GRUB2's zero-day vulnerability affects Linux users. Ubuntu and RHEL patches are now available.
According to the latest Ubuntu Security Notice of Canonical, a zero-day Security vulnerability exists in GRUB2 (GNU GRand Unified Bootl
Some of the world's largest companies (such as Facebook, Google and Adobe) and many smaller companies are using Oracle's MySQL database server software. Its performance, reliability, and ease of use make it an indispensable part of thousands of Web applications built on the LAMP (Linux, Apache, MySQL, Perl/PHP/Python) platform. In view of its large user base, recent zero-day vulnerabilities in MySQL have ar
According to foreign media reports, Microsoft confirmed on Tuesday that hackers have begun to take advantage of the zero-day Windows XP vulnerability announced last week by Google engineers. Although Microsoft did not disclose too much details, other researchers provided relevant information. Graham Cluley, Senior Technical Consultant of Network Security Company
The security update released by Microsoft this month does not involve the latest Windows 7 operating system, but does not mean that Windows 7 will be safe and sound, foreign Security researchers recently said they have discovered the first zero-day security vulnerability in the Windows 7 operating system.
After hearing the news, Microsoft is investigating the pr
Google fixed the zero-day Kernel Vulnerability, indicating the problem was not that serious.
A privilege escalation vulnerability was detected in the Linux Kernel a few days ago, affecting a large number of Android devices. Due to the fragmentation of the Android device system and the complicated channels of OEM man
According to foreign media reports, yesterday Microsoft issued a major ActiveX plug-in Vulnerability Alert, which allows hackers to attack IE users on Windows platforms, engage in activities that endanger network security, such as mounting Trojans and spreading viruses. ActiveX plug-ins exist in Windows systems. Their initial use was to control the MREG2 video transmission stream. Windows Media Player and Apple's Quick Time both have plug-ins similar
remove this component. This is incredible for Windows systems. For example, if I feel that Firefox is the weakest link in my Linux system, I can delete it and use other Web browsers, such as Opera. In Windows, I cannot replace Microsoft's Internet Explorer.
4. Better "zero-day attacks" defense tool
Even if you can ensure that your system is updated in real time, this does not mean that nothing is lost!
Vulnerability tracking: Flash serious vulnerability (CVE-2015-0311) detailed technical analysisYou have a good time with the Flash 0-day vulnerability last week. You need to know why, and sit down and see the cause of this
Release date:Updated on:
Affected Systems:Real Networks RealPlayerDescription:--------------------------------------------------------------------------------Bugtraq id: 54220
RealPlayer is a tool used to listen to and watch real-time audio, video, and Flash on the Internet.
RealPlayer 10 Gold has a remote denial of service vulnerability when processing malformed. avi files, which can cause the affected app
Microsoft IIS must be known to all. The code for Microsoft IIS zero-day attacks against some versions of FTP functions has already appeared on the Internet, and the Network Security Organization recommends corresponding countermeasures. It is unknown whether Microsoft has enough time to fix this vulnerability in the regular Microsoft Security Patch in March.
Net
0-day security: software vulnerability analysis technology (version 2nd)
Basic Information
Author:Wang QingZhang DonghuiZhou HaoWang JigangZhao Shuang
Series Name:Security Technology Department
Press: Electronic Industry Press
ISBN:9787121133961
Mounting time:
Published on: February 1, June 2011
Http://product.china-pub.com/194031
0-day security: software
The third Pwn2Own hacker technology competition initiated by Tipping Point kicked off on March 13, March 18, us time. In the first day of the competition, contestants need to try to break mainstream browsers (IE8, Firefox, Chrome, Safari) with complete patches and smart phones (Blackberry, Android, iPhone, nokia/Symbian, Windows Mobile ). As a three-Day reward, Zero
Joomla exposes the high-risk 0-day vulnerability and can be remotely executed.
The Joomla security team urgently released version 3.4.6 to fix a high-risk 0-day vulnerability. It is reported that the vulnerability has been detected for more than two days and has been circula
, this option is gray and cannot be edited.
If you use Microsoft fix it to enable Dep on Windows Vista, the user interface of Internet Explorer is not displayed. However, after you reSTART Internet Explorer, you can useProcess ExplorerTo verify that DEP is enabled. "Microsoft fix it" ApplicationProgramWhen DEP is enabled by appcompat Shim, a registry key value is displayed on the Internet Explorer user interface.
Thank you
We are very grateful to Chengyun Chu for providing
The so-called 0-day vulnerability actually means cracking. The earliest cracking was targeted at software and later developed into games, music, movies, and other content. In the sense of information security, 0-day refers to the vulnerability information that is known and mastered before the security patch is released
A Flash software security vulnerability patch was downloaded today:China's current software development technology is very advanced, software engineers every day in the development of a variety of advanced software, these software in the industrial production process is very frequent, of course, the contribution of these software to industrial production is also
According to the technology blog ZDNET, FireEye, a security company, said in a latest report that a zero-day attack vulnerability was found on IE browser in the English version of Windows XP and Windows 7 systems.
Hackers exploit this vulnerability to target Internet Explorer 7, Internet Explorer 8, and Internet Explo
WindowsIn XP0 dayThe vulnerability is a zero-day vulnerability in the Windows Help Center program. It is caused by an error in calling the hcp protocol when the Help Center program performs format processing. Attackers can exploit this vulnerability to execute any existing p
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.