BlackCat CMS 'cattranslate. php' Cross-Site Scripting Vulnerability

cve

BlackCat CMS 'cattranslate. php' Cross-Site Scripting Vulnerability Released on: 2014-09-03Updated on: 2014-09-04 Affected Systems:BlackCat CMS 1.0.3BlackCat CMSDescription:-----------------------------------------------------------------------------

How can we solve the problem of Linux malware plaguing servers?

How can we solve the problem of Linux malware plaguing servers? Linux may not have the same malware problems as other platforms you are familiar with, but there are still some problems that plague Linux administrators. What is the best open-source

HP StoreOnce D2D Backup System unauthorized remote access and Modification Vulnerability

HP StoreOnce D2D Backup System unauthorized remote access and Modification Vulnerability Release date:Updated on: 2013-06-27 Affected Systems:HP StoreOnce D2D Backup SystemDescription:----------------------------------------------------------------

Cerberus FTP Server HTTP/S Web Client Security Restriction Bypass Vulnerability

Cerberus FTP Server HTTP/S Web Client Security Restriction Bypass Vulnerability Release date:Updated on: Affected Systems:Cerberus FTP Server Description:--------------------------------------------------------------------------------Cerberus FTP

Apache Cordova For Android Security Restriction Bypass Vulnerability (CVE-2014-3500)

Apache Cordova For Android Security Restriction Bypass Vulnerability (CVE-2014-3500) Release date:Updated on: Affected Systems:Apache Group Cordova Description:--------------------------------------------------------------------------------Bugtraq

OpenSSL anonymous ECDH Denial of Service Vulnerability (CVE-2014-3470)

OpenSSL anonymous ECDH Denial of Service Vulnerability (CVE-2014-3470) Release date:Updated on: 2014-06-06 Affected Systems:OpenSSL Project OpenSSL OpenSSL Project OpenSSL OpenSSL Project OpenSSL Description:------------------------------------------

Source code shows that NSA uses Tor server as the target

Source code shows that NSA uses Tor server as the target For the first time, German public television station ARD disclosed source code snippets of the NSA Monitoring System XKeyscore to the world. ARD did not specifically indicate whether the

Ruby on Rails 'activerecord 'SQL Injection Vulnerability (CVE-2014-3482)

Ruby on Rails 'activerecord 'SQL Injection Vulnerability (CVE-2014-3482) Release date:Updated on: Affected Systems:Ruby on RailsDescription:--------------------------------------------------------------------------------Bugtraq id: 68343CVE (CAN)

Multiple security vulnerabilities in earlier versions of Apple iOS 7.1.2

Multiple security vulnerabilities in earlier versions of Apple iOS 7.1.2 Release date:Updated on: Affected Systems:Apple iOS Description:--------------------------------------------------------------------------------Bugtraq id: 68276CVE (CAN) ID:

Daily (9/9) virus warning qqhuaxia account theft Trojan steals QQ Password

"Hacker aq" (Win32.Troj. onlineGame. aq.49152) This is a trojan program that steals "QQ", "QQGAME", and "westward journey 2" from customers' computers, this trojan finds the anti-virus software window by searching the window and sends a closed

The cyber security company claims that malicious Trojans are hidden on Yahoo's online ad trading platform.

  ScanSafe, a famous network security company, has recently been tested and found that a large number of malicious trojan programs have been hidden in Yahoo's "Right Media" online ad trading platform, if a user clicks these malicious advertisements,

Linux Kernel 'net _ ctl_permissions () 'Function Local Security Restriction Bypass Vulnerability

Release date:Updated on: Affected Systems:Linux kernel Description:--------------------------------------------------------------------------------Bugtraq id: 64471CVE (CAN) ID: CVE-2013-4270 Linux Kernel is the Kernel of the Linux operating system.

Microsoft Word Memory Corruption Vulnerability (CVE-2014-0260) (MS14-001)

Release date:Updated on: Affected Systems:Microsoft Word 2013Microsoft Word 2010Microsoft Word 2007Microsoft Word 2003Description:--------------------------------------------------------------------------------CVE (CAN) ID: CVE-2014-0260 Microsoft

Yum 'yum-cron/yum-cron.py 'Security Restriction Bypass Vulnerability

Release date:Updated on: Affected Systems:Baseurl yum 3.4.3Description:--------------------------------------------------------------------------------Bugtraq id: 65119CVE (CAN) ID: CVE-2014-0022 Yum is a package manager under Fedora and RedHat

Core FTP 'auth SSL 'Command DoS Vulnerability

Release date:Updated on: Affected Systems:Core FTP 1.xDescription:--------------------------------------------------------------------------------Bugtraq id: 65432CVE (CAN) ID: CVE-2014-1441 CoreFTP is a free FTP client. Core FTP 1.2 build 511

Apple iOS and TV secure transmission function connection verification Bypass Vulnerability

Release date:Updated on: Affected Systems:Apple TV Apple iOS Apple iOS Apple OS X Server Description:--------------------------------------------------------------------------------Bugtraq id: 65738CVE (CAN) ID: CVE-2014-1266 IOS is an operating

Remote code execution vulnerability in HP SiteScope 'loadfilecontents' SOAP request

Release date:Updated on: Affected Systems:HP mistum 11.21HP SiteScope 11.1xHP SiteScope 10.1xDescription:--------------------------------------------------------------------------------Bugtraq id: 65972CVE (CAN) ID: CVE-2013-6207 HP SiteScope is a

Difficulties and Countermeasures for network security management of confidential organizations

Difficulties and Countermeasures for network security management of confidential organizations Currently, the internal network security status of the security-related units of science and technology information is generally divided into two parts:

Easy settings enable your USB flash drive to prevent viruses

Easy settings enable your USB flash drive to prevent viruses The experience of USB flash drive poisoning must have been met. There are also a variety of solutions, some friends simply format, so many files are lost. This is because of fear of

View the CSRF Protection Policy of Yii2 requests

View the CSRF Protection Policy of Yii2 requestsFirst, draw a flowchart: 1. The problem is as follows: We are processing such a demand todayapp\controllers\LoginController.phpDefined inindex(Mainly used for non-Web page logon, suchCurl -X POST http:/

Total Pages: 1330 1 .... 157 158 159 160 161 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.