LibTIFF out-of-bounds read Denial of Service Vulnerability (CVE-2014-8127)
Release date:Updated on:
Affected Systems:LibTIFFDescription:Bugtraq id: 72323CVE (CAN) ID: CVE-2014-8127
LibTIFF is a library used to read and write label image files
Google discloses three OS X 0-day Vulnerabilities
In the past two days, Google's Project Zero disclosed three OS X 0-day vulnerabilities (1, 2, and 3 ). Three vulnerabilities are not high-risk vulnerabilities. to exploit these vulnerabilities,
GNU patch 'set _ hunkmax () 'Function Denial of Service Vulnerability
Release date:Updated on:
Affected Systems:GNU patchDescription:Bugtraq id: 72286CVE (CAN) ID: CVE-2014-9637
GNU patch is part of the GNU project. You can update the original
Adobe Flash Player DoS Vulnerability (CVE-2015-0311) (apsa15-01)
Release date:Updated on:
Affected Systems:Adobe Flash Player Adobe Flash Player 16.0.0.287Adobe Flash Player 15.xAdobe Flash Player 14.xAdobe Flash Player
Dpkg parse_error_msg Function Format String Vulnerability
Release date:Updated on:
Affected Systems:Debian dpkg 1.16.13Description:CVE (CAN) ID: CVE-2014-8625
Dpkg is a suite management system specially developed for "Debian" to facilitate
LibTIFF out-of-bounds write Denial of Service Vulnerability (CVE-2014-8128)
Release date:Updated on:
Affected Systems:LibTIFFDescription:Bugtraq id: 72326CVE (CAN) ID: CVE-2014-8128
LibTIFF is a library used to read and write label image files
Juniper Junos rpd Remote Denial of Service Vulnerability (CVE-2014-6386)
Release date:Updated on:
Affected Systems:Juniper Networks JUNOSDescription:Bugtraq id: 72067CVE (CAN) ID: CVE-2014-6386
JunosE is an operating system used in the e-series
Reuse Remote Code Execution Vulnerability (CVE-2015-1031) after multiple Privoxy releases)
Release date:Updated on:
Affected Systems:Privoxy 3.0.22Description:Bugtraq id: 71993CVE (CAN) ID: CVE-2015-1031
Privoxy is a non-Cache Web Proxy.
In
Libpng Multiple Heap Buffer Overflow Vulnerabilities (CVE-2015-0973)
Release date:Updated on:
Affected Systems:Libpng 1.6.15Description:Bugtraq id: 71994CVE (CAN) ID: CVE-2015-0973
Libpng is a function library used by various applications to
FFmpeg 'libavcodec/vmdvideo. c' Denial of Service (CVE-2014-9603) Vulnerability)
Release date:Updated on:
Affected Systems:FFmpeg Description:Bugtraq id: 72269CVE (CAN) ID: CVE-2014-9603
FFmpeg is a free software that allows you to perform video,
VLC Media Player '. flv' File Memory Corruption Vulnerability
Release date:Updated on:
Affected Systems:VideoLAN VLC Media Player 2.1.5Description:Bugtraq id: 72105CVE (CAN) ID: CVE-2014-9597
VLC Media Player is a multimedia Player.
VLC Media
Samba ad dc Elevation of Privilege Vulnerability (CVE-2014-8143)
Release date:Updated on:
Affected Systems:Samba Description:CVE (CAN) ID: CVE-2014-8143
Samba is a set of programs that implement the SMB (Server Messages Block) protocol,
Linux Kernel 'evdev. c' local information leakage Vulnerability
Release date:Updated on:
Affected Systems:Linux kernelDescription:Bugtraq id: 72266
Linux Kernel is the Kernel of the Linux operating system.
Linux kernel has the local information
Research Report on remote command execution of Asus router port 9999
On June 23, October 3, 2014, foreign security researcher Joshua J. Drake submitted a remote command execution vulnerability poc for the Asus router on his github. The vulnerability
SQL Injection via DNS
0x00 Analysis
Whatscat is a php app that can upload pictures of cats and comment on them. Address:
Https://blogdata.skullsecurity.org/whatscat.tar.bz2
The vulnerability code exists in the password reset module of login. php,
You are actually poisoning the public key! -- How to add a backdoor to the RSA public key
When I knew how it was running, my chin fell. This is a very simple method, but this article will subvert your previous views on RSA. This is not a method to
How to configure a host-based Intrusion Detection System on CentOS? (1)
One of the first security measures that any system administrator wants to deploy on its production server is the file tampering detection mechanism. Criminals tamper with not
CentOS Server Security Configuration PolicyRecently, the server has been infiltrated frequently. I analyzed the intrusion behavior and sorted out the security policies that need to be implemented:Management Terminal settings:1.The jump server
Php cloud authorization
V3.1 9.231. Follow up: Allows recruiters to follow you, or job seekers to follow you.2. Pay attention to the problem. You can post questions for your attention.Uid indicates the auto-increment value during registration.
1.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.