Ubuntu 16.04 LTS kernel update, fixed 15 Security Vulnerabilities

Ubuntu 16.04 LTS kernel update, fixed 15 Security Vulnerabilities Canonical released the first kernel update for Ubuntu 16.04 LTS since its release in April 21, 2016. This update fixes 15 Security Vulnerabilities found by Different developers,

Arbitrary RPC call Vulnerability (CVE-2015-6552)

cve

Arbitrary RPC call Vulnerability (CVE-2015-6552)Arbitrary RPC call Vulnerability (CVE-2015-6552) Release date:Updated on:Affected Systems: Veritas Backup Exec 7.x - 7.5.0.7Veritas Backup Exec 7.7.x Veritas Backup Exec 7.6.1.x - 7.6.1.2Veritas Backup

Samba protocol downgrade Denial of Service Vulnerability (CVE-2015-5370)

Samba protocol downgrade Denial of Service Vulnerability (CVE-2015-5370)Samba protocol downgrade Denial of Service Vulnerability (CVE-2015-5370) Release date:Updated on:Affected Systems: Samba Samba 4.x-4.2.11Samba Samba 4.4.x-4.4.2Samba Samba 4.3.x-

Samba NTLMSSP protocol degradation vulnerability (CVE-2016-2110)

Samba NTLMSSP protocol degradation vulnerability (CVE-2016-2110)Samba NTLMSSP protocol degradation vulnerability (CVE-2016-2110) Release date:Updated on:Affected Systems: Samba Samba 4.x-4.2.11Samba Samba 4.4.x-4.4.2Samba Samba 4.3.x-4.3.8Samba

Wireshark TShark parser Denial of Service Vulnerability (CVE-2016-4077)

cve

Wireshark TShark parser Denial of Service Vulnerability (CVE-2016-4077)Wireshark TShark parser Denial of Service Vulnerability (CVE-2016-4077) Release date:Updated on:Affected Systems: Wireshark 2.0.x Description: CVE (CAN) ID:

Squid ESI Information Leakage Vulnerability (CVE-2016-4053)

Squid ESI Information Leakage Vulnerability (CVE-2016-4053)Squid ESI Information Leakage Vulnerability (CVE-2016-4053) Release date:Updated on:Affected Systems: Squid 4.x Squid 3.x Description: CVE (CAN) ID: CVE-2016-4053Squid is an efficient

Linux kernel sotm_reclaim_thread DoS Vulnerability (CVE-2015-8845)

cve

Linux kernel sotm_reclaim_thread DoS Vulnerability (CVE-2015-8845)Linux kernel sotm_reclaim_thread DoS Vulnerability (CVE-2015-8845) Release date:Updated on:Affected Systems: Linux kernel Description: CVE (CAN) ID: CVE-2015-8845Linux Kernel is the

Linux kernel signal Denial of Service Vulnerability (CVE-2015-8844)

cve

Linux kernel signal Denial of Service Vulnerability (CVE-2015-8844)Linux kernel signal Denial of Service Vulnerability (CVE-2015-8844) Release date:Updated on:Affected Systems: Linux kernel 〈 4.3.5 Description: CVE (CAN) ID: CVE-2015-8844Linux

Analysis of struts2 vulnerability s2-029

Analysis of struts2 vulnerability s2-029I. Overview The struts2 029 vulnerability has been exposed for some time. There are some related analyses on the Internet. First, the vulnerability is determined to appear in the OGNL interpretation and

Huawei vswitch Memory leakage Vulnerability (CVE-2015-8677)

cve

Huawei vswitch Memory leakage Vulnerability (CVE-2015-8677)Huawei vswitch Memory leakage Vulnerability (CVE-2015-8677) Release date:Updated on:Affected Systems: Huawei switches Description: CVE (CAN) ID: CVE-2015-8677Huawei is a provider of

Huawei ICMPv6 DoS Vulnerability (CVE-2015-8676)

cve

Huawei ICMPv6 DoS Vulnerability (CVE-2015-8676)Huawei ICMPv6 DoS Vulnerability (CVE-2015-8676) Release date:Updated on:Affected Systems: Huawei switches Description: CVE (CAN) ID: CVE-2015-8676Huawei is a provider of information and

LibTIFF NeXTDecode Denial of Service Vulnerability (CVE-2015-1547)

cve

LibTIFF NeXTDecode Denial of Service Vulnerability (CVE-2015-1547)LibTIFF NeXTDecode Denial of Service Vulnerability (CVE-2015-1547) Release date:Updated on:Affected Systems: LibTIFF Description: CVE (CAN) ID: CVE-2015-1547LibTIFF is a library

Badlock vulnerability details announcement

Badlock vulnerability details announcement The vulnerability Badlock, which was publicized three weeks in advance, finally announced the details. Although its practices were criticized, the threats it disclosed were true. The Badlock vulnerability

The short URL service may expose your sensitive information.

The short URL service may expose your sensitive information.   Vitaly Shmatikov and Martin Georgiev, security researchers from Cornell Tech, found that if the web short site service uses predictable operations, sensitive information on the website

Test lab V8 online penetration LAB tutorial (1)

Test lab V8 online penetration LAB tutorial (1) Test Lab is an online Penetration Test Virtual Lab similar to the offline Security Lab. This lab environment contains 12 systems with various vulnerabilities and configuration errors. Each system has a

How did I access your Netease account (the official account is used as an example)

How did I access your Netease account (the official account is used as an example) Third-party logon via weibo on Netease news client can be bypassed. to log on to any user, take the official account as an example. Http://3g.163.com/ntes/special/00

Let's see how the social worker can get the address information of thousands of people & name phone number & amp; internal address book & amp; internal training materials, etc.

Let's see how the social worker can get the address and phone number of thousands of people, internal address book, internal training materials, etc. I feel that this attack method will trigger a wave in the future. In fact, there is no technical

"Heartbleed" vulnerability can cause password Leakage

"Heartbleed" vulnerability can cause password Leakage On October 10, security personnel discovered a trace of the Heartbleed vulnerability. Attackers can exploit this vulnerability to obtain user passwords and induce users to access forged websites.2

BadLock vulnerability technology tracking and risk protection

BadLock vulnerability technology tracking and risk protection Green Alliance technology continues to pay attention to the security trend in China. As early as September, the BadLock Threat warning announcement was released immediately. On September 1

Arbitrary File Upload on an important website of the chain leads to getshell (the root permission can be roaming through the Intranet)

Arbitrary File Upload on an important website of the chain leads to getshell (the root permission can be roaming through the Intranet) Arbitrary File Upload on an important website of the chain leads to getshell (the root permission can be roaming

Total Pages: 1330 1 .... 1115 1116 1117 1118 1119 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.