open source vulnerability database

Want to know open source vulnerability database? we have a huge selection of open source vulnerability database information on alibabacloud.com

GitHub synchronizes the open source code of Fork and the source code of githubfork.

GitHub synchronizes the open source code of Fork and the source code of githubfork. Recently Fork a very good C ++ Implementation of the algorithm set (https://github.com/xtaci/algorithms), how to synchronize with the open source code will be generated, the synchronization

Java open-source project source code

42.09% 46.05% 104,502 2006-05-26 (None) 0 Mycraigslist is a clone of Craigslist, it is composed of Java, JSP, hibernate, Struts and spring. mycraigslist is base on Project appfuse. Anyone is familiar with appfuse cocould easilly extend mycraigslist. Global Deal SystemOne trade system, writed by J2EE, using Lucene hibernate, spring, struts, typestry, JSF, webwork, JUnit, Ant and other technology. surporting MySQL, Oracle

Java Open source Fresh e-commerce platform-user table design (source code can be downloaded)

Java Open source Fresh e-commerce platform-user table design (source code can be downloaded)Note: Since this system belongs to the business-to-business platform, does not design to business-to-consumer architecture.Role analysis: Buyers and sellers.Because the buyer and the seller fill in the information is different, need to establish a two-stop table for mainte

Oracle Database local vulnerability (CVE-2015-4753)

Oracle Database local vulnerability (CVE-2015-4753)Oracle Database local vulnerability (CVE-2015-4753) Release date:Updated on:Affected Systems: Oracle Database 12.1.0.2Oracle Database 12.1.0.1Oracle

Open Source personal blog Imarkchina website system source code, _php tutorial

Open Source personal blog Imarkchina website system source code, Imarkchina is a free open source personal blog, everyone can use her!Imarkchina is a non-database lightweight blog program, as long as the server hard

Java Open source Fresh e-commerce platform-Technical solutions and documentation download (source code can be downloaded)

...... ..... ..... ..................... ..... ..... ..... ..... ..... ............. .......... 1613 Accessories .................................................................................................................. 16From, requirements baselines, design baselines, code baselines, test baselines, release baselines, a complete set of detailed data flows, below are the list of test baselines.4. Finally, the product line of the document preparation, including: summary design manual,

Share the C++socket framework swa-server (open source + source) that has been maintaining a simple and practical and efficient

Swa-server Open Source Framework* Suitable for small and medium-sized games, such as: Nurturance, RPG, chess, etc. application software, such as: chat room, etc.* Already envelopes good bottom socket management, SQL request processing, data encryption and decryption* Get started writing business* Swa-server is a framework for small and fast development, so the use of single-process mode, the next update is

Open-source personal blog iMarkChina website source code, _ PHP Tutorial

Open source personal blog iMarkChina website source code ,. IMarkChina is a free and open-source personal blog that can be used by everyone! IMarkChina is a lightweight open-source pers

Oracle Database Server 'tns Listener Remote Data Poisoning Vulnerability

Release date:Updated on: Affected Systems:Oracle Oracle10g Enterprise Edition 10.2.0.4Oracle Oracle10g Enterprise Edition 10.2. 5Oracle Oracle10g Enterprise Edition 10.2. 3Oracle Oracle10g Personal Edition 10.2.0.4Oracle Oracle10g Personal Edition 10.2. 5Oracle Oracle10g Personal Edition 10.2. 3Oracle Oracle10g Standard Edition 10.2.0.4Oracle Oracle10g Standard Edition 10.2. 5Oracle Oracle10g Standard Edition 10.2. 3Oracle Oracle11g Standard Edition 11.2.0.3Oracle Oracle11g Standard Edition 11.2

Database download vulnerability attack technology [group chart] _ MySQL

Database download vulnerability attack technology [group chart] is the No. 1 killer of script vulnerabilities-database download vulnerability, which is now widely known to more and more people. In this era of rapid information technology updates, vulnerabilities are followed by various countermeasures, such as modifyin

Starting from the little things around us, adding bricks and tiles to open-source development

consider helping improve the content of these articles? You may have professional advice, or you may have a pair of wrong eyes, which others don't have. Let's take a look at groklaw. It creatively uses open source concepts to help make complex legal issues understandable. Many companies are building internal wikis and forums to learn the true ideas of their employees. 9. Reporting vulnerabilities-not just

Edwin Alarm and Monitoring platform open source (Python source)

A brief introduction to EdwinThe Edwin is an alarm and monitoring platform that can be used to monitor anything, such as an anomaly (classified as warning and critical), and can be alerted. You can customize how alerts are notified, such as email/SMS/Phone. In addition, it provides a web UI, on which the status of monitoring metrics can be displayed in dashboard form.Edwin for the Monitoring Project organization, from small to large is: Check item, Pagelet->page, Dashboard. In addition, you can

Analysis of SQL injection Vulnerability dragging database

($sql, $conn); $row = Mysql_fetch_array ($result); echo " if (! $row) { echo "The record does not exist"; Exit } echo "title echo "Content ?> We enter it directly in the browser: The code is as follows Copy Code Http://127.0.0.1/marcofly/phpstudy/sqlinsert/showart.php?id=1 You can access a record with ID 1 in the article table The results of the visit are as follows: Next, we take advantage of this

MySQL database download Vulnerability attack technology

The number one killer of the script vulnerability, the database download vulnerability, is now well known to more and more people. In the era of rapid updating of information technology, the loopholes are followed by various coping strategies, such as changing the suffix of the database, modifying the name of the

JDBC Learning Review 7 Learning Apache Open Source DBCP data source

Tags: href lock common jar package Application Tom Import is just base DBCP (database connection pool), DB connection pool. is a Java Connection pool project on Apache and a connection pool component used by Tomcat. Use of DBCP alone requires 2 packages: Commons-dbcp.jar, Commons-pool.jar because establishing a database connection is a very time-consuming and resource-intensive behavior, the connectio

"Open Source safe operation Dimensional plane Ossim best practices"

Weapon 3326.3 Snort Log Analysis 3336.3.1 operating mode and output plug-in 3336.3.2 Packet logging Mode 3356.3.3 Network intrusion detection mode HIDs 3386.3.4 output plug-in 3386.4 Snort Rule Writing 3456.4.1 Snort Rule Analysis 3466.4.2 rule composition and meaning 3476.4.3 writing snort rules 3536.4.4 Manual modification of Suricata rules 3566.4.5 enabling the new ET rule 3566.4.6 Apply new Rule 3576.4.7 active detection and passive detection 3586.5 Suspicious traffic detection technology 3

Nopcommerce Source code Architecture--Initial knowledge of high-performance open-source mall system CMS

# latest Core TechnologiesNopcommerce is a foreign high-quality open-source website system, the latest version is based on the entity Framework6.0 and MVC5.0, using the Razor template engine, has a strong plug-in mechanism, including payment distribution functions are implemented through plug-ins, based on the multi-language version of XML, very flexible language switching functions, including in the backg

10 Open source Rookie projects

cloud storage network that enables end-to-end encryption. Users can transfer and share data without relying on third parties. Based on Bitcoin block chain technology and point-to-Point protocol, STORJ provides secure, private, encrypted cloud storage.Opponents of cloud data storage worry about cost efficiency and vulnerability attacks. To address these two issues, Storj is a private cloud storage market where users can buy and trade space through Sto

Top 11 Open Source security tools on GitHub

Malware analysis, penetration testing, and computer forensics--github hosts a range of compelling security tools to meet the real needs of computing environments of all sizes.As the cornerstone of open source development, "all loopholes are superficial" has become a famous principle or even creed. As a well-known Linus Law, when discussing the security advantages of ope

Open source is beneficial to system security

reputation by placing a backdoor in open code? In contrast, closed-source software is easier to place back doors or traps, and the NSA key found in the Windows operating system is compelling evidence. Open source can bring security Closed-source software is no better than

Total Pages: 15 1 .... 11 12 13 14 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.