SaltStack Salt multiple insecure temporary file creation vulnerabilities (CVE-2014-3563)

SaltStack Salt multiple insecure temporary file creation vulnerabilities (CVE-2014-3563) Release date:Updated on: Affected Systems:SaltStack salt Description:--------------------------------------------------------------------------------Bugtraq

Enhance Linux Desktop Security

Enhance Linux Desktop SecurityIntroduction Malicious attacks on computers are becoming increasingly popular. The GNU/Linux virus exists despite the much fewer viruses used to attack the GNU/Linux system than the Windows system. In addition, the

Kolibri buffer overflow vulnerability in CVE-2014-5289)

Kolibri buffer overflow vulnerability in CVE-2014-5289) Release date: Updated on:   Affected Systems: SENKAS Kolibri WebServer 2.0 SENKAS Kolibri WebServer Description: Bugtraq id: 69263 CVE (CAN) ID: CVE-2014-5289   Kolibri is a simple HTTP server

OpenSSL DTLS Remote Denial of Service Vulnerability (CVE-2014-3506)

OpenSSL DTLS Remote Denial of Service Vulnerability (CVE-2014-3506) Release date:Updated on: Affected Systems:OpenSSL Project OpenSSL Description:--------------------------------------------------------------------------------Bugtraq id: 69076CVE

MySQL and MariaDB Geometry query Denial of Service Vulnerability

cve

MySQL and MariaDB Geometry query Denial of Service Vulnerability Release date:Updated on: 2013-03-18 Affected Systems:MySQL AB MySQLDescription:--------------------------------------------------------------------------------Bugtraq id: 58511CVE (CAN)

What are system vulnerabilities and patches?

What are system vulnerabilities and patches? System vulnerabilities may often be heard, but some new users do not know what system vulnerabilities are? Simply put, system vulnerabilities are operating system programs and components that may have

Wireshark RLC parser DoS Vulnerability (CVE-2014-5164)

Wireshark RLC parser DoS Vulnerability (CVE-2014-5164) Release date:Updated on: Affected Systems:Wireshark Description:--------------------------------------------------------------------------------Bugtraq id: 69002CVE (CAN) ID:

Trusted Boot 'loader. c' Security Bypass Vulnerability

cve

Trusted Boot 'loader. c' Security Bypass Vulnerability Release date:Updated on: Affected Systems:Trusted BootDescription:--------------------------------------------------------------------------------Bugtraq id: 68960CVE (CAN) ID:

Sap fi Manager Self-Service hard-coded credential Security Restriction Bypass Vulnerability

Sap fi Manager Self-Service hard-coded credential Security Restriction Bypass Vulnerability Release date:Updated on: Affected Systems:Sap fi Manager Self-ServiceDescription:---------------------------------------------------------------------------

GNU Make pointer indirect reference Heap Overflow Vulnerability

GNU Make pointer indirect reference Heap Overflow Vulnerability Release date:Updated on: Affected Systems:GNU make 3.81Description:--------------------------------------------------------------------------------Bugtraq id: 68896 GNU Make is a

One successful test of Sohu and sogou Intranet roaming

One successful test of Sohu and sogou Intranet roaming0x01: During the early tests on sohu network, a large number of sohu IP addresses were collected. For specific cases, refer to my previous cases. This is not the focus. 0x02: Perform in-depth

How hackers bypass IDS for Buffer Overflow

How hackers bypass IDS for Buffer Overflow As a heavyweight product of enterprise security protection, IDS naturally becomes a target for hackers to crack. It turns out that bypassing IDS protection is completely feasible. The next article will

Campus Network Security and Prevention

Campus Network Security and Prevention At present, campus networks have been widely used in colleges and universities, followed by security problems and threats in network formation and use, this article analyzes various factors that affect campus

Shell determines whether a file exists

Shell determines whether a file existsThe Code is as follows:#! /Bin/sh# Determining whether a file exists# Link: www.jb51.net# Date: 2013/2/28 MyPath = "/var/log/httpd /"MyFile = "/var/log/httpd/access. log" # Here, the-x parameter determines

Malware hidden in the Registry-Poweliks

Malware hidden in the Registry-PoweliksA few days ago, GData, a foreign security company, found a relatively new type of malware and defined it as Poweliks. This malware can persistently infect the target machine, it is novel that the software will

Recently popular bamboo Trojans

Recently popular bamboo TrojansI encountered many similar scenarios some time ago: Without knowing it, a netizen finds that his computer is locked, and such information will appear during startup, & Lt; img class = "alignCenter" src =

Baidu mobile guard has benefited from its three major capabilities.

Baidu mobile guard has benefited from its three major capabilities. On September 18, August 26, Baidu mobile guard announced that it would create the industry's first open mobile security platform to provide the industry with three core mobile

Blue Coat discloses security risks arising from "one-day tour" Websites

Blue Coat discloses security risks arising from "one-day tour" Websites October 22, September 1, 2014-Blue Coat, a leading business support technology vendor, announced today that 71% of website host names appear for only 24 hours. Although the

Any user in the jindi email system is hijacked to add a system administrator.

Any user in the jindi email system is hijacked to add a system administrator. JDMAILThis email system has multiple high-risk vulnerabilities with design defects. 0x001 arbitrary user hijackingThis email system has an 8-or 9-bit string in the url

PageAdmin CMS latest SQL Injection

PageAdmin CMS latest SQL Injection PageAdmin CMS latest SQL Injection The log saving function of the system does not filter IP addresses, leading to the SQL injection vulnerability.  // PageAdmin.Logpublic void Save(int SiteId, int IsMaster, string

Total Pages: 1330 1 .... 391 392 393 394 395 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.