Release date:Updated on: 2013-01-23
Affected Systems:Google Chrome 24Description:--------------------------------------------------------------------------------Bugtraq id: 57474Google Chrome is a simple and efficient Web browser tool developed by Google.Google Chrome has the Security Bypass Vulnerability. Attackers can exploit this vulnerability to bypass the local cross-site
Release date:Updated on: 2013-01-26
Affected Systems:Cisco WebEx SocialDescription:--------------------------------------------------------------------------------Bugtraq id: 57534CVE (CAN) ID: CVE-2012-6397Cisco WebEx Social is an enterprise collaboration platform.Cisco WebEx Social has an XSS vulnerability in the RSS service link, which allows remote attackers to inject arbitrary web scripts or HTML through a specially crafted RSS service link.Link: http://tools.cisco.com/security/center/cont
Release date:Updated on: 2013-02-04
Affected Systems:IBM InfoSphere Information Server 8.xDescription:--------------------------------------------------------------------------------Bugtraq id: 57635CVE (CAN) ID: CVE-2012-0203IBM InfoSphere Information Server can help enterprises obtain value from the complex Information distributed within their systems.The IBM Information Server Metadata Workbench 8.1, 8.5, and 8.7 have a cross-
Release date:Updated on: 2013-02-01
Affected Systems:Cisco Network Admission Control 4.xDescription:--------------------------------------------------------------------------------Bugtraq id: 57632CVE (CAN) ID: CVE-2012-6029The Cisco Network Admission Control (NAC) system consists of Cisco NAC Manager and servers. It is a policy component of the Cisco TrustSec solution.Cisco Network Admission Control does not properly filter web authentication function parameters. attackers can execute arbitrary
Release date:Updated on:
Affected Systems:Bugzilla 4.xBugzilla 3.xBugzilla 2.xDescription:--------------------------------------------------------------------------------Bugtraq id: 58060CVE (CAN) ID: CVE-2013-0785, CVE-2013-0786Bugzilla is an open-source defect tracking system that manages the entire lifecycle of defects in software development, such as submitting, repairing, and disabling defects.A security vulnerability exists in the implementation of Bugzilla, which can be exploited by malic
Release date:Updated on: 2012-4 4
Affected Systems:Ozerov BigDump 0.29bDescription:--------------------------------------------------------------------------------Bugtraq id: 56744
BigDump is a tool script developed by the German Alexey Ozerov in PHP to import mysql Data in batches.
BigDump 0.29b, 0.32b, and other versions have cross-site scripting, SQL injection
Release date:Updated on:
Affected Systems:Achievo 1.4.5Description:--------------------------------------------------------------------------------Bugtraq id: 56858CVE (CAN) ID: CVE-2012-5866
Achievo is a WEB-based project management tool.
"Include. the php "script has a cross-site scripting vulnerability when processing the" field "parameter of http get requests
Release date:Updated on:
Affected Systems:Joomla! Com_quizDescription:--------------------------------------------------------------------------------Bugtraq id: 56338
Joomla! Is an Open Source Content Management System (CMS ).
The Quiz component has the SQL injection vulnerability and cross-site scripting vulnerability. This vulnerability allows attackers to
Article Title: Cross-site scripting vulnerability in the Sun system WebServer. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Security vulnerability CN-VA04-66
Released on: 2004-7-23
Vulnerability impact: Attackers can remote
This type of attack was pointed out by security researchers as early as, but it has not been paid much attention in China. Because most of our sites in China are such vulnerable character sets, the impact is still relatively large, and we hope that all major sites can be quickly repaired. See http://applesoup.googlepages.com /.
In a general web program, a character set is specified when the data is displayed to the browser. In China, the character sets we usually use include UTF-8, GBK, and gb23
Discuz! Is a popular Web forum program in Chinese regions.
Discuz! The Forum does not properly filter and submit it to eccredit. the uid parameter of the php page. Remote attackers can execute cross-site scripting attacks by submitting malicious parameter requests to the Forum, resulting in arbitrary HTML and script code injection and execution in users' browser
Affected Versions:WordPress 3.0.1 vulnerability description:Bugtraq id: 42440
WordPress is a free forum Blog system.
If the action parameter is set to delete-selected, WordPress does not properly filter and submit it to wp-admin/plugins. php's checked [0] parameter is returned to the user, which allows remote attackers to execute a reflection-type cross-site scripting
Affected Versions:Ikiwiki 2.53.5Ikiwiki 2.53.4Ikiwiki 2.31.1Ikiwiki 2.31Ikiwiki 3.20100312Ikiwiki 3.1415926Ikiwiki 3.141592Ikiwiki 2.48Ikiwiki 2.47Ikiwiki 1.34Debian Linux 5.0Debian Linux 5.0 s/390Debian Linux 5.0 powerpcDebian Linux 5.0 mipselDebian Linux 5.0 mipsDebian Linux 5.0 m68kDebian Linux 5.0 IA-64Debian Linux 5.0 ia-32Debian Linux 5.0 hppaDebian Linux 5.0 armelDebian Linux 5.0 armDebian Linux 5.0 amd64Debian Linux 5.0 alphaDebian Linux 5.0.
Vulnerability description:
Ikiwiki is a Wik
I learned these things in dvwa (Damn Vulnerable Web App). I installed dvwa in my free space. If you are interested, please check it out. DVWA
If you want a user name and password, you can contact me: sq371426@163.com
Dvwa is provided by google for verification. For details, see google CAPCTHE
The cross-site scripting attack means that the user publishes html/j
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.