1. SQL Slammer a week after Microsoft released its SQL patch, the flaw was presented at the Black Hat meeting by researchers David. The Slammer worm, which used the flaw, made the internet a big jam in 2003. 2. In April 2005, researchers at Windows Plug and Play Internet security systems discovered the Windows flaw, which enabled hackers to control defective systems and execute code remotely. By August, there had been a Zotob worm using the flaw. 3. Prior to Cisco IOS Stack overflow, ISS researcher Michael showed in July 2005 that hackers could control a company's network with this flaw. Cisco later released the Patch software, but it sued Michael. 4. Windows Metafile researchers Moore and other researchers released code to exploit the flaw in January, and researchers Gilfanov developed unofficial solutions that prompted Microsoft to release patches 5 days earlier. 5. Oracle's data encryption red-database-security, a researcher who reported the flaw to Oracle in January 2006, released the Patch software the same month. 6, Oracle Plsql Network Guandavei The participants in Black hat in January demonstrated this flaw in Oracle's SQL process language extensions. Oracle has not yet released the appropriate patch software. 7, Apple's Mac IChat February 13, 2006, an anonymous person posted a link to the Osx/leap.a trojan virus on macrumors.com, the first virus on Apple's Mac OS x platform. 8, IE createTextRange () Defect researcher Andreas discovered the flaw in March, which enabled hackers to install software similar to malware-like keystroke logging on defective systems. The eeye Digital security company has released unofficial patch software. 9, ie HTA file Dutch researcher Jeffrey reported to Microsoft in March about the problem associated with IE's handling of HTML applications. When Microsoft voiced its displeasure, Jeffrey removed information from its website about the flaw. 10. The Sendmail SMTP Server software ISS discovered a flaw in the popular Internet e-mail software in March, and Sendmail immediately released the relevant patches. (Responsible editor ZHAOHB musicemail@sohu.com TEL: (010) 68476636-8007) to force (0 votes) (0 Votes) (0 votes) of the professional (0 vote) The title of the party (0 Votes) passed (0 Votes) The original: Security Research ten notorious moments Back to network security home
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.