Multiple IDA Pro Security Vulnerabilities

Release date:Updated on: Affected Systems:Hex-Rays IDA Pro 6.2Description:--------------------------------------------------------------------------------Bugtraq id: 60116 IDA Pro is an interactive anti-assembler. The "qrealloc ()" and "qrealloc_or_

Researchers found the most advanced Android Trojan Horse

The security company Kaspersky report found that the most advanced Android Trojan can exploit unknown vulnerabilities in the Android operating system to escalate program permissions and prevent infected machines from attempting to uninstall

TYPO3 Multishop extended SQL Injection Vulnerability

Released on: 2013-06-03Updated on: 2013-06-26 Affected Systems:TYPO3 multihop Description:--------------------------------------------------------------------------------Bugtraq id: 60291CVE (CAN) ID: CVE-2013-4682 Typo3 is an open-source Content

Multiple Remote Security Vulnerabilities in HP Managed Printing Administration

Release date: 2011-12-22Updated on: 2013-07-30 Affected Systems:HP Managed Printing Administration 2.6.3Unaffected system:HP Managed Printing Administration 2.6.4Description:----------------------------------------------------------------------------

Proficy HMI/SCADA-CIMPLICITY Web Server Stack Overflow Vulnerability

Release date:Updated on: 2013-07-31 Affected Systems:Ge-ip Proficy CIMPLICITY 8.xDescription:--------------------------------------------------------------------------------CVE (CAN) ID: CVE-2013-2785 GE Proficy CIMPLICITY is a client/server

Signature vulnerability affecting Android 99% has been successfully fixed

A month ago, mobile security company Bluebox found a very serious security vulnerability, which affects almost 99% of Android devices in the past four years. This vulnerability allows hackers to inject malicious programs into any application without

Squash YAML Code Execution Vulnerability

Release date:Updated on: Affected Systems:SquashDescription:--------------------------------------------------------------------------------CVE (CAN) ID: CVE-2013-5036 Squash is an exception reporting and bug analysis tool. Squash has a

Huawei B153 3G/UMTS vro password leakage access Bypass

Release date:Updated on: Affected Systems:Huawei B153 3G/UMTS RouterDescription:--------------------------------------------------------------------------------Bugtraq id: 61616 Huawei B153 is a mobile access device. The firmware version of the

WellinTech KingView ActiveX Multiple Arbitrary File Overwrite Vulnerability

Release date: 2013-09-04Updated on: Affected Systems:Wellintech King View 6.53Description:--------------------------------------------------------------------------------Bugtraq id: 62419 Kingview is the first SCADA product for monitoring and

Fish-shell '/tmp/fishd. socket. user' local permission Escalation Vulnerability

Release date:Updated on: Affected Systems:Fish-shell 1.16.0-2.1.0Description:--------------------------------------------------------------------------------Bugtraq id: 67097CVE (CAN) ID: CVE-2014-2905 Fish is a Unix shell. Provides user-friendly

Information Leakage Vulnerability (CVE-2014-1296) for multiple Apple products)

Release date:Updated on: Affected Systems:Apple Mac OS XDescription:--------------------------------------------------------------------------------Bugtraq id: 67024CVE (CAN) ID: CVE-2014-1296 OS x (formerly Mac OS X) is the latest version of Apple'

FortiGuard FortiWeb permission Escalation Vulnerability

Release date:Updated on: Affected Systems:FortiGuard FortiWeb Description:--------------------------------------------------------------------------------CVE (CAN) ID: CVE-2014-1957 FortiGate security products can detect and eliminate network

Nginx SPDY Implementation Arbitrary Code Execution Vulnerability (CVE-2014-0088)

Release date:Updated on: Affected Systems:Nginx 1.5.10Description:--------------------------------------------------------------------------------Bugtraq id: 67507CVE (CAN) ID: CVE-2014-0088 Nginx is an HTTP and reverse proxy server. It is also used

Verification of SMS verification of a Wi-Fi hotspot can be bypassed if the design is inappropriate

The mobile phone number is required to receive the verification code for haidcube hotspot authentication. However, this verification code is leaked due to design problems. You only need to open the developer mode of the browser and click get

Build a DMZ penetration test lab with a hand from a foreigner

 Note:Hello everyone. Next we will bring you two foreign articles about building a penetration environment. This is the first article. If there is something wrong with the translation, please take a look. The following steps describe how to

A social engineering attack

First, modify the ettecap Configuration: /Usr/local/share/ettercap/etter. dns File Add the URL you want to cheat, such as mails.gmail.com A 10.0.0.12 Start ettercap: ettercap-G Perform arp man-in-the-middle attacks, manage the plug-in, and

360 released technical analysis and repair solutions for "1. 21 national DNS faults"

At around 03:10 P.M. on January 26, January 21, the root server of general top-level domains in China suddenly experienced an exception. A large number of website domain names were hijacked to the IP address 65.49.2.178, resulting in resolution

Unbind the RSA encryption of Renren's logon Password

There are two types of passwords in the world: one is to prevent your little sister from peeking at your files; the other is to prevent the authorities from reading your files.-- Bruce Schneier application Cryptography The legendary "plaintext

Wei Shitong pushed four full series of New Products

On October 14, the "National Team" of Information Security and Wei Shitong Information Industry Co., Ltd., the first joint-stock enterprise in China that specializes in information security, held a new product launch conference on October 10. Du

Analysis of SSRF attack instances (1)

Ssrf attack Overview Many web applications provide the ability to retrieve data from other servers. With the URL specified by the user, the web application can obtain images, download files, and read file content. If this function is maliciously

Total Pages: 1330 1 .... 488 489 490 491 492 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.