Alibabacloud.com offers a wide variety of articles about vpn security vulnerabilities, easily find your vpn security vulnerabilities information here online.
OpenSSL will release security patches tomorrow to fix undisclosed 0-day high-risk Vulnerabilities
OpenSSL officially issued a vulnerability warning, reminding the system administrator to prepare for OpenSSL upgrade. The latest version of OpenSSL will be released on April 9, July 9 (this Thursday) to fix an undisclosed high-risk vulnerability. Many security exper
Open-source components with known security vulnerabilities are still widely used.GuideSonatype, which provides Maven's central repository hosting service, says 1/16 of Java component downloads contain security issues. Sonatype claims that developers need to download more than 31 billion Java components each year, and more than 10 thousand new components and more
Release date:Updated on:
Affected Systems:CyaSSL Description:--------------------------------------------------------------------------------Bugtraq id: 66780CyaSSL is a small portable embedded SSL programming library for embedded system developers.In versions earlier than CyaSSL 2.9.4, there are multiple security vulnerabilities such as indirect NULL pointer reference, out-of-bounds memory reading, And X.
Release date:Updated on:
Affected Systems:Google Chrome Description:--------------------------------------------------------------------------------Bugtraq id: 61041CVE (CAN) ID: CVE-2013-2853, CVE-2013-2867, CVE-2013-2868, CVE-2013-2869, CVE-2013-2870, CVE-2013-2871, CVE-2013-2872, CVE-2013-2873, CVE-2013-2874, CVE-2013-2875, CVE-2013-2876, CVE-2013-2877
Google Chrome is a simple and efficient Web browser tool developed by Google.
Google Chrome earlier than 28.0.1500.71 has multiple
Release date:Updated on:
Affected Systems:FFmpeg 0.8.2FFmpeg 0.8.1FFmpeg 0.7.3FFmpeg 0.7.2FFmpeg 0.7-rc1Unaffected system:FFmpeg 0.8.4FFmpeg 0.7.5Description:--------------------------------------------------------------------------------Bugtraq id: 49736
FFmpeg is a free software that allows you to perform video, transfer, and stream functions in multiple formats of audio and video. Libavcodec is an open-source video encoding and decoding library for FFmpeg and Libav projects.
Multiple
Release date:Updated on:
Affected Systems:Google Chrome 8.xDescription:--------------------------------------------------------------------------------Bugtraq id: 45390Cve id: CVE-2010-3937
Google Chrome is a Web browser developed by Google.
Google Chrome versions earlier than 8.0.552.20.have multiple security vulnerabilities. Remote attackers can exploit these vulne
Release date:Updated on:
Affected Systems:Google Chrome 8.xUnaffected system:Google Chrome 9.0.597.84Description:--------------------------------------------------------------------------------Bugtraq id: 46144
Google Chrome is a Web browser developed by Google.
Google Chrome earlier than version 0.597.84 has multiple security vulnerabilities. Remote attackers can exploit these
Release date:Updated on:
Affected Systems:Google Chrome Unaffected system:Google Chrome 9.0.597.107Description:--------------------------------------------------------------------------------Bugtraq id: 46614
Google Chrome is a Web browser developed by Google.
Google Chrome earlier than version 0.597.107 has multiple security vulnerabilities. Attackers can exploit these
Release date:Updated on:
Affected Systems:Google Chrome 9.xGoogle Chrome 8.xGoogle Chrome 7.xGoogle Chrome 6.xGoogle Chrome 5.xGoogle Chrome 10.xUnaffected system:Google Chrome 10.0.648.205Description:--------------------------------------------------------------------------------Bugtraq id: 47377Cve id: CVE-2011-1300, CVE-2011-1301, CVE-2011-1302
Google Chrome is an Open source web browser developed by Google.
Google Chrome versions earlier than 10.0.648.205 have multiple
Release date:Updated on: 2012-08-02
Affected Systems:IBM Rational Directory ServerDescription:--------------------------------------------------------------------------------Bugtraq id: 54743Cve id: CVE-2012-2191
IBM Rational Directory Server is a solution that provides compatible Rational Tools with centralized and common infrastructure services or user verification, user management, Group definition, user data storage, and application data storage.
The IBM Rational Directory Server has mult
P2p financial security: Multiple SQL injection vulnerabilities on a platform
P2p financial security: Multiple SQL injection vulnerabilities on a platform
Qian loan Network (www.moneydai.com), as a professional P2P network lending institution, is affiliated to Shenzhen xingrong Internet Financial Service Co., Ltd., a
phones."Errata Security also announced a vulnerability in the iPhone Bluetooth function. By using fuzzer to test the vulnerability, it is found that attackers can easily use conventional methods to completely lock the iPhone.At present, Apple representatives have not responded to questions about iPhone security.Since the release of the iPhone last Friday, hackers have been scrambling to discover security
Multiple security vulnerabilities in earlier versions of Google V8 4.3.61.21Multiple security vulnerabilities in earlier versions of Google V8 4.3.61.21
Release date:Updated on:Affected Systems:
Google V8 JavaScript Engine
Description:
Bugtraq id: 74730V8 is Google's open-source JavaScript Engine.Chrome V8 versions e
LTE security vulnerabilities allow hackers to send false emergency alerts
Any electronic technology may have security vulnerabilities, even the mobile network technology itself is no exception. Researchers at the U. S. Pudu University and the University of Iowa have published a report describing the existence of sever
The authoritative security organization Owasp has just updated top 10:https://www.owasp.org/index.php/top_10_2013-top_10 ten security vulnerabilities: 1. injection, including SQL, operating system, and LDAP injection. 2. Problematic identification of session management. 3. Cross-site scripting attacks (XSS). 4. Unsafe direct object references. 5.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.