The WhatsApp server has a vulnerability. You can add irrelevant persons to a private group.

The WhatsApp server has a vulnerability. You can add irrelevant persons to a private group. REUTERS Since 2016, WhatsApp has provided end-to-end encryption for its communication services, encrypting text, photos, and video content between users,

Microsoft Windows NetBIOS Spoofing Vulnerability (CVE-2016-3299) (MS16-077)

Microsoft Windows NetBIOS Spoofing Vulnerability (CVE-2016-3299) (MS16-077)Microsoft Windows NetBIOS Spoofing Vulnerability (CVE-2016-3299) (MS16-077) Release date:Updated on:Affected Systems: Microsoft Windows Vista SP2Microsoft Windows Server 2012

Researchers use bypass attacks to steal encrypted information

Researchers use bypass attacks to steal encrypted information The attacks against SSL/TLS discovered in the past few years usually require attackers to be in the middle, that is, requiring them to sniff or manipulate traffic. Two security

Apache Archiva XSS Vulnerability (CVE-2016-5005)

cve

Apache Archiva XSS Vulnerability (CVE-2016-5005)Apache Archiva XSS Vulnerability (CVE-2016-5005) Release date:Updated on:Affected Systems: Apache Group Archiva Description: CVE (CAN) ID: CVE-2016-5005Archiva is a remote storage management

PHP virtual_file_ex DoS Vulnerability (CVE-2016-6289)

cve

PHP virtual_file_ex DoS Vulnerability (CVE-2016-6289)PHP virtual_file_ex DoS Vulnerability (CVE-2016-6289) Release date:Updated on:Affected Systems: PHP PHP 7.x PHP 5.6.x Description: CVE (CAN) ID: CVE-2016-6289PHP is a widely used scripting

Apache Tomcat HTTP_PROXY environment variable Security Vulnerability (CVE-2016-5388)

cve

Apache Tomcat HTTP_PROXY environment variable Security Vulnerability (CVE-2016-5388)Apache Tomcat HTTP_PROXY environment variable Security Vulnerability (CVE-2016-5388) Release date:Updated on:Affected Systems: Apache Group Tomcat Description: CVE

WordPress oEmbed Protocol Denial of Service Vulnerability (CVE-2016-5836)

cve

WordPress oEmbed Protocol Denial of Service Vulnerability (CVE-2016-5836)WordPress oEmbed Protocol Denial of Service Vulnerability (CVE-2016-5836) Release date:Updated on:Affected Systems: WordPress Description: CVE (CAN) ID:

WordPress column_title XSS Vulnerability (CVE-2016-5833)

cve

WordPress column_title XSS Vulnerability (CVE-2016-5833)WordPress column_title XSS Vulnerability (CVE-2016-5833) Release date:Updated on:Affected Systems: WordPress Description: CVE (CAN) ID: CVE-2016-5833WordPress is a blog platform

FortiWeb Cross-Site Request Forgery (CVE-2016-4066)

cve

FortiWeb Cross-Site Request Forgery (CVE-2016-4066)FortiWeb Cross-Site Request Forgery (CVE-2016-4066) Release date:Updated on:Affected Systems: Fortinet FortiWeb 5.5.3 Description: CVE (CAN) ID: CVE-2016-4066FortiGate security products can

Linux kernel usbip_recv_xbuff DoS Vulnerability (CVE-2016-3955)

cve

Linux kernel usbip_recv_xbuff DoS Vulnerability (CVE-2016-3955)Linux kernel usbip_recv_xbuff DoS Vulnerability (CVE-2016-3955) Release date:Updated on:Affected Systems: Linux kernel Description: CVE (CAN) ID: CVE-2016-3955Linux Kernel is the

PHP exif_process_IFD_TAG Denial of Service Vulnerability (CVE-2016-4542)

cve

PHP exif_process_IFD_TAG Denial of Service Vulnerability (CVE-2016-4542)PHP exif_process_IFD_TAG Denial of Service Vulnerability (CVE-2016-4542) Release date:Updated on:Affected Systems: PHP PHP 7.x PHP 5.6.x Description: CVE (CAN) ID: CVE-201

Linux kernel tipc_nl_publ_dump DoS Vulnerability (CVE-2016-4951)

cve

Linux kernel tipc_nl_publ_dump DoS Vulnerability (CVE-2016-4951)Linux kernel tipc_nl_publ_dump DoS Vulnerability (CVE-2016-4951) Release date:Updated on:Affected Systems: Linux kernel Description: CVE (CAN) ID: CVE-2016-4951Linux Kernel is the

Libxml2 xmlStringGetNodeList Function Denial of Service Vulnerability (CVE-2016-3627)

Libxml2 xmlStringGetNodeList Function Denial of Service Vulnerability (CVE-2016-3627)Libxml2 xmlStringGetNodeList Function Denial of Service Vulnerability (CVE-2016-3627) Release date:Updated on:Affected Systems: Libxml libxml2 Description:

Php gd DoS Vulnerability (CVE-2015-8874)

cve

Php gd DoS Vulnerability (CVE-2015-8874)Php gd DoS Vulnerability (CVE-2015-8874) Release date:Updated on:Affected Systems: PHP Description: CVE (CAN) ID: CVE-2015-8874PHP is a widely used scripting language. It is especially suitable for Web

Samba LDAP protocol downgrade Vulnerability (CVE-2016-2112)

Samba LDAP protocol downgrade Vulnerability (CVE-2016-2112)Samba LDAP protocol downgrade Vulnerability (CVE-2016-2112) Release date:Updated on:Affected Systems: Samba Samba 4.x-4.2.11Samba Samba 4.4.x-4.4.2Samba Samba 4.3.x-4.3.8Samba Samba

Apache Struts arbitrary tresult Arbitrary Code Execution Vulnerability (CVE-2016-3082)

cve

Apache Struts arbitrary tresult Arbitrary Code Execution Vulnerability (CVE-2016-3082)Apache Struts arbitrary tresult Arbitrary Code Execution Vulnerability (CVE-2016-3082) Release date:Updated on:Affected Systems: Apache Group Struts 2.x Apache

Linux ASLR vulnerability: attackers can disable ASLR (CVE-2016-3672) infinitely)

cve

Linux ASLR vulnerability: attackers can disable ASLR (CVE-2016-3672) infinitely) Recently, security personnel fixed an old vulnerability in Linux ASLR. Any user with 32-bit application permissions on x86 Devices, you can disable ASLR by setting the

Technology sharing: Anti-debugging with exceptions

Technology sharing: Anti-debugging with exceptions 0 × 01 IntroductionSome articles have introduced how to combat debuggers by detecting exceptions. The idea is simple: depending on the design intent, the debugger will handle specific exceptions. If

Php-fpm dead solution, script background restarts automatically

Php-fpm dead solution, script background restarts automatically I used nginx + php7 to build a server, because the request volume is too large, and there are pending tasks in php, causing the php-fpm to often die during peak hours, the maximum

The most common attack methods and solutions for website security

The most common attack methods and solutions for website security In the process of website construction, network security is the most critical. Only a secure network environment can ensure the secure and stable operation of an enterprise's network.

Total Pages: 1330 1 .... 522 523 524 525 526 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.