OpenStack Horizon Resource Name Cross-Site Scripting Vulnerability (CVE-2014-3473)

OpenStack Horizon Resource Name Cross-Site Scripting Vulnerability (CVE-2014-3473) Release date:Updated on: Affected Systems:Openstack OpenStack Dashboard (Horizon)Description:------------------------------------------------------------------------

Linux Kernel local security function Bypass Vulnerability (CVE-2014-5207)

Linux Kernel local security function Bypass Vulnerability (CVE-2014-5207) Release date:Updated on: Affected Systems:Linux kernelDescription:--------------------------------------------------------------------------------Bugtraq id: 69216CVE (CAN) ID:

Citrix XenServer HVM Graphics Buffer Overflow Vulnerability (CVE-2014-4947)

Citrix XenServer HVM Graphics Buffer Overflow Vulnerability (CVE-2014-4947) Release date:Updated on: Affected Systems:Citrix XenServer 6.xDescription:--------------------------------------------------------------------------------Bugtraq id:

New Trojans intrude into Windows XP to steal users' credit card passwords

Security company Symantec researcher said recently that Microsoft Windows registered users may be locked by the latest phishing attacks. According to Vnunet reports, Symantec said the latest trojan virus can intrude into the Microsoft Windows XP

Thoughts on tcp packet and udp packet penetration network firewall tracing experiment

Through the httptunnel technology in this article, we can see that network security is unreliable only by some or some of the following methods, at the same time, the blind dependence on the security system often causes huge security risks. It is

Getting out of the eight main mistakes in anti-virus protection makes the system safer

With the popularization of computers and networks, there are also more and more viruses. In the face of such crazy viruses, anti-virus software manufacturers are constantly updating their own virus libraries. Most users are more careful when using

The latest version of Qihoo 360 can detect and kill more than 0.1 million types of Trojan viruses

With the increasing prevalence of Trojan viruses and the gradual decrease of "rogue software", Qihoo 360 security guard began to focus on trojan detection, removal, and defense, we strive to provide users with the most comprehensive security

Oracle Solaris 11 Express CIFS component Remote Security Vulnerability

Release date:Updated on: Affected Systems:Oracle Sun Solaris 11 ExpressDescription:--------------------------------------------------------------------------------Bugtraq id: 45864Cve id: CVE-2010-4457 Solaris is a commercial UNIX operating system

Foxit Reader Freetype Engine Remote Integer Overflow Vulnerability

Release date:Updated on: Affected Systems:Foxit Reader 4.xFoxit Reader 3.xFoxit Reader 2.xUnaffected system:Foxit Reader 4.0.0.0619Description:--------------------------------------------------------------------------------Bugtraq id: 48359Cve id:

Apache Wicket Cross-Site Scripting Vulnerability

Vulnerability title: Apache Wicket Cross-Site Scripting Moderate hazard level Whether or not to publish for the first time Release date: 1.01.08.25 Vulnerability cause input verification error Vulnerability-caused threats unauthorized

WordPress Donation Plugin "did" SQL Injection Vulnerability

Release date:Updated on: Affected Systems:WordPress WP Bannerize Plugin 2.xDescription:--------------------------------------------------------------------------------WordPress is a Blog (Blog, Blog) engine developed using the PHP language and

HP TCP/IP Services for OpenVMS unknown details Denial of Service Vulnerability

Release date: 2011-11-04Updated on: 2011-11-07 Affected Systems:HP TCP/IP Services for OpenVMS 5.7HP TCP/IP Services for OpenVMS 5.6Description:--------------------------------------------------------------------------------Bugtraq id: 50526Cve id:

SAP NetWeaver J2EE MeSync Information Leakage Vulnerability

Release date: 2011-11-11Updated on: 2011-11-23 Affected Systems:SAP NetWeaverDescription:--------------------------------------------------------------------------------SAP NetWeaver is the integrated technology platform of SAP and the technical

D-Link DSL-2640B MAC address Authentication Bypass Vulnerability

Release date:Updated on: Affected Systems:D-Link DSL-2640BDescription:--------------------------------------------------------------------------------Bugtraq id: 52129 D-Link DSL-2640B is an ADSL Wireless Router. D-Link DSL-2640B has

Endian UTM Firewall v2.4.x & amp; v2.5.0 multiple Web Security Vulnerabilities

Release date: 2012-03-01Updated on: Affected Systems:Endian UTM Firewall Appliance Application v2.5.xEndian UTM Firewall Appliance Application v2.4.xDescription:--------------------------------------------------------------------------------Endian

Siemens simatic WinCC Open Architecture insecure password hash Vulnerability

Release date:Updated on: Affected Systems:Siemens SIMATIC WinCC Open Architecture Description:--------------------------------------------------------------------------------Bugtraq id: 65339CVE (CAN) ID: CVE-2014-1696 Siemens SIMATIC WinCC is a

Linksys WRT120N 'fprintf () 'function Remote Stack Buffer Overflow Vulnerability

Release date:Updated on: Affected Systems:Linksys WRT120N 1.0.07Description:--------------------------------------------------------------------------------Bugtraq id: 65860 WRT120N is a wireless home router. Linksys WRT120N (firmware version 1.0.

Replicant detects suspicious backdoor implanted in Samsung Mobile Phone firmware

The AOSP-based free Android derivative edition Replicant developer found recently that there are suspicious Backdoor programs in Samsung's Galaxy series Mobile Phone firmware, allowing remote control of the system I/O through the modem. To put it

ShellShock: CVE-2014-6271 vulnerability and emergency repair methods

ShellShock: CVE-2014-6271 vulnerability and emergency repair methods About this vulnerabilityHello, a Linux security vulnerability was found to be more serious than "heartbleed", that is, the ShellShock: CVE-2014-6271 vulnerability, attackers can

Pay attention to architecture issues when selecting a Web application scan Solution

Pay attention to architecture issues when selecting a Web application scan Solution As attackers are increasingly cunning, the manual methods for locating and testing Web applications are far from enough. Appropriate Web application scanning

Total Pages: 1330 1 .... 137 138 139 140 141 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.