Release date:Updated on:
Affected Systems:BigACE 2.7.7BigACE 2.7.6BigACE 2.7.5Description:--------------------------------------------------------------------------------Bugtraq id: 56615Cve id: CVE-2012-5173
BIGACE is a free Web content management system that helps you create and manage websites.
Session Fixation vulnerability exists in versions earlier than BIGACE
Release date: 2012-3 3Updated on: 2012-12-06
Affected Systems:Opera Software Opera Web Browser 12.11Description:--------------------------------------------------------------------------------Bugtraq id: 56788
Opera is a browser from Norway that features fast speed, saving system resources, strong customization ability, high security, and small size. It is one of the most popular browsers.
Opera Web Brow
Multiple ebogame web game platforms have the SQL Injection Vulnerability (ROOT permission), causing information leakage of million gamers (username/password/payment password, etc)
Multiple ebogame web game platforms have the SQL Injection Vulnerability (ROOT permission), which results in Information Leakage of million
substr ($ list [$ inc], 0, 17 )! = "Http: // 127.0.0.1 /"))Die ("Sorry, this script can only be tested against localhost .");// SetUpParameters is used to analyze each GET parameter in the URL address and store it in the array $ get and $ getvaluesIf (trim ($ url )! = ""){Echo "$ newline $ url $ newline ";// Test each possible VulnerabilityFor ($ vulni = 0; $ vulni Switch ($ vulni ){Case 0: echo "* General web vulnerabilities $ newline"; break;Case 1
Release date:Updated on:
Affected Systems:Open Web Analytics Description:--------------------------------------------------------------------------------Bugtraq id: 64774CVE (CAN) ID: CVE-2014-1206
Open Web Analytics is an Open source website traffic statistics system.
Openweb Analytics 1.5.4 and earlier versions do not properly filter the index. the "owa_email_address" parameter of php ("owa_do" is set to
Release date:Updated on:
Affected Systems:KNet Web ServerDescription:--------------------------------------------------------------------------------Bugtraq id: 58781KNet Web Server is a small Web Server.Remote buffer overflow exists in KNet 1.04b and other versions. During the vulnerability attack exception handling p
extension to allow the storage. Anyway, do the enforcement permission limit, you do not as required to save content, also no harm. Anyway, can not be executed, nor how much harm.
correct steps:1. Read the file name to verify that the extension is within range
2. Define your own generated file name, directory, extension can come from the file name extension. Other values, which are configured on their own, do not read the contents of the storage
3. Move the file to a new directory (this directo
extension to allow the storage. Anyway, do the enforcement permission limit, you do not as required to save content, also no harm. Anyway, can not be executed, nor how much harm.
correct steps:1. Read the file name to verify that the extension is within range
2. Define your own generated file name, directory, extension can come from the file name extension. Other values, which are configured on their own, do not read the contents of the storage
3. Move the file to a new directory (this directo
Release date: 2011-12-06Updated on: 2011-12-16
Affected Systems:Opera Software Opera Web Browser 11.xUnaffected system:Opera Software Opera Web Browser 11.60Description:--------------------------------------------------------------------------------Bugtraq id: 50915
Opera is a browser from Norway.
Opera has a security vulnerability in the implementation of the
JSP Source Code leakage vulnerability caused by multiple web application serversAuthor: Zoomlion Chinese: Unknown: JSPERAffected Systems:BEA Systems Weblogic 4.5.1-Microsoft Windows NT 4.0BEA Systems Weblogic 4.0.4-Microsoft Windows NT 4.0BEA Systems Weblogic 3.1.8-Microsoft Windows NT 4.0IBM Websphere Application Server 3.0.21-Sun Solaris 8.0-Microsoft Windows NT 4.0-Linux kernel 2.3.x-Ibm aix 4.3Unify eWa
. Popup "unlocks the registry for you"Unlock. RegWrite "HKCUSoftwareMicrosoftWindowsCurrentVersionPoliciesSystemDisableRegistryTools" 0 "REG_DWORD"
Method 5: Hehe, uses his own way to cure his own body. I will not describe it here (I will go to the Internet to find information myself)Edit the Registry in DOS.Please remember to back up the registry before modifying the registry !! Remember !!Now that we know the method, we can analyze all kinds of malicious websites and their strategies.Maliciou
Release date:Updated on:
Affected Systems:RedHat JBoss Web Framework Kit 2.4.0Description:--------------------------------------------------------------------------------CVE (CAN) ID: CVE-2013-6447, CVE-2013-6448
Red Hat JBoss Web Framework Kit makes it easier to build and maintain light-rich Java applications using popular open-source technologies. It is included in the JBoss Enterprise Application Platfor
Release date: 2011-12-29Updated on: 2011-12-30
Affected Systems:Apache Group Tomcat 7.xApache Group Tomcat 6.xApache Group Tomcat 5.xUnaffected system:Apache Group Tomcat 7.0.23Apache Group Tomcat 6.0.35Apache Group Tomcat 5.5.35Description:--------------------------------------------------------------------------------Bugtraq id: 51200
Tomcat is a Servlet container developed by the Jakarta project under the Apache Software Foundation. According to the technical specifications provided by Sun Mi
Mind
Affected Versions: LatestHttp://www.kewei8.com
Vulnerability Type: SQL InjectionVulnerability description:
Take a few minutes to find the vulnerability.The web site navigation is the same as the program file in the box navigation. The interface is different.Classic dialogue... view code...Admin/cache. php
Injection test:
Http: // 127.0.0.1/admin/cache. php? Type = category categoryid = 1% 20and % 201
Security China Tip: This procedure is only used for technical research, do not use for illegal purposes, otherwise, the consequences of conceit!
Recently bought a space to play, you do not laugh, is the entry level of the virtual host (even poor AH), the various parameters are quite low, especially the number of IIS connections, only 100 (that is, support 100 different access).
There is a problem here. If I have been connected to the site, although I am the same person, but IIS is silly to each
JSP multiple Web application servers cause JSP source code leak vulnerability
Author: Sino-Lian NSFocus: Jsper
Affected Systems:
BEA Systems Weblogic 4.5.1
-Microsoft Windows NT 4.0
BEA Systems Weblogic 4.0.4
-Microsoft Windows NT 4.0
BEA Systems Weblogic 3.1.8
-Microsoft Windows NT 4.0
IBM Websphere Application Server 3.0.21
-Sun Solaris 8.0
-Microsoft Windows NT 4.0
-Linux Kernel 2.3.x
-IBM A
Recent time the company's website to go online, in view of the last business trip when colleagues last code. It was not long before the risk of hacking hacked out. The last time the code was appropriate select an attack to take a risk assessment of the uploaded code: try to be proactive. A software Ibmscan is recommended here:Here is not cumbersome to explain, you find a suitable version of the installation is good, the use of the method is very simple, the following gives me to use:650) this.wi
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.