Linux Kernel IP Virtual Server Stack Buffer Overflow Vulnerability

Release date:Updated on: Affected Systems:Linux kernel Description:--------------------------------------------------------------------------------Bugtraq id: 63744CVE (CAN) ID: CVE-2013-4588 Linux Kernel IP Virtual Server is the Kernel transport

Implement ARP attacks using libnet in Linux

Nothing left to worry about. libnet was used to write a simple ARP attack. Previously, I felt that ARP attacks were not very common, but I encountered two ARP spoofing events in my recent work. In fact, the principle of ARP spoofing is often simple.

Multiple security vulnerabilities in Google Chrome versions earlier than 31.0.1650.63

Release date:Updated on: Affected Systems:Google Chrome Description:--------------------------------------------------------------------------------Bugtraq id: 64078CVE (CAN) ID: CVE-2013-6637, CVE-2013-6638, CVE-2013-6639, CVE-2013-6634, CVE-2013-66

Apache Santuario XML Security For java xml Signature Denial of Service Vulnerability

Release date:Updated on: Affected Systems:Apache Group Santuario XML Security For JAVA 1.5.xApache Group Santuario XML Security For JAVA 1.4.xDescription:--------------------------------------------------------------------------------Bugtraq id: 644

NTP 'ntp _ request. c' Remote Denial of Service Vulnerability

Release date:Updated on: Affected Systems:NTP Description:--------------------------------------------------------------------------------Bugtraq id: 64692CVE (CAN) ID: CVE-2013-5211 Network Time Protocol (NTP) is a Protocol used to synchronize

Linux Kernel 'farsync. c' local information leakage Vulnerability

Release date:Updated on: Affected Systems:Linux kernelDescription:--------------------------------------------------------------------------------Bugtraq id: 64952CVE (CAN) ID: CVE-2014-1444 Linux Kernel is the Kernel of the Linux operating system.

Attackers use FileZilla to steal users' FTP accounts.

Note that FileZilla is the FTP Client Version 3.7.3 and 3.5.3. According to the official blog of antivirus Software company Avast Software, hackers intrude into the download website and use a malicious version of FileZilla to replace the official

I-doit Pro 'objid' parameter SQL Injection Vulnerability

Release date:Updated on: Affected Systems:I-doit Pro 1.2.4Description:--------------------------------------------------------------------------------Bugtraq id: 65557CVE (CAN) ID: CVE-2014-1597 I-doit Pro is an open-source IT documentation and

Autodesk AutoCAD Remote Code Execution Vulnerability

Release date:Updated on: Affected Systems:Autodesk AutoCAD Description:--------------------------------------------------------------------------------Bugtraq id: 65745CVE (CAN) ID: CVE-2014-0818 AutoCAD is the first automatic computer aided

PHP "gdImageCreateFromXpm ()" null pointer indirect reference vulnerability

Release date:Updated on: Affected Systems:PHP 5.5.10PHP 5.4.26Description:--------------------------------------------------------------------------------CVE (CAN) ID: CVE-2014-2497 PHP is an embedded HTML language. PHP 5.4.26 and 5.5.10 are

Cisco IOS Software IK3v2 Module Denial of Service Vulnerability

Release date:Updated on: Affected Systems:Cisco IOS 15.xCisco IOS 12.2Description:--------------------------------------------------------------------------------CVE (CAN) ID: CVE-2014-2108 Cisco IOS is an interconnected network operating system

About mobile security: How to safer BYOD

I wonder whether you have noticed that the way people work has undergone revolutionary changes. Today, we can work at home, in a cafe, at a desk, or in any environment above. In short, we have now truly achieved mobile office. How did this

MySQL automatically backs up Shell scripts to FTP

In the past, the company used a Shell script to automatically back up MySQL to FTP on the Internet, which has always been used well. But the problem is that as the number of backup files increases, it is inconvenient to regularly clean up the old

Nginx and PHP-FPM startup & amp; restart script

The Nginx and PHP on the server are both compiled and installed by source code. They do not have built-in service startup scripts like ubuntu, so they do not support nginx (start | restart | stop | reload. Self-help clothes and food. The following

Network Virus Caem. c source code and Analysis Based on Linux platform

Came. cThe virus mainly modifies the user's password and monitors the user's terminal devices. Hope to share with youReprinted please indicate the source: http://blog.csdn.net/u010484477 O (∩ _ ∩) O Thank you # Define HOME "/" # define TIOCSCTTY 0x54

74cms logic vulnerability causes SQL injection and repair

Include/fun_personal.php

74cms logic vulnerability causes SQL injection and repair 2

/Include/fun_personal.php (346-373) $resume_work=get_resume_work($uid,$pid);$resume_training=get_resume_training($uid,$pid);$resume_photo=$resume_basic['photo_img'];if (!empty($resume_work))$percent=$percent+13;if (!empty($resume_training))$percent=$

74cms function Injection Vulnerability

Latest Version v3.4, updated at 20140310File/plus/weixin. phpResponseMsg function, use$ PostStr = $ GLOBALS ["HTTP_RAW_POST_DATA"];The post data is obtained. Therefore, you can ignore GPC.The obtained data is in XML format. We can send data packets

FineCMS 2.3.x local file inclusion

The local file inclusion vulnerability exists in FineCMS2.3.x. It must be used in a truncated environment. The local file inclusion vulnerability exists in video. php under the palyer/video. php player directory (it must be available in a truncated

FineCMS v1.x Remote Code Execution

FineCMS is a content management system developed based on PHP + MySql. It adopts the MVC design mode to implement proper separation between the business logic and the presentation layer, allowing Web designers to easily design the ideal template,

Total Pages: 1330 1 .... 819 820 821 822 823 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.