Aggregator
【安全圈】因软件更新,丹麦第一电信运营商宕机超过24小时
9 months ago
【安全圈】湖南网信办对某公司因数据泄露开出20万罚单
9 months ago
【安全圈】知名开源监控系统Zabbix存在SQL 注入漏洞
9 months ago
TiDB SQL 调优记录
9 months ago
TiDB SQL 调优记录
MySQL 左外连接查询优化记录
9 months ago
MySQL 左外连接查询优化记录
关于开展“清朗·网络平台算法典型问题治理”专项行动的通知
9 months ago
安全客
Flink × TiDB 实时 ETL 踩坑记录
9 months ago
Flink × TiDB 实时 ETL 踩坑记录
Python 字符串 DSL 巧计
9 months ago
Python 字符串 DSL 巧计
CVE-2012-1027 | project-open 3.4.0/3.5.0.1-2 message cross site scripting (VU#732115 / XFDB-72952)
9 months ago
A vulnerability classified as problematic was found in project-open 3.4.0/3.5.0.1-2. This vulnerability affects unknown code. The manipulation of the argument message leads to cross site scripting.
This vulnerability was named CVE-2012-1027. The attack can be initiated remotely. There is no exploit available.
vuldb.com
CVE-2012-2420 | Intuit QuickBooks 2009/2010/2011/2012 HelpAsyncPluggableProtocol.dll information disclosure (VU#232979 / Nessus ID 58848)
9 months ago
A vulnerability was found in Intuit QuickBooks 2009/2010/2011/2012. It has been declared as critical. This vulnerability affects unknown code in the library HelpAsyncPluggableProtocol.dll. The manipulation leads to information disclosure.
This vulnerability was named CVE-2012-2420. Access to the local network is required for this attack to succeed. There is no exploit available.
vuldb.com
CVE-2012-2440 | TP-Link 8840T Default Configuration access control (VU#834723 / XFDB-74624)
9 months ago
A vulnerability classified as critical was found in TP-Link 8840T. This vulnerability affects unknown code of the component Default Configuration. The manipulation leads to improper access controls.
This vulnerability was named CVE-2012-2440. The attack can be initiated remotely. There is no exploit available.
vuldb.com
CVE-2011-5171 | CyberLink Power2Go 7.0/8.0 memory corruption (VU#158003 / EDB-18220)
9 months ago
A vulnerability was found in CyberLink Power2Go 7.0/8.0. It has been declared as very critical. This vulnerability affects unknown code. The manipulation leads to memory corruption.
This vulnerability was named CVE-2011-5171. The attack can be initiated remotely. Furthermore, there is an exploit available.
vuldb.com
Tecnologie Utilizzate In Ambito AI e Blockchain (GPU, CPU, FPGA)
9 months ago
Tecnologie Utilizzate In Ambito AI e Blockchain (GPU, CPU, FPGA)
融合共生 新质网安|2024科创西安·SSC网络安全大会圆满举办
9 months ago
融合共生 新质网安|2024科创西安·SSC网络安全大会圆满举办
新型 Ymir 勒索软件利用内存进行隐蔽攻击;目标是企业网络
9 months ago
安全客
NAS远程控制 Windows PC 开关机和休眠、唤醒
9 months ago
NAS远程控制 Windows PC 开关机和休眠、唤醒
Energy industry contractor says ransomware attack has limited access to IT systems
9 months ago
Energy industry contractor says ransomware attack has limited access to IT systems
Право на приватность против корпоративного контроля: сотрудник Apple идёт в суд
9 months ago
Суд рассмотрит обвинения в слежке и ограничении свободы слова.
Creating an SDR from a TEF6686 Car Radio FM/AM Chip
9 months ago
Creating an SDR from a TEF6686 Car Radio FM/AM Chip