vulnerability database cve

Want to know vulnerability database cve? we have a huge selection of vulnerability database cve information on alibabacloud.com

Sap ase Database Platform SQL Injection Vulnerability (CVE-2015-4160)

Sap ase Database Platform SQL Injection Vulnerability (CVE-2015-4160)Sap ase Database Platform SQL Injection Vulnerability (CVE-2015-4160) Release date:Updated on:Affected Systems: Sap ase D

The perfect solution for the Oracle database Server ' TNS Listener ' Remote Data Poisoning Vulnerability (cve-2012-1675) _oracle

Environment: Windows 2008 R2 + Oracle 10.2.0.3 After applying the latest bundle patch, the scan still reported a vulnerability Oracle database Server ' TNS Listener ' Remote Data Poisoning Vulnerability (cve-2012-1675) ·1. Determine the solution 2. Application Solutions 3. Verify Patch Status 4.reference 1. Deter

Oracle Database local vulnerability (CVE-2015-4753)

Oracle Database local vulnerability (CVE-2015-4753)Oracle Database local vulnerability (CVE-2015-4753) Release date:Updated on:Affected Systems: Oracle Database 12.1.0.2Oracle

Oracle Database XXE Injection Vulnerability Analysis (cve-2014-6577)

Tags: method Oracle database Use lang query sys serve problem extraIn this article, we will work together to analyze the Oracle database's XXE Injection Vulnerability (cve-2014-6577), which was released by Oracle on January 20 with patches for this vulnerability. For XXE related knowledge, you can check the security pu

Analysis of Oracle Database XXE Injection Vulnerability (CVE-2014-6577)

Analysis of Oracle Database XXE Injection Vulnerability (CVE-2014-6577)Vulnerability description the XML Parser module of the Oracle database is vulnerable to XML External Entity (XXE) injection.Affected Versions: 11.2.0.3, 11.2.0.4, 12.1.0.1, and 12.1.0.2Required permission

Android Privilege Elevation Vulnerability CVE-2014-7920 & CVE-2014-7921 Analysis

Android Privilege Elevation Vulnerability CVE-2014-7920 CVE-2014-7921 Analysis This is Android mediaserver Elevation of Privilege Vulnerability, the use of CVE-2014-7920 and CVE-2014-7921 to achieve Elevation of Privilege, from 0

Technical Articles | Cve-2017-12615/cve-2017-12616:tomcat Information Disclosure and Remote Code execution vulnerability Analysis report

This article is from Aliyun-yun-Habitat community, the original click here. I. Overview of Vulnerabilities September 19, 2017, Apache Tomcat official confirmed and fixed two high-risk vulnerabilities, vulnerability CVE number: cve-2017-12615 and cve-2017-12616, The vulnerability

Introduction to Android Privilege Elevation Vulnerability CVE-2014-7920 and CVE-2014-7921

Introduction to Android Privilege Elevation Vulnerability CVE-2014-7920 and CVE-2014-7921 This is Android mediaserver Elevation of Privilege Vulnerability, the use of CVE-2014-7920 and CVE-2014-7921 to achieve Elevation of Privile

cve-2014-7920&cve-2014-7921 Analysis of Android right-of-reference vulnerability

No feather @ Ali Mobile Security, more technical dry, please visit Ali Poly Security BlogThis is the right to exploit Android MediaServer, using cve-2014-7920 and cve-2014-7921 to implement the right, from 0 permissions mentioned media permissions, which cve-2014-7921 affect Android 4.0.3 and later versions, Cve-2014-7

cve-2014-7920&cve-2014-7921 Analysis of Android right-of-reference vulnerability

No feather @ Ali Mobile Security, more security technology dry, please visit the security blog Ali This is the right to exploit Android MediaServer, using cve-2014-7920 and cve-2014-7921 to implement the right, from 0 permissions mentioned media permissions, which cve-2014-7921 affect Android 4.0.3 and later versions, C

"Code Audit" Spring Integration zip unsafe decompression (cve-2018-1261) Vulnerability analysis

1. Vulnerability related informationVulnerability name : Spring Integration Zip unsafe decompressionVulnerability number : cve-2018-1261Vulnerability Description : In versions prior to Spring-integration-zip.v1.0.1.release, a malicious user constructs a file containing a specific file name in a compressed file (the affected file format is bzip2, tar, XZ, war , Cpio, 7z), when an application uses Spring-inte

WebLogic arbitrary file Upload Remote Code execution Vulnerability (cve-2018-2894)------->>> arbitrary file Upload detection POC

Objective:Oracle officially released the July Critical patch update CPU (Critical patch update), which fixes a high-risk vulnerability that could cause remote code execution cve-2018-2894:Http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.htmlcve-2018-2894, a security researcher at China's National Internet Emergency Center Cncert Mingxuan Song and security researcher at Apple, David Lit

CVE-2014-6271 Bash Security Vulnerability mac OS X 10.9 repair process, cve-2014-6271bash

CVE-2014-6271 Bash Security Vulnerability mac OS X 10.9 repair process, cve-2014-6271bash# DetectionOpen the command line and enter the following content: env x='() { :;}; echo vulnerable' bash -c "echo this is a test" If the following is returned, upgrade as soon as possible. vulnerable this is a test # Upgrade Check the current versio

Vulnerability tracking: Flash serious vulnerability (CVE-2015-0311) detailed technical analysis

Vulnerability tracking: Flash serious vulnerability (CVE-2015-0311) detailed technical analysisYou have a good time with the Flash 0-day vulnerability last week. You need to know why, and sit down and see the cause of this vulnerability when you are tired of playing.Vulnerab

Cve-2017-12617_ vulnerability of Apache Tomcat vulnerability

cve-2017-12617 Severe Remote Code Execution (RCE) vulnerability found in Apache Tomcat Affects systems with HTTP put enabled (by setting the default servlet read-only initialization parameter to false). If the default servlet parameter is read-only set to False, or the default servlet is configured, The Tomcat version before 9.0.1 (Beta), 8.5.23,8.0.47, and 7.0.82 contains potentially dangerous remote code

Status2k Remote Command Injection Vulnerability (CVE-2014-5090)

, CVE-2014-5091, CVE-2014-5092, CVE-2014-5093 1. Cross site scripting/XSS... there's tons, exampleAdmin login page, etc Login. php: If (isset ($ _ GET ['username']) {$ useren = $ _ GET ['username'];}If (isset ($ _ POST ['Password']) {$ useren =$ _ POST ['username'];}$ Q = mysql_query ("SELECT * FROM". $ prefix. "users ");$ Adminuser = $ res ['adminuser']; // Logi

Linux glibc security vulnerability cve-2015-7547 Repair and detection method

[TCP] Request1 Len Recv 44[UDP] Total Data Len Recv 44[UDP] Total Data Len Recv 44Connected with 127.0.0.1:34044[TCP] Total Data Len Recv 46[TCP] Request1 Len Recv 44[UDP] Total Data Len Recv 44[UDP] Total Data Len Recv 44Connected with 127.0.0.1:34045[TCP] Total Data Len Recv 46[TCP] Request1 Len Recv 44[UDP] Total Data Len Recv 44[UDP] Total Data Len Recv 44Connected with 127.0.0.1:34046[TCP] Total Data Len Recv 46[TCP] Request1 Len Recv 44[UDP] Total Data Len Recv 36[UDP] Total Data Len Recv

Wordpress4.2.3 privilege escalation and SQL Injection Vulnerability (CVE-2015-5623) Analysis

Wordpress4.2.3 privilege escalation and SQL Injection Vulnerability (CVE-2015-5623) AnalysisThis is a vulnerability that you have been paying attention to over the past few days. wordpress released version 4.2.4 last week, which mentioned fixing possible SQL vulnerabilities and Multiple XSS.Check point was quickly analyzed. I also analyzed and reproduced the late

Cause Analysis of CVE-2014-0321 Vulnerability

released and reused objects. Status before the object is released: It can be seen that the creation process and size of the ctreenode Node object (0x60) Status of the released object: Set the following breakpoint to track the status after the onerror callback function is executed. Bu mshtml! Csplicetreeengine: insertsplice + 0x11fa After tracking to the following locations, you can find that the reused object is passed to cinsertspliceundo: setdata as a parameter. 3.2.5. Memory placeholder

Android Serialization Vulnerability--cve-2015-3525

from sending android.os.BinderProxy, but with this vulnerability we can find a serializable class that can replace Android.os.BinderP if the following conditions are met: Roxy implements the purpose of code execution:(1) The Finalize method is realized;(2) A native pointer is called in the Finalize method;(3) The native pointer is controllable by the attacker (not declared as transient and static);(4) implements the Serializible interface (serializab

Total Pages: 15 1 2 3 4 5 .... 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.