Linux Kernel ecryptfs_uid_hash () function local Overflow Vulnerability

Release date: 2010-07-29Updated on: 2010-09-13 Affected Systems:Linux kernel 2.6.xUnaffected system:Linux kernel 2.6.35Description:--------------------------------------------------------------------------------Bugtraq id: 42237Cve id: CVE-2010-2492

Ubuntu 10.04 libstdc ++ 5 Problems

1) if you are running Ubuntu, try to use a software package manager like aptitude or synaptic, instead of manually downloading and installing the software package from this webpage. 2) You can use any source image in the following list to add a line

Linux Kernel IPC subsystem local information leakage Vulnerability

Release date:Updated on: Affected Systems:Debian Linux 5.0 xLinux kernel 2.6.11.11-2.6.26Description:--------------------------------------------------------------------------------Bugtraq id: 45073Cve id: CVE-2010-4073 Linux Kernel is the Kernel

Linux Kernel tipc_msg_build () function Heap Overflow Vulnerability

Release date:Updated on: Affected Systems:Linux kernel 2.6.xDescription:--------------------------------------------------------------------------------Bugtraq id: 44354Cve id: CVE-2010-3859 Linux Kernel is the Kernel used by open source Linux.

Linux Kernel viafb_ioctl_get_viafb_info function Information Leakage Vulnerability

Vulnerability title Linux Kernel viafb_ioctl_get_viafb_info function Information Leakage Vulnerability Whether or not to publish for the first time Release date: 2010.12.28 Vulnerability causes and other errors Vulnerability-caused threats

Researchers demonstrate how to crack the USB driver and conquer the PC operating system

Angelos Stavrou, assistant professor at George Mason University, and his student Wang chaohui presented their new achievements in the security field at the Black Hat DC Hacker Conference by cracking the USB driver, only one common USB cable can be

Linux Kernel "dvb_ca_ioctl ()" Memory Corruption Vulnerability

Release date:Updated on: Affected Systems:Linux kernel 2.6.xDescription:--------------------------------------------------------------------------------Cve id: CVE-2011-0521 Linux Kernel is the Kernel used by open source Linux. Linux Kernel has a

DIY Linux security platform!

How can we maximize security? Tailored, targeted, proper choice is the key. The following aspects are described in detail. Control file attributes and permissions Paying close attention to file attributes and permission settings is essential to

Linux Kernel ALSA "hpioctl. c" Memory Corruption Vulnerability

Release date:Updated on: Affected Systems:Linux kernel 2.6.xDescription:--------------------------------------------------------------------------------Bugtraq id: 46914Cve id: CVE-2011-1169 ALSA is an Advanced Linux Sound system (Advanced Linux

Apache Tomcat sendfile request Security Restriction Bypass and Denial of Service Vulnerabilities

Release date:Updated on: Affected Systems:Apache Group Tomcat 7.xApache Group Tomcat 6.xApache Group Tomcat 5.xDescription:--------------------------------------------------------------------------------Cve id: CVE-2011-2526 Tomcat is a Servlet

Apple iOS "basicConstraints" X.509 Certificate Chain Verification Vulnerability

cve

Release date:Updated on: Affected Systems:Apple iOS 4.xDescription:--------------------------------------------------------------------------------Cve id: CVE-2011-0228 Apple iOS is the latest operating system running on Apple's iPhone and iPod

Moodle Security Restriction Bypass Vulnerability

Release date:Updated on: Affected Systems:Moodle 2.1.xMoodle 2.0.xDescription:--------------------------------------------------------------------------------Bugtraq id: 49068 Moodle is a popular open source course management system. Moodle has

Linux Kernel "ib_uverbs_poll_cq ()" function local information leakage Vulnerability

Release date:Updated on: Affected Systems:Linux kernel 2.6.xUnaffected system:Linux kernel 2.6.37Description:--------------------------------------------------------------------------------Bugtraq id: 46488CVE (CAN) ID: CVE-2011-1044 Linux Kernel

F-Secure BlackList local permission Escalation Vulnerability

Release date:Updated on: Affected Systems:F-Secure BlackList 2.2.1092Description:--------------------------------------------------------------------------------Bugtraq id: 49159 F-Secure BlackLight is used to detect hidden files, folders,

Mozilla Firefox WebGL Vulnerability

Release date:Last Updated:Hazard level:Vulnerability Type: insufficient informationThreat Type: Remote Vulnerability introduction: Mozilla Firefox is a free, open-source browser applicable to Windows, Linux, and MacOS X platforms. The browser

TANDBERG product SIP DoS Vulnerability

Release date:Updated on: Affected Systems:Cisco tandberg c Series EndpointsCisco tandberg e/EX Personal VideoCisco tandberg mxp Series Endpoint F9.xDescription:--------------------------------------------------------------------------------Tandberg

Pidgin dos and Security Restriction Bypass Vulnerability

Release date:Updated on: 2011-09-07 Affected Systems:Pidgin 2.xPidgin Libpurple 2.xUnaffected system:Pidgin 2.10.0Description:--------------------------------------------------------------------------------Bugtraq id: 49268Cve id: CVE-2011-2943,

Qt "gray-scale" Graphic File Buffer Overflow Vulnerability

Release date:Updated on: Affected Systems:RedHat Enterprise LinuxTrolltech Qt 4.xTrolltech Qt 3.xDescription:--------------------------------------------------------------------------------Bugtraq id: 49724Cve id: CVE-2011-3194 Qt is a

CiscoWorks Common Services Remote Command Injection Vulnerability

Release date: 2011-10-20Updated on: 2011-10-20 Affected Systems:Cisco Security Manager 4.xCisco Security Manager 3.xCisco uniied Operations Manager (CUOM) 8.xCisco uniied Operations Manager (CUOM) 2.xCisco CiscoWorks Voice Manager 3.xCisco

Tor Browser Bundle Security Restriction Bypass Vulnerability in Firefox

Release date:Updated on: Affected Systems:Tor Browser Bundle 2.2.35-9Tor Browser Bundle 2.2.35-10Description:--------------------------------------------------------------------------------Bugtraq id: 53384 Tor is a solution to ensure information

Total Pages: 1330 1 .... 838 839 840 841 842 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.