Cisco WebEx Meeting Center information leakage (CVE-2016-1410)

Cisco WebEx Meeting Center information leakage (CVE-2016-1410)Cisco WebEx Meeting Center information leakage (CVE-2016-1410) Release date:Updated on:Affected Systems: Cisco WebEx Meeting Center Description: CVE (CAN) ID: CVE-2016-1410Cisco

Sap hana xs engine DoS Vulnerability (CVE-2016-1929)

cve

Sap hana xs engine DoS Vulnerability (CVE-2016-1929)Sap hana xs engine DoS Vulnerability (CVE-2016-1929) Release date:Updated on:Affected Systems: SAP HANA Description: CVE (CAN) ID: CVE-2016-1929Sap hana is a relational database management

Microsoft Office Excel Remote Code Execution Vulnerability (CVE-2016-0035) Analysis

Microsoft Office Excel Remote Code Execution Vulnerability (CVE-2016-0035) Analysis Recently, I discovered the Use-After-Free vulnerability in Excel programs (all versions) when processing specially constructed excel files. This vulnerability allows

Adobe Reader and Acrobat Pro Privilege Escalation Vulnerability resolution (CVE-2015-5090)

cve

Adobe Reader and Acrobat Pro Privilege Escalation Vulnerability resolution (CVE-2015-5090) 0 × 01 PrefaceCVE-2015-5090 is a bug that exists in Adobe Reader/Acrobat Pro and has been found and submitted to ZDI a few months ago. This article focuses

Multiple Adobe Reader and Acrobat Memory Corruption Vulnerabilities

Multiple Adobe Reader and Acrobat Memory Corruption VulnerabilitiesMultiple Adobe Reader and Acrobat Memory Corruption Vulnerabilities Release date:Updated on:Affected Systems: Adobe Acrobat 11.xAdobe Acrobat 10.xAdobe Reader 11.xAdobe Reader

Android DropBox SDK Vulnerability (CVE-2014-8889) Analysis

Android DropBox SDK Vulnerability (CVE-2014-8889) Analysis0x00 Preface This article is a translation of the detailed analysis of DropBox SDK vulnerabilities by the ibm iss security team. Today, personal data is stored on the cloud, so that services

Quarks PwDump various 32-bit 64-bit systems get HASH

Quarks PwDump various 32-bit 64-bit systems get HASH Quarks PwDump is an open-source Windows user credential extraction tool that captures various types of user creden, on windows platforms, including: local Account, domain account, cached domain

Apple iOS Security Vulnerabilities (APPLE-SA-2014-03-10-1)

Release date:Updated on: Affected Systems:Apple iOS Description:--------------------------------------------------------------------------------Bugtraq id: 66089CVE (CAN) ID: CVE-2013-5133, CVE-2014-1274, CVE-2014-1276, CVE-2014-1277, CVE-2014-1281,

Use Symantec Endpoint Protection to penetrate the Enterprise Network

Use Symantec Endpoint Protection to penetrate the Enterprise Network 1. Introduction Markus Wulftange reported several high-risk vulnerabilities in Symantec Endpoint Protection (SEP) July 30 on April 9, 12.1. Only versions upgraded to 12.1 RU6 MP1

How to use password security tools in Windows 7

As the public's digital life field becomes more and more complex, the threats posed by malicious Security hackers and malware are also growing. To avoid security incidents, the use of a strong password becomes more necessary. For most people, the

Correctly set the php-fpm sub-process to improve website security and prevent Trojans

Core Summary: The user used by the php-fpm sub-process cannot be the website file owner. Any violation of this principle does not comply with the minimum permission principle. According to continuous feedback in the production environment, php

Virus Trojan scan: manual scan of QQ Trojan Horse stealing

Virus Trojan scan: manual scan of QQ Trojan Horse stealingI. Preface In previous articles "virus Trojan scan and removal 002nd: manually killing pandatv incense", I basically detected and killed the "pandatv incense" virus without using any tools.

Differences between Microsoft anti-spyware and malicious removal tools

The cooling in Guangzhou over the past few days has finally made berwolf really feel the subtropical winter. It turns out so cute. Although the temperature is low, Microsoft's wind in the IT industry is still very hot, especially since the

Anti-virus software is dead? Resolving malware requires breaking old ideas

Author: Serdar yegulphosphatase In the past few years, our computers have suffered unprecedented attacks, and malicious software has become increasingly intelligent and powerful. We can't help thinking, in the future Internet world, is anti-virus

Ransomware virus in OS X system security risks of operating system X Mac hard disk being encrypted by hackers

Ransomware virus in OS X system security risks of operating system X Mac hard disk being encrypted by hackers In the past, the security of OS X systems often gave users a sense of reliability and stability. However, with the increase in Mac user

Php framework slim has a XXE vulnerability that occurs only in the Framework CMS.

Php framework slim has a XXE vulnerability that occurs only in the Framework CMS. The emergence of the modern cms framework (laraval/symfony/slim) has led to some changes in the current php vulnerabilities, principles, and utilization methods, in

Ease enterprise network threats mid-range Enterprise Web security device shopping guide

This is no longer a secret-network threats have become more common and complex than ever before-it is difficult to rely solely on a single anti-virus solution. Many malicious Trojans and worms, such as Koobface and Conficker, are used to snoop key

Php contains apache logs to obtain the shell Method

For the use of Apache logs in php, the submitted website contains php statements, which are then recorded by the Apache server, and then included and executed by php. Of course, the biggest drawback of this method is that Apache logs will certainly

WordPress SimpleMail Plugin Email field script insertion vulnerability and repair

WordPress is a Blog (Blog, Blog) engine developed using the PHP language and MySQL database. you can create your own Blog on servers that support PHP and MySQL databases. SimpleMail plugin for WordPress 1.0.6 and other versions have multiple

The source code of the core components of the iPhone operating system has been leaked recently. Hundreds of millions of iOS devices may face security threats !, IPhone IOS

The source code of the core components of the iPhone operating system has been leaked recently. Hundreds of millions of iOS devices may face security threats !, IPhone IOS Recently, the source code of the core components of the iPhone operating

Total Pages: 1330 1 .... 9 10 11 12 13 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.