open source vulnerability database

Want to know open source vulnerability database? we have a huge selection of open source vulnerability database information on alibabacloud.com

Soyun the latest source code and audit Vulnerability report information

This article light blueSome time ago someone sent the source of cloud search, it has been a long time.I'm releasing the newest one this time.is the source code before he changed the template. (Now the search cloud back end basically no change changed a template only)At the same time the audit came up with some loopholes.My database configuration information and o

WebKit same-source policy Multiple Security Restriction Bypass Vulnerability

WebKit same-source policy Multiple Security Restriction Bypass VulnerabilityWebKit same-source policy Multiple Security Restriction Bypass Vulnerability Release date:Updated on:Affected Systems: WebKit Open Source Project WebKitApple iOS 5.xApple iOS 4.x Description: B

Database buffer Overflow Vulnerability principle (stack)

the opportunity to overwrite Seh. As with the overwrite return address, if the function entry after overwriting the exception is modified to the ingress of buffer above, then it is possible to fill the data +buffer address by shellcode+. To achieve the purpose of the attack, but note that it is necessary to trigger an exception in the fill data to ensure that SEH is triggered.The main principle of buffer overflow at this point in Windows has been introduced. An Huaqin and the

China cold Dragon Hack wireless network WEP password latest execution Vulnerability-source China cold Dragon

-traffic data transmission, so that even if you open airodump collected for several hours, you may not get enough packet problems. In addition this series of articles is only to communicate with you, I hope you do not use the method introduced in this article to invade other people's wireless network, the author wrote the purpose of this article is to let everyone understand that WEP encryption is not completely safe, so should try to use WPA security

C ++ open-source project summary and source code project summary

ACE and libevent, a heavyweight network library and a lightweight network library. Think about it. Now the program does not need a network. If you do not understand the network, you will be unable to proceed. The premise for getting familiar with these two open-source libraries is that you must understand the principle of socket. The recommended good book is UNIX network programming. You can simply read th

VisionMobile: Open Control Index (10)-Open Source Control Index

) Mozilla (4) Qt (4) Symbian (4) Webkit (4)Score 4: YesRating 3: No-there are differences in the following aspects: a: developer; B: Source Code; c: TimeScore 2: No-there are differences in the two aspects mentioned above.Score 1: No-there are differences in all aspects mentioned above 2. Is the source code license loose (permissive) OSI license? Score: Android (4) eclipse (3) Linux (2) meego (2) Mozilla (3

ucenter+ Cloud Market? Open Source User Center 2.0 era is about to open

according to their own needs in Opencenter Find what you need. 5. fine-grained permission systemOpencenter Core Support Authority permissions authentication method, accurately control each user behavior, while having user behavior log, record important operation, do not omit any user behavior. 6. Database ManagementOpencenter added backup and restore capabilities for data. 7. Module Handlingcan be done by Opencenter background Management to implement

MySQL database vulnerability equivalent to other databases 1/4

mysql| Data | Database CNET science and Information Network February 5 International Report according to software evaluation company Coverity Friday (January 4), through the open source database used by many websites--mysql's source code analysis, found that its vulnerabilit

Many open-source Android projects recommend and share the source code of 45 Android instances, which is very powerful.

Many open-source Android projects are recommended:Android learning Source Code Address: http://www.cnblogs.com/TerryBlog/archive/2011/04/18/2019907.html Http://blog.csdn.net/join_wangzi/article/details/8065227 Shares the source code of 45 Android instances, which is very powerful.Http://www.apkbus.com/android-20978-1

Analysis of Oracle Database XXE Injection Vulnerability (CVE-2014-6577)

this method does not require the aforementioned permissions.0x04 The ftp uri handler (FTP :) can also be used to trigger the XML Parser of Oracle. The following is an example of a query statement. In this example, the user name of the database is sent as the FTP User name: select extractvalue(xmltype(' The Database Server prompts an error (note that the error code is different from the above because the pr

How to read/analyze the source code of a PHP open source program

One of the reasons you like PHP is that she has countless open-source programs, phpxref. comhomecode-library, and a lot of excellent code for you to read in detail! The method to analyze the source code is just like it is needed to come to a new place! How to analyze a PHP open sou

Source code Research of Open Source P2P Video Streaming Media

. shoutcast/icecast ). stream-2-Stream (abbreviated "s2s" or "S2S") stations have no user limit; stations can be set up without paying a fortune for bandwidth. stream-2-Stream saves bandwidth by passing streams from one peer to another through multicast and unicast p2p, rather than everyone getting a stream from one central server (Shoutcast/Icecast ). more: http://s2s.sourceforge.net/about.php Open Source

Ruff Chain: A decentralized, open, open source, efficient distributed operating system __ Internet of Things

of data consistency and security in the Internet of things. Chunk Chain (English: Blockchain or block chain) is a distributed database, is a series of cryptographic methods associated with the production of data blocks, each block contains a bit-currency network transaction information, used to verify the validity of its information (anti-counterfeiting) and generate the next block. In simple terms, to the central management, everyone can be a center

Preliminary Report on cross-file query vulnerability of access Database

? Id = 24794 and 0 The format of this statement is obtained through multiple experiments :) Error :"DatabaseEngine cannot be openedFile'C: WINNTsystem32CMD. EXE '. It has been opened exclusively by another user or has no permission to view data. " Analytics uses the above error information. I think the right is limited, because we are the guestauthority Based on ASP, and cmd.exe is Everyone: R. If it cannot be openedDatabaseNo,FileThe folder can beDatabaseOtherwise, we cannot findFile. 10. Acce

Use of the eWebEditor upload vulnerability when the database is read-only

You may often encounter situations where there is an ewebeditor but there is no way to update the style. This is often because the administrator sets the database as read-only for security purposes. Even if it is read-only, we can make a breakthrough. Theoretically, it can be used as long as the conditions are met and the database is the same, and the version number is not necessarily the same. As described

Eleven popular open-source security tools on GitHub

As the cornerstone of the open-source development field, "All vulnerabilities are superficial" has become a well-known principle or even creed. As a well-known Linus law, when discussing the security advantages of open-source models, open code can improve the efficiency of P

How to learn the source code of PHP open source project more effectively

One. First install the source code, combined with its documentation and manuals, familiar with its function and its application. Two. Browse the directory structure of the source code to understand the capabilities of each directory. Three. After the above two steps to believe that you have a preliminary understanding of the open

How to read/analyze a source code for PHP Open source program

One of the reasons to like PHP is that she has countless open source programs http://phpxref.com/home/code-library, a lot of good code for you to take in your hand to peruse! Analyzing source code It's like going to a new place and needing a map! Q: How to analyze a PHP open sourc

[Open-source download] The Prompt window (c # source code) appears on the client based on the commands on the server ),

[Open-source download] The Prompt window (c # source code) appears on the client based on the commands on the server ), Demo Executable File Demo source code Development Technology winform c # language. net2.0 framework Communication Framework: networkcomms2.3.1 (open-

"Open source Download" Instant chat system (IM system) based on TCP network communication (C # source code)

C # open Source IM systemRelated resources are available in my resources 0 points downloadThe integration of the IM part of the system, extracted, a total of reference, but also as you can learn Networkcomms framework of a demoname : Breeze imName Source: Small means that the system is relatively simple      The wind is due to the UI used by the fan teacher year

Total Pages: 15 1 .... 11 12 13 14 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.