Redis Database Security Manual

Redis Database Security Manual Redis is a high-performance key-value database, which has never been used in the past two years. The popularity of Redis also brings about a series of security issues. Many attackers have initiated attacks through

Baidu HD client remote command execution and Solution

Baidu HD client remote command execution and Solution Remote Command Execution caused by malicious links accessed by Baidu HD Client Currently, the latest version of Baidu HD client (v1.3) is used in Android 4.2.2. There are still Webview objects

Analysis of IE sandbox Privilege Elevation Vulnerability (CVE-2015-0016)

Analysis of IE sandbox Privilege Elevation Vulnerability (CVE-2015-0016) Microsoft's Tuesday patch, as scheduled this month, includes a MS15-004 patch that fixes a vulnerability that could lead to Elevation of Privilege (CVE-2015-0016), a very rare

Palm reading app account password retrieval bypass/account information leakage/use others' accounts to buy books for themselves and other issues

Palm reading app account password retrieval bypass/account information leakage/use others' accounts to buy books for themselves and other issues I wanted to read a book quietly, but the book was charged. Then I detected various vulnerabilities .... 

Apache ActiveMQ LDAP Authentication Bypass Vulnerability (CVE-2014-3612)

Apache ActiveMQ LDAP Authentication Bypass Vulnerability (CVE-2014-3612) Release date:Updated on: Affected Systems:Apache Group ActiveMQ ApolloDescription:Bugtraq id: 72513CVE (CAN) ID: CVE-2014-3612 Apache ActiveMQ is a popular message

Multiple security vulnerabilities in VLC Media Player

Multiple security vulnerabilities in VLC Media Player Release date:Updated on: Affected Systems:VideoLAN VLC Media Player 2.1.5Description:Bugtraq id: 72252 VLC Media Player is a multimedia Player. VLC media player 2.1.5 and other versions have

ASUS router command execution vulnerability CVE-2014-9583

cve

ASUS router command execution vulnerability CVE-2014-9583 A serious security vulnerability exists in the firmware of the ASUS router, allowing unauthenticated command execution. CVE CVE-2014-9583. Affected Versions Currently, all known router

Apache cxf saml SubjectConfirmation Security Restriction Bypass Vulnerability

cve

Apache cxf saml SubjectConfirmation Security Restriction Bypass Vulnerability Release date:Updated on: Affected Systems:Apache Group CXF Apache Group CXF Description:Bugtraq id: 70736CVE (CAN) ID: CVE-2014-3623 Apache CXF is an open-source service

How to prevent the next heartbleed Vulnerability

How to prevent the next heartbleed Vulnerability I. Introduction Open SSL-based heartbleed vulnerability is considered a serious problem of CVE-2014-0160, OpenSSL is widely used in SSL and TLS plug-ins. This article explains how the heartbleed

Deploy secure and efficient anti-virus software for Linux servers

As an operating system, Linux is well known for its ability to resist viruses. This is mainly due to its excellent technical design, which not only makes its operating system difficult to crash, but also makes it difficult to be abused. First of all,

The new 8749 virus variants damage the operating system and anti-virus software.

Recently, some time ago, the 8749 virus on the user's IE homepage was tampered with to generate a new variant, variant B, with more destructive power. This not only can end anti-virus software on the user's computer, you can even delete files

Symantec IM Manager Cross-Site Scripting Vulnerability

Release date:Updated on: Affected Systems:Symantec IM Manager 8.xUnaffected system:Symantec IM Manager 8.4.18Description:--------------------------------------------------------------------------------Bugtraq id: 49739Cve id: CVE-2011-0552 Symantec

Veno File Manager Arbitrary File Download Vulnerability

Release date:Updated on: Affected Systems:Veno Veno File Manager 1.xDescription:--------------------------------------------------------------------------------Bugtraq id: 64312 Veno File Manager is a File Manager written in PHP. The "q"

Multiple Local Information Leakage vulnerabilities in GoToMeeting for Android

Release date:Updated on: Affected Systems:GoToMeeting for Android 5.0.799.1238Description:--------------------------------------------------------------------------------Bugtraq id: 65123CVE (CAN) ID: CVE-2014-1664 GoToMeeting is an online meeting

Multiple security vulnerabilities in Apple iOS and TV

Release date:Updated on: Affected Systems:Apple Television 5.0Apple Television 4.4Apple Television 4.3Apple Television 4.2Apple Television 4.1Apple Television 4.0Apple Television 2.1Apple iOS Description:---------------------------------------------

What should I pay attention to when using SaaS for intrusion defense?

What should I pay attention to when using SaaS for intrusion defense? Security is a major concern for companies that consider cloud deployment. However, many cloud security problems are self-defeating. 2014, known as the year of leaks, is known for

Is your intranet secure? Who is competent to ensure Intranet security?

Is your intranet secure? Who is competent to ensure Intranet security? The enterprise intranet is the ultimate goal and core goal of network attacks. with powerful boundary protection and protection measures, the enterprise intranet cannot be

Bootkit hard drive Forensics-lecture 1

Bootkit hard drive Forensics-lecture 1 Some time ago, I received an email asking me how to bypass the bootkit hard drive filter. This highlight is that my MBR spoofing code can be driven by a popular forensic tool. Although I believe that hard disk

Havex: malware targeting industrial control devices

Havex: malware targeting industrial control devices Over the past year, we have maintained a high degree of attention to the Havex malicious program family and the organizations behind it. Havex is considered to be a malware that targets different

Nine Most common security errors made by Web application developers

Nine Most common security errors made by Web application developers Web application development is a broad topic. This article only discusses security errors that Web application developers should avoid. These errors involve basic security

Total Pages: 1330 1 .... 76 77 78 79 80 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.