Oracle Magazine September/October features articles on Oracle Database 11g, data security, Oracle embedded databases, Oracle Partitioning, Oracle SecureFiles, Oracle Migration Workbench, and much more.
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2012-3461 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability
4.3
libotr
Solaris 11
11/11 SRU 12.4
This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.
According to a report by messaging security specialist MessageLabs, spam now accounts for close to 90 percent of all e-mail traffic....Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.
<b>IT Wire:</b> "The new IPFire distribution seeks to take security to the highest level while also making things a breeze for the less experienced to set up."
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2011-3905 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability
5.0
libxml2
Solaris 11
Contact Support
Solaris 10
SPARC: 125731-07 X86: 125732-07
Solaris 9
Contact Support
CVE-2011-3919 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability
7.5
This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2011-2821 Resource Management Errors vulnerability
7.5
libxml2
Solaris 11
Contact Support
Solaris 10
SPARC: 125731-07 X86: 125732-07
Solaris 9
Contact Support
CVE-2011-2834 Resource Management Errors vulnerability
6.8
This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.
<b>Datamation:</b> "It's not like Google was ever going to be a showcase customer for Microsoft, but a report that the search giant is phasing out Microsoft Windows underscores security concerns that have long dogged the widely-used software."
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2011-3102 Numeric Errors vulnerability
10.0
libxml2
Solaris 11
11/11 SRU 10.5
Solaris 10
SPARC : 125731-08 , x86 : 125732-08
Solaris 9
Contact Support
This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2012-3488 Permissions, Privileges, and Access Controls vulnerability
5.8
PostgreSQL
Solaris 10
SPARC : 138822-11 , 138824-11 , 138826-11 x86 : 138823-11 , 138825-11 , 138827-11
CVE-2012-3489 Improper Input Validation vulnerability
5.0
This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2010-4008 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability
4.3
libxml2
Solaris 10
SPARC: 125731-07 X86: 125732-07
Solaris 11
Contact Support
This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.
<b>eSecurity Planet: </b>"AT&T has 'turned off the feature' that made it possible for an independent security watchdog group to easily penetrate the telco's data networks to access the e-mail addresses of more than 114,000 Apple iPad 3G owners."
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2011-2728 Denial of Service (DoS) vulnerability
4.3
Perl 5.6
Solaris 10
SPARC: 146032-03 X86: 146033-03
Solaris 9
Patches planned but not yet available
This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2012-4245 Arbitrary code execution vulnerability
6.8
Gimp
Solaris 11
11/11 SRU 12.4
Solaris 10
Contact Support
This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2012-3524 Permissions, Privileges, and Access Controls vulnerability
6.9
libdbus
Solaris 11
11/11 SRU 12.4
This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.
With steady increase in the number of organizations across the world and incorporation of Information Technology into their businesses, the importance/need for proper security measures have become an... [Author: RNCOS E-Services Pvt. Ltd. - Computers and Internet - June 17, 2010]
I encourage clients to use web tools that have been developed for the masses and are free online. Of course they need to meet my criteria for security, user-friendly functions, and multi functions-- it needs to have the ability to meet the needs of different users. One of my favorites is the Google Calendar.
Just wondering, assuming no security issues, that is, you're in total control of the command passed to exec(), is there a difference (in terms of speed or standards) between using exec() vs native PHP?
Example just to name a few use cases:
Using the DirectoryIterator vs exec(ls -1, $output), to list all files.
List 100 files from the 99th file onwards (that is, file 100 to 199)
Count total number of files in directory.
Following a hectic April, the software giant only has two fixes to offer in its monthly Patch Tuesday security release, though both are deemed "critical."
Come hear how to protect Silverlight applications from common threats, including securing your application from intruders, eavesdroppers, and users as well as protecting your code, your data, and your servers from attacks. Also, hear about the key security vectors that must be considered when using Silverlight, such as securing applications that often live outside firewalls....Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2011-2791 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability
7.5
International Components for Unicode (ICU)
Solaris 10
SPARC: 119810-07 X86: 119811-07
Solaris 11
11/11 SRU 11.4
CVE-2011-4599 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability
7.5
This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.
The attractive ThinkCentre M90z all-in-one desktop is highly suitable as a small business computer, and it also offers security and desktop management features.
Software giant's latest Security Intelligence Report found that the number of infected PCs rose by 1.7 million in the second half of 2009, but improved monitoring is helping flag and clean the corrupted systems.
Microsoft expects to deliver just two critical fixes in its May security update, arriving this Tuesday....Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.
<b>Help Net Security:</b> "The word about Immunet's free anti-virus solution is spreading fast. The agent installed on my computer tells me that there are currently 162,597 people in the Immunet Cloud, and that I'm protected from 12,637,576 threats"
CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution
CVE-2012-4244 Denial of Service vulnerability
7.8
BIND
Solaris 11
Contact Support
Solaris 10
SPARC : 119783-24 , x86 : 119784-24
Solaris 9
SPARC : 112837-28 , x86 : 114265-27
This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.