Ruby floating point Parsing Heap Buffer Overflow Vulnerability

Release date:Updated on: Affected Systems:Yukihiro Matsumoto Ruby 1.9.xDescription:--------------------------------------------------------------------------------Bugtraq id: 63873CVE (CAN) ID: CVE-2013-4164 Ruby is a scripting language created

Moodle '/message/lib. php' Cross-Site Scripting Vulnerability

Release date:Updated on: Affected Systems:Moodle 2.5.xMoodle 2.3.xDescription:--------------------------------------------------------------------------------Bugtraq id: 63898CVE (CAN) ID: CVE-2013-4523 Moodle is a course Management System (CMS),

Nano-10 PLC Remote Denial of Service Vulnerability

Release date:Updated on: Affected Systems:Triplc nano10Description:--------------------------------------------------------------------------------Bugtraq id: 64527CVE (CAN) ID: CVE-2013-7059 Nano-10 PLC is a programmable logic controller. Remote

Open-xchange Server script insertion and Security Restriction Bypass Vulnerability

Release date:Updated on: Affected Systems:Open-xchange Open-Xchange Server 7.4.0Description:--------------------------------------------------------------------------------CVE (CAN) ID: CVE-2013-6997 Open-Xchange Server is a part of Open-source

Rails Active Record data Injection Vulnerability (CVE-2014-0080)

Rails framework explodes the latest data injection vulnerability, numbered CVE-2014-0080. This vulnerability causes some special strings to be used to store data into PostgreSQL array fields. This vulnerability cannot delete data or execute

CA 2E Web Option 8.1.2 Authentication Bypass Vulnerability

Release date:Updated on: Affected Systems:CA 2E Web Option 8.1.2Description:--------------------------------------------------------------------------------CVE (CAN) ID: CVE-2014-1219 CA 2E Web Option is a Web interface development tool for CA 2E

IE10 0-day vulnerability exploited to obtain military intelligence

Security company FireEye researchers have discovered a new IE10 0-Day Vulnerability (CVE-2014-0322), which was exploited by attackers to steal military intelligence. FireEye called the attack Operation SnowMan and considered the attacker to be

Foxit Reader 'imgseg. dll 'Unknown Security Vulnerability

Release date:Updated on: Affected Systems:Foxit Reader Description:--------------------------------------------------------------------------------Bugtraq id: 65697 Foxit Reader is a small PDF Reader. An unknown error occurred while loading

E-Z-2-Use attack code making use of old Android Vulnerability

The attack code exploiting the WebView programming interface vulnerability in the Android operating system has been added as a module to the open-source Vulnerability exploitation framework Metasploit. The vulnerability affects versions earlier than

The latest iOS version has fixed the SSL verification issue, but the OS X system is still at risk.

Yesterday, Apple released the iOS 7.0.6 patch, which fixes the SSL connection verification issue. In fact, the SSL issue fixed in iOS 7.0.6 is a system-level high-risk vulnerability. In the release of the support documentation, Apple mentioned that

Multiple security vulnerabilities in Google Chrome versions earlier than 33.0.1750.117

Release date:Updated on: Affected Systems:Google Chrome Description:--------------------------------------------------------------------------------Bugtraq id: 65699CVE (CAN) ID: CVE-2013-6652, CVE-2013-6653, CVE-2013-6654, CVE-2013-6655, CVE-2013-6

Inteno DG301 "username" Command Injection Vulnerability

Release date:Updated on: Affected Systems:Inteno DG301 1.0.34Description:--------------------------------------------------------------------------------Inteno DG301 is a home gateway with advanced router and Bridge functions. Inteno DG301, which is

Cisco Wireless LAN Controller Remote Denial of Service Vulnerability (CVE-2014-0705)

Release date:Updated on: Affected Systems:Cisco Wireless LAN ControllerDescription:--------------------------------------------------------------------------------Bugtraq id: 65982CVE (CAN) ID: CVE-2014-0705 Cisco WLC is responsible for

Multiple security vulnerabilities in Google Chrome versions earlier than 33.0.1750.146

Release date:Updated on: Affected Systems:Google Chrome Description:--------------------------------------------------------------------------------Bugtraq id: 65930CVE (CAN) ID: CVE-2013-6663, CVE-2013-6664, CVE-2013-6665, CVE-2013-6666, CVE-2013-66

DedeCMS Command Execution Vulnerability

Release date:Updated on: Affected Systems:Dedecms dededecmsDescription:--------------------------------------------------------------------------------DedeCms is a free PHP website content management system. DedeCms has a command execution

Multiple WebKit Memory Corruption Vulnerabilities

Release date:Updated on: Affected Systems:WebKit Open Source Project WebKitDescription:--------------------------------------------------------------------------------Bugtraq id: 66088CVE (CAN) ID: CVE-2014-1289, CVE-2014-1290, CVE-2014-1291, CVE-20

FreeType 'src/cff/cf2hints. c' Remote Stack Buffer Overflow Vulnerability

Release date:Updated on: Affected Systems:FreeType Description:--------------------------------------------------------------------------------Bugtraq id: 66074CVE (CAN) ID: CVE-2014-2240 FreeType is a popular font function library. In versions

Siemens SIMATIC S7-1200 Denial of Service Vulnerability (CVE-2014-2258)

Release date:Updated on: Affected Systems:Siemens SIMATIC S7-1200Description:--------------------------------------------------------------------------------Bugtraq id: 66344CVE (CAN) ID: CVE-2014-2258 The SIMATIC S7-1200 is a programmable

[Note] due to the payment log vulnerability discovered by Ctrip, users should change their credit card immediately

On the evening of June 23, 49.49, wooyun, the vulnerability reporting platform, published a piece of information about network security vulnerabilities on its official website today, stating that the security payment log of Ctrip (0.01, 0.02%,) can

NSA penetration into RSA is more advanced than previously thought

Reuters reported that NSA penetration into RSA is more in-depth than previously thought. It is not embedded in RSA's encryption product with a pseudo-random generator with a backdoor, but two. In addition to the well-known Dual EC_DRBG Dual elliptic

Total Pages: 1330 1 .... 821 822 823 824 825 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.