When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. XZ Utils backdoor - Wikipedia

    en.wikipedia.org/wiki/XZ_Utils_backdoor

    In February 2024, a malicious backdoor was introduced to the Linux build of the xz utility within the liblzma library in versions 5.6.0 and 5.6.1 by an account using the name "Jia Tan". [ b ] [ 4 ] The backdoor gives an attacker who possesses a specific Ed448 private key remote code execution through OpenSSH on the affected Linux system.

  3. YUI Library - Wikipedia

    en.wikipedia.org/wiki/YUI_Library

    The YUI Library project at Yahoo! was founded by Thomas Sha and sponsored internally by Yahoo! co-founder Jerry Yang; its principal architects have been Sha, Adam Moore, and Matt Sweeney. The library's developers maintain the YUIBlog; the YUI community discusses the library and its implementations in its community forum.

  4. Stagefright (bug) - Wikipedia

    en.wikipedia.org/wiki/Stagefright_(bug)

    This vulnerability affects specially crafted MP3 and MP4 files that execute their payload when played using the Android Media server. The vulnerability has been assigned identifier CVE-2015-6602 and was found in a core Android library called libutils; a component of Android that has existed since Android was first released. Android 1.5 through ...

  5. YUI Rich Text Editor - Wikipedia

    en.wikipedia.org/wiki/YUI_Rich_Text_Editor

    YUI Rich Text Editor is a project developed by Yahoo! as a part of the YUI Library for an online rich-text editor that replaces a standard HTML textarea. It allows for drag and drop inclusion and sizing of images, text coloring, realignment, fonts, italic and bold text.

  6. Code property graph - Wikipedia

    en.wikipedia.org/wiki/Code_property_graph

    A code property graph of a program is a graph representation of the program obtained by merging its abstract syntax trees (AST), control-flow graphs (CFG) and program dependence graphs (PDG) at statement and predicate nodes.

  7. Log4Shell - Wikipedia

    en.wikipedia.org/wiki/Log4Shell

    Log4Shell (CVE-2021-44228) is a zero-day vulnerability reported in November 2021 in Log4j, a popular Java logging framework, involving arbitrary code execution. [2] [3] The vulnerability had existed unnoticed since 2013 and was privately disclosed to the Apache Software Foundation, of which Log4j is a project, by Chen Zhaojun of Alibaba Cloud's security team on 24 November 2021.

  8. DROWN attack - Wikipedia

    en.wikipedia.org/wiki/DROWN_attack

    The DROWN (Decrypting RSA with Obsolete and Weakened eNcryption) attack is a cross-protocol security bug that attacks servers supporting modern SSLv3/TLS protocol suites by using their support for the obsolete, insecure, SSL v2 protocol to leverage an attack on connections using up-to-date protocols that would otherwise be secure.

  9. ROCA vulnerability - Wikipedia

    en.wikipedia.org/wiki/ROCA_vulnerability

    The ROCA vulnerability is a cryptographic weakness that allows the private key of a key pair to be recovered from the public key in keys generated by devices with the vulnerability. "ROCA" is an acronym for "Return of Coppersmith's attack". [1] The vulnerability has been given the identifier CVE-2017-15361.