security Restriction Bypass Vulnerability (CVE-2015-6666)Linux Kernel Local Security Restriction Bypass Vulnerability (CVE-2015-6666) Release date:Updated on:Affected Systems: Linux kernel Description: Bugtraq id: 76480CVE (CAN) ID: CVE-2015-6666Linux Kernel is the Kernel of the Linux operating

Google PinYin Input Method Security Vulnerability

Google PinYin Input Method is a very good input method. In fact, when I wrote this blog, I used the just-downloaded Google Pinyin input method. However, note that there is a serious security vulnerability in Windows Vista Implementation of the first version of Google PinYin Input Method (1.0.15.0. This vulnerability has been fixed in the latest version (1.0.16.0

Mozilla Firefox man-in-the-middle Security Restriction Bypass Vulnerability (CVE-2015-4483)

Mozilla Firefox man-in-the-middle Security Restriction Bypass Vulnerability (CVE-2015-4483)Mozilla Firefox man-in-the-middle Security Restriction Bypass Vulnerability (CVE-2015-4483) Release date:Updated on:Affected Systems: Mozilla Firefox Description: Bugtraq id: 76510CVE (CAN) ID: CVE-2015-4483Mozilla Firefox

Apache cxf saml SubjectConfirmation Security Restriction Bypass Vulnerability

Apache cxf saml SubjectConfirmation Security Restriction Bypass Vulnerability Release date:Updated on: Affected Systems:Apache Group CXF Apache Group CXF Description:Bugtraq id: 70736CVE (CAN) ID: CVE-2014-3623 Apache CXF is an open-source service framework used to compile and develop services using front-end programming APIs such as JAX-WS and JAX-RS. When Apache CXF versions earlier than 2.7.13 and Apache

Cisco Unified Communications Manager concurrent logon Security Restriction Bypass Vulnerability

Cisco Unified Communications Manager concurrent logon Security Restriction Bypass Vulnerability Release date:Updated on: Affected Systems:Cisco uniied Communications ManagerDescription:--------------------------------------------------------------------------------Bugtraq id: 69068CVE (CAN) ID: CVE-2014-3332Cisco uniied Communications Manager is an enterprise-level IP call handling system.The Cisco Unifie

Linux Kernel address restriction over-Control Security Vulnerability

Release date:Updated on: 2010-3 3 Affected Systems:Linux kernel 2.6.0-2.6.37Description:--------------------------------------------------------------------------------Bugtraq id: 45159 Linux Kernel is the Kernel used by open source Linux. A security vulnerability exists in the Linux Kernel address restriction over-control function. A local attacker can exploit this

Security personnel discovered the VMware storage permission expansion Vulnerability

Security personnel discovered the VMware storage permission expansion Vulnerability Recently, information security researchers found that VMware applications have the Privilege Escalation vulnerability. The affected products include ESXi, Fusion, Player, and Workstation. VMware also calls on users to update the serv

360 how to fix the HTTP Response Splitting vulnerability in website Security Detection

360 website security detection tell the truth, but it is not easy to detect some problems, but in some cases, it is still necessary to fix the problems. 360 there is an HTTP Response Splitting vulnerability in website security detection. Description: HTTP Response Splitting vulnerability, also known as CRLF Injection.

PHP "Unserialize ()" Security Vulnerability

PHP "Unserialize ()" Security Vulnerability Release date:Updated on: Affected Systems:PHP Description:CVE (CAN) ID: CVE-2014-8142 PHP is a widely used scripting language. It is especially suitable for Web development and can be embedded into HTML. In PHP versions earlier than 5.4.36, the "process_nested_data ()" function has the vulnerability of re-exploitati

2018-2019-1 20165228 Experimental Report on buffer overflow vulnerability of the basic design of information security system

2018-2019-1 20165228 "The foundation of Information security system Design" experimental report on Buffer Overflow Vulnerability Experiment Introduction:Buffer overflow attack: by writing to the program's buffer beyond its length content, causing buffer overflow, thereby destroying the program's stack, causing the program to crash or to make the program to execute other instructions to achieve the purpose o

Apache Struts Security Restriction Bypass Vulnerability (CVE-2015-0899)

Apache Struts Security Restriction Bypass Vulnerability (CVE-2015-0899)Apache Struts Security Restriction Bypass Vulnerability (CVE-2015-0899) Release date:Updated on:Affected Systems: Apache Group Struts 1.1 Description: Bugtraq id: 74423CVE (CAN) ID: CVE-2015-0899Struts is the open source code used to build Web appl

Gnu c Library Security Restriction Bypass Vulnerability (CVE-2015-8777)

Gnu c Library Security Restriction Bypass Vulnerability (CVE-2015-8777)Gnu c Library Security Restriction Bypass Vulnerability (CVE-2015-8777) Release date:Updated on:Affected Systems: Gnu c Library (glibc) Description: CVE (CAN) ID: CVE-2015-8777Glibc is the libc library released by GNU, that is, the c Runtime

IBM AppScan Security vulnerability Issue fix (. net)

=99999999999999999999Case Two: Login page button parameter, in the request body, did not find the reason???Http://localhost:83/login.aspx entity: Imgbtndl.y (Parameter)16. WebResource.axdWebresources.axd?d=xyz.One feature of WebResource.axd is that it generates 500 errors for the wrong ciphertext (that is, XYZ in d=xyz) and 404 errors for the correct ciphertext, which creates enough hintsResources:Http://www.2cto.com/Article/201009/75162.htmlhttp://pan.baidu.com/share/link?shareid=3851057069uk=2

Nettle x86_64/ecc-384-modp.asm Security Vulnerability (CVE-2015-8804)

Nettle x86_64/ecc-384-modp.asm Security Vulnerability (CVE-2015-8804)Nettle x86_64/ecc-384-modp.asm Security Vulnerability (CVE-2015-8804) Release date:Updated on:Affected Systems: Nettle nettle> 3.2 Description: CVE (CAN) ID: CVE-2015-8804Nettle is a low-level encryption library.In versions earlier than Nettle 3

Nettle ecc_256_modq Function Security Vulnerability (CVE-2015-8805)

Nettle ecc_256_modq Function Security Vulnerability (CVE-2015-8805)Nettle ecc_256_modq Function Security Vulnerability (CVE-2015-8805) Release date:Updated on:Affected Systems: Nettle nettle> 3.2 Description: CVE (CAN) ID: CVE-2015-8805Nettle is a low-level encryption library.In versions earlier than Nettle 3.2,

Multiple Asterisk products TLS Certificate verification Security Restriction Bypass Vulnerability (CVE-2015-3008)

Multiple Asterisk products TLS Certificate verification Security Restriction Bypass Vulnerability (CVE-2015-3008)Multiple Asterisk products TLS Certificate verification Security Restriction Bypass Vulnerability (CVE-2015-3008) Release date:Updated on:Affected Systems: Asterisk Open Source Asterisk Open Source 13.xAst

Php null pointer Multiple Security Restriction Bypass Vulnerability (CVE-2015-3412)

Php null pointer Multiple Security Restriction Bypass Vulnerability (CVE-2015-3412)Php null pointer Multiple Security Restriction Bypass Vulnerability (CVE-2015-3412) Release date:Updated on:Affected Systems: PHP PHP PHP Description: Bugtraq id: 75250CVE (CAN) ID: CVE-2015-3412PHP is a widely used scripting lang

CURL/libcURL Cookies handle Remote Security Bypass Vulnerability (CVE-2014-3620)

CURL/libcURL Cookies handle Remote Security Bypass Vulnerability (CVE-2014-3620) Release date:Updated on: Affected Systems:CURL 7.31.0-7.37.1Description:Bugtraq id: 69742CVE (CAN) ID: CVE-2014-3620 CURL/libcURL is a command line FILE transmission tool that supports FTP, FTPS, HTTP, HTTPS, GOPHER, TELNET, DICT, FILE, and LDAP. CURL/libcURL 7.31.0-7.37.1 mistakenly sets cookies for TLD. The Remote

Total Pages: 15 1 .... 9 10 11 12 13 .... 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.