Release date:Updated on:
Affected Systems:GnuTLS 3.2.12GnuTLS 3.1.22Description:--------------------------------------------------------------------------------Bugtraq id: 65919CVE (CAN) ID: CVE-2014-0092
GnuTLS is a function library used to implement TLS encryption.
A security vulnerability exists in versions earlier than GnuTLS 3.1.22 and 3.2.12. The error handling for X.509 Certificate verification is incorrect. You can mark the failure certific
Release date:Updated on:
Affected Systems:Apache Group Axis2/CDescription:--------------------------------------------------------------------------------Bugtraq id: 57267CVE (CAN) ID: CVE-2012-6107Axis2 is a Web service engine implemented in C language.Apache Axis2/C has a security bypass vulnerability. After successful exploitation, attackers can perform man-in-the-middle attacks or simulate trusted serv
Release date:Updated on:
Affected Systems:PHP 5.3.xDescription:--------------------------------------------------------------------------------Bugtraq id: 54612Cve id: CVE-2012-3365
PHP is an embedded HTML language. PHP is similar to Microsoft's ASP. It is a script language that is executed on the server side and embedded in HTML documents, the language style is similar to the C language and is widely used by many website programmers.
PHP versions earlier than 5.3.15 have errors in SQLite ext
Release date: 2012-03-21Updated on: 2012-03-26
Affected Systems:RedHat Fedora 16Description:--------------------------------------------------------------------------------Bugtraq id: 52687Cve id: CVE-2012-1568
Linux Kernel is the Kernel of the Linux operating system.
When Linux Kernel runs a binary file with many shared libraries, it uses a predictable base address for one of the loaded libraries to bypass ASLR.
Link: https://bugzilla.redhat.com/
How to upload files through. net in js and asp tutorials that bypass the security restrictions of silverlight1. The silveright page button calls the js code of the bearer page to open an aspx page for upload. All file uploads are completed on this page.2. After the file is uploaded, the upload page will return the file name of the uploaded file to the bearer page, and then the bearer page will return to sil
Release date:Updated on:
Affected Systems:Microsoft IISDescription:--------------------------------------------------------------------------------Bugtraq id: 51527Cve id: CVE-2007-2897
Internet Information Services (IIS) is a basic Internet service provided by Microsoft based on Microsoft Windows.
IIS 6.0 has a Denial-of-Service vulnerability when requesting specially crafted paths. Remote attackers can ex
Release date: 2012-10-01Updated on:
Affected Systems:Ubuntu Linux 12.xUbuntu Linux 11.xUbuntu Linux 10.xDescription:--------------------------------------------------------------------------------Bugtraq id: 55736Cve id: CVE-2012-5356
Ubuntu Software Properties securely installs new Software to the Ubuntu Software library over the Internet.
The apt-add-repository tool of Ubuntu Software Properties does not correctly check the ppa gpa key exported b
AVG Internet Security provides all-round protection against network threats, including viruses, worms, spyware, trojans, hacking, advertising and spam.
AVG Internet Security Component:· Anti-Virus protects from viruses, worms and Trojans· Anti-Spyware protects from Spyware, adware and other malicious programs· Anti-Sp
According to the Voice of China, "national news broadcast" reported that the national Internet Information Office in the month of the day announced, In order to safeguard the national network security and protect the legitimate interests of Chinese users, China will launch a network security review system, and the important information technology products and
Considerations and testing methods for DDOS Security Products in the Internet cloud ecosystem (I)The three elements of DDOS attack security are "confidentiality", "integrity", and "availability". DOS (Denial of Service) targets "availability" of services ". This attack method exploits the network service functional defects of the target system or directly consume
Common defense systems and solutions for DDoS security products traditional SolutionsEarly DDoS defenses are detected and implemented through firewalls and routers, which have some protection against early attacks, and firewalls are very effective in protecting the protocol layer. However, the development of the Internet makes DDoS attacks more and more skillful, and the ability to attack more and more powe
Common defense systems and solutions for DDoS security products traditional SolutionsEarly DDoS defenses are detected and implemented through firewalls and routers, which have some protection against early attacks, and firewalls are very effective in protecting the protocol layer. However, the development of the Internet makes DDoS attacks more and more skillful, and the ability to attack more and more powe
the transition from a closed PSTN public switched telephone network to an open Internet network.
The transmission and security mechanisms of VoIP voice services are quite different from traditional telephony services. Because the IP protocol itself does not have the ability to protect against attacks, unencrypted voice data traffic is easily intercepted or listened to during transmission. While packet lis
intranet, Or implanted in the back door by an attacker, leading to disastrous consequences. Therefore, to filter inappropriate content, to forcibly remove malicious code and viruses, to manage, monitor and supervise employees to use the Internet correctly, is the urgent task to improve the profit of enterprises.
the security of the chat tool The chat tool here refers to the real-time information exchange t
as LDAP, POP, IMAP, Diiop, IBM Lotus QuickPlace? and IBM Lotus Sametime? However, if the password used for authentication is stored in the LDAP server, Internet password locking can also be used in Web access.
If you are using the DSAPI filter, can you use the Internet locking feature because the DSAPI filter can bypass Lotus Notes? and Domino authentication.
Differences between Windows 2003 and later versions
1) Windows Server 2003, Standard Edition (Standard Edition)
It also supports dual-circuit processors and 4 GB memory for core products of small and medium enterprises. In addition to all functions of Windows Server 2003 web edition, it also supports Certificate Services, UDDI services, fax services, IAS Internet authentication services, removable storage, RIS, smart cards, Terminal Services, WMS and
CEO of wangkang proposed Internet-based next-generation security for the first time
As the agent of wangkang JiangSu region, Jiangsu Guojun Information Technology Co., Ltd. has the following advantages: information security integration, network security service, and application software development, provides comprehen
Nowadays, four thousand or five thousand of dollars in notebooks are already equipped with wireless LAN card, wireless router prices are also down the road, 200 yuan can buy a well-known brand of 54Mbps wireless router. With a wireless router, without destroying the family's existing decoration pattern, you can enjoy the pleasure of surfing the Internet, and can move everywhere, really realized in the home to enjoy the convenience of surfing the
Hacker attacks and the spread of viruses have become a major "characteristic" of the Internet. In addition, the computers of ADSL Internet users have a public IP address when accessing the Internet. ADSL Internet computers are highly risky. It is undeniable that some security
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.