Squid HTTP header port number processing DoS Vulnerability

Squid HTTP header port number processing DoS Vulnerability Release date:Updated on: 2013-07-16 Affected Systems:Squid 3.xDescription:--------------------------------------------------------------------------------CVE (CAN) ID: CCVE-2013-4123 Squid

Gnu gcc 'libstdc ++ 'Library Memory Corruption Vulnerability

Gnu gcc 'libstdc ++ 'Library Memory Corruption Vulnerability Release date:Updated on: Affected Systems:GNU gcc 4.9.0Description:--------------------------------------------------------------------------------Bugtraq id: 69032 GCC (GNU Compiler

AlienVault OSSIM 'ws _ data' parameter SQL Injection Vulnerability

AlienVault OSSIM 'ws _ data' parameter SQL Injection Vulnerability Release date:Updated on: Affected Systems:AlienVault OSSIMDescription:--------------------------------------------------------------------------------Bugtraq id: 68996CVE (CAN) ID:

Multiple SQL Injection Vulnerabilities in DedeCMS

Multiple SQL Injection Vulnerabilities in DedeCMS Release date: 2011-12-30Updated on: Affected Systems:Dedecms Description:--------------------------------------------------------------------------------Bugtraq id: 51211Cve id: CVE-2011-5200 DedeCms

Apache Subversion insecure authentication vulnerability (CVE-2014-3528)

Apache Subversion insecure authentication vulnerability (CVE-2014-3528) Release date:Updated on: Affected Systems:Apache Group Subversion 1.8.9-2Apache Group Subversion 1.6.17dfsg-4 + deb7u6Apache Group Subversion 1.6.17dfsg-4 + deb7u3Apache Group

SAProuter password Timed Attack Vulnerability

SAProuter password Timed Attack Vulnerability Release date:Updated on: Affected Systems:SAP SAProuter 721 patch level 117SAP SAProuter 720 patch level 411SAP SAProuter 710 patch level 029Description:---------------------------------------------------

The replacement is not doing better yet, and the pseudo-random generator of LibreSSL is not safe.

The replacement is not doing better yet, and the pseudo-random generator of LibreSSL is not safe. OpenSSL branch LibreSSL portable has just released the first version 2.0.0 (updated to 2.0.1). Although the version number is 2.0.0, it is only a

GNU a2ps Arbitrary Command Execution Vulnerability (CVE-2014-0466)

GNU a2ps Arbitrary Command Execution Vulnerability (CVE-2014-0466) Release date:Updated on: Affected Systems:GNU a2ps 4.14Description:--------------------------------------------------------------------------------Bugtraq id: 66660CVE (CAN) ID:

Kaseya Agent 'kapfa. sys 'NULL pointer indirectly references Local Denial of Service Vulnerability

Kaseya Agent 'kapfa. sys 'NULL pointer indirectly references Local Denial of Service Vulnerability Release date:Updated on: Affected Systems:KaseyaDescription:--------------------------------------------------------------------------------Bugtraq

Seven Ways to ensure data security in the AWS cloud

Seven Ways to ensure data security in the AWS cloud Recently, the company Code Space that provides Devops Application Management Support Services suffered a Denial-of-Service attack. To prevent its continuous intrusion, Code Space logged on to the

Penetration of campus power system-one of the series of campus penetration

Penetration of campus power system-one of the series of campus penetrationCause: Ben Qiang resigned from his internship at Xunlei. On the first day of his resignation, he went back to school and encountered a power failure when he ran out of the

Promotion by rogue

Promotion by rogue I wonder if you may encounter such a scenario from time to time: There are a lot of unknown programs in the computer, and you don't even know when to install them; or was it originally intended to install A program A, who once

Counterfeit Google crawlers have become the third-largest DDoS attack tool

Counterfeit Google crawlers have become the third-largest DDoS attack tool   In the article Prolexic released the first quarter of 2014 Global DDoS attack report published by quickshield, we learned that the attack traffic initiated by the

How to Prevent DOS attacks on web applications?

How to Prevent DOS attacks on web applications? What is the best way to prevent DOS attacks on web applications?   One thing related to all denial of service (DOS) attacks is that they cannot avoid them. The best way is to focus on reducing the

Use fail2ban to protect the POSTFIX email system

Use fail2ban to protect the POSTFIX email systemI have met several users who have been guessed by the program and used to forward spam. After checking the mail log, I found that a large number of IP addresses were connected to send emails. Of course,

Common iptables shell template Configuration

Common iptables shell template Configuration#!/bin/bash# Clear old firewall rulesiptables-F# Save firewall configurationsserviceiptablessave# Stop a firewallserviceiptablesstop# Enable ssh Firewalliptables-AINPUT-ptcp--dport22-jACCEPT# Open Database

Periodically counts a certain amount of data and sends out the statistical results by mail.

Periodically counts a certain amount of data and sends out the statistical results by mail. The statistical results are automatically sent by mail, and mutt is used. The installation of mutt is simple: yuminstallmutt, which can be used after

GreenTree Inn SMS Verification Vulnerability and order query without permission Control

GreenTree Inn SMS Verification Vulnerability and order query without permission Control GreenTree Inn mobile website http://m.998.com/1. SMS Verification VulnerabilityRegistration page http://m.998.com/Api/Account/SendMobileCheckMsg.ashxThe text

How to establish effective security policies

How to establish effective security policiesSpeaking of attack and defense confrontation, we are very familiar with the saying that "attacks can be handled with only one click, while defenses must be fully defended ". In most cases, the defender is

Configure ModSecurity firewall and OWASP rules

Configure ModSecurity firewall and OWASP rules 0x00 background ModSecurity is a free and open-source Apache module that can act as a Web application firewall (WAF ). ModSecurity is an engine for intrusion detection and prevention. it is mainly used

Total Pages: 1330 1 .... 620 621 622 623 624 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.