The WhatsApp server has a vulnerability. You can add irrelevant persons to a private group.
REUTERS
Since 2016, WhatsApp has provided end-to-end encryption for its communication services, encrypting text, photos, and video content between users,
Microsoft Windows NetBIOS Spoofing Vulnerability (CVE-2016-3299) (MS16-077)Microsoft Windows NetBIOS Spoofing Vulnerability (CVE-2016-3299) (MS16-077)
Release date:Updated on:Affected Systems:
Microsoft Windows Vista SP2Microsoft Windows Server 2012
Researchers use bypass attacks to steal encrypted information
The attacks against SSL/TLS discovered in the past few years usually require attackers to be in the middle, that is, requiring them to sniff or manipulate traffic. Two security
Linux kernel usbip_recv_xbuff DoS Vulnerability (CVE-2016-3955)Linux kernel usbip_recv_xbuff DoS Vulnerability (CVE-2016-3955)
Release date:Updated on:Affected Systems:
Linux kernel
Description:
CVE (CAN) ID: CVE-2016-3955Linux Kernel is the
Linux kernel tipc_nl_publ_dump DoS Vulnerability (CVE-2016-4951)Linux kernel tipc_nl_publ_dump DoS Vulnerability (CVE-2016-4951)
Release date:Updated on:Affected Systems:
Linux kernel
Description:
CVE (CAN) ID: CVE-2016-4951Linux Kernel is the
Libxml2 xmlStringGetNodeList Function Denial of Service Vulnerability (CVE-2016-3627)Libxml2 xmlStringGetNodeList Function Denial of Service Vulnerability (CVE-2016-3627)
Release date:Updated on:Affected Systems:
Libxml libxml2
Description:
Php gd DoS Vulnerability (CVE-2015-8874)Php gd DoS Vulnerability (CVE-2015-8874)
Release date:Updated on:Affected Systems:
PHP
Description:
CVE (CAN) ID: CVE-2015-8874PHP is a widely used scripting language. It is especially suitable for Web
Linux ASLR vulnerability: attackers can disable ASLR (CVE-2016-3672) infinitely)
Recently, security personnel fixed an old vulnerability in Linux ASLR. Any user with 32-bit application permissions on x86 Devices, you can disable ASLR by setting the
Technology sharing: Anti-debugging with exceptions
0 × 01 IntroductionSome articles have introduced how to combat debuggers by detecting exceptions. The idea is simple: depending on the design intent, the debugger will handle specific exceptions. If
Php-fpm dead solution, script background restarts automatically
I used nginx + php7 to build a server, because the request volume is too large, and there are pending tasks in php, causing the php-fpm to often die during peak hours, the maximum
The most common attack methods and solutions for website security
In the process of website construction, network security is the most critical. Only a secure network environment can ensure the secure and stable operation of an enterprise's network.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.