Redis Database Security Manual
Redis is a high-performance key-value database, which has never been used in the past two years. The popularity of Redis also brings about a series of security issues. Many attackers have initiated attacks through
Baidu HD client remote command execution and Solution
Remote Command Execution caused by malicious links accessed by Baidu HD Client
Currently, the latest version of Baidu HD client (v1.3) is used in Android 4.2.2. There are still Webview objects
Analysis of IE sandbox Privilege Elevation Vulnerability (CVE-2015-0016)
Microsoft's Tuesday patch, as scheduled this month, includes a MS15-004 patch that fixes a vulnerability that could lead to Elevation of Privilege (CVE-2015-0016), a very rare
Palm reading app account password retrieval bypass/account information leakage/use others' accounts to buy books for themselves and other issues
I wanted to read a book quietly, but the book was charged. Then I detected various vulnerabilities ....
Multiple security vulnerabilities in VLC Media Player
Release date:Updated on:
Affected Systems:VideoLAN VLC Media Player 2.1.5Description:Bugtraq id: 72252
VLC Media Player is a multimedia Player.
VLC media player 2.1.5 and other versions have
ASUS router command execution vulnerability CVE-2014-9583
A serious security vulnerability exists in the firmware of the ASUS router, allowing unauthenticated command execution.
CVE
CVE-2014-9583.
Affected Versions
Currently, all known router
Apache cxf saml SubjectConfirmation Security Restriction Bypass Vulnerability
Release date:Updated on:
Affected Systems:Apache Group CXF Apache Group CXF Description:Bugtraq id: 70736CVE (CAN) ID: CVE-2014-3623
Apache CXF is an open-source service
How to prevent the next heartbleed Vulnerability
I. Introduction
Open SSL-based heartbleed vulnerability is considered a serious problem of CVE-2014-0160, OpenSSL is widely used in SSL and TLS plug-ins. This article explains how the heartbleed
As an operating system, Linux is well known for its ability to resist viruses. This is mainly due to its excellent technical design, which not only makes its operating system difficult to crash, but also makes it difficult to be abused. First of all,
Recently, some time ago, the 8749 virus on the user's IE homepage was tampered with to generate a new variant, variant B, with more destructive power. This not only can end anti-virus software on the user's computer, you can even delete files
Release date:Updated on:
Affected Systems:Veno Veno File Manager 1.xDescription:--------------------------------------------------------------------------------Bugtraq id: 64312
Veno File Manager is a File Manager written in PHP.
The "q"
Release date:Updated on:
Affected Systems:GoToMeeting for Android 5.0.799.1238Description:--------------------------------------------------------------------------------Bugtraq id: 65123CVE (CAN) ID: CVE-2014-1664
GoToMeeting is an online meeting
Release date:Updated on:
Affected Systems:Apple Television 5.0Apple Television 4.4Apple Television 4.3Apple Television 4.2Apple Television 4.1Apple Television 4.0Apple Television 2.1Apple iOS Description:---------------------------------------------
What should I pay attention to when using SaaS for intrusion defense?
Security is a major concern for companies that consider cloud deployment. However, many cloud security problems are self-defeating.
2014, known as the year of leaks, is known for
Is your intranet secure? Who is competent to ensure Intranet security?
The enterprise intranet is the ultimate goal and core goal of network attacks. with powerful boundary protection and protection measures, the enterprise intranet cannot be
Bootkit hard drive Forensics-lecture 1
Some time ago, I received an email asking me how to bypass the bootkit hard drive filter. This highlight is that my MBR spoofing code can be driven by a popular forensic tool. Although I believe that hard disk
Havex: malware targeting industrial control devices
Over the past year, we have maintained a high degree of attention to the Havex malicious program family and the organizations behind it. Havex is considered to be a malware that targets different
Nine Most common security errors made by Web application developers
Web application development is a broad topic. This article only discusses security errors that Web application developers should avoid. These errors involve basic security
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.