vulnerability database

Want to know vulnerability database? we have a huge selection of vulnerability database information on alibabacloud.com

How to modify MongoDB unauthorized access vulnerability in Linux

Recently, the security team detected that some Aliyun users exist MongoDB database unauthorized access vulnerabilities, vulnerabilities serious, easy to lead to database leaks. In order to ensure your business and application of security, please the vast number of users to repair the vulnerability as soon as possible.The specific issues are as follows: 1.

Five famous free SQL injection vulnerability scanning tools

A large number of modern enterprises use web applications to connect seamlessly with their customers. However, incorrect coding causes many security problems. Vulnerabilities in Web applications allow hackers to directly access sensitive information (such as personal data and logon information. Web applications allow visitors to submit data and retrieve data from databases over the Internet. Databases are at the heart of most web applications. The database

JSP security Development of the XSS vulnerability detailed _java

Objective Hello everybody, good man is me, I am a good man, I am -0nise. We often see XSS vulnerabilities in each of the major vulnerability reporting platforms. So the question is, why is there such a loophole? How should this vulnerability be fixed? Body 1.XSS? Xss? What the hell is XSS? XSS is also called a cross-site scripting attack (Cross Site scripting), and I won't tell him that it was originall

Research on the theory of 7.x privilege elevation vulnerability in dynamic network

In June on the black defense to see "dynamic network 7.1 loopholes found in the world," a paper, said admin_postings.asp file exists injection loopholes, but the prerequisite is to have a super moderator or front desk administrator rights. I think of the previous discovery of the 7.x version of the network has a foreground privilege elevation loophole, just can be combined to use. This foreground privilege elevation vulnerability is valid for both acc

Dedecms latest injection vulnerability analysis and repair

[] = 55 arrs2 [] = 52 arrs2 [] = 51 arrs2 [] = 56 arrs2 [] = 57 arrs2 [] = 52 arrs2 [] = 97 arrs2 [] = 48 arrs2 [] = 101 arrs2 [] = 52 arrs2 [] = 39 arrs2 [] = 32 arrs2 [] = 119 arrs2 [] = 104 arrs2 [] = 101 arrs2 [] = 114 arrs2 [] = 101 arrs2 [] = 32 arrs2 [] = 105 arrs2 [] = 100 arrs2 [] = 61 arrs2 [] = 49 arrs2 [] = 32 arrs2 [] = 35 Verification: Iv. Vulnerability repair Modify php. ini to enable php_mysqli.dll extension. 0

and ASP vulnerability intrusion said Byebye

security details, develop good safety habits, otherwise it will bring huge security risks to their website. At present, most of the ASP programs on the site have such a security vulnerability, but if you write a program to pay attention to, it can be avoided. 1, user name and password is cracked Attack principle: User name and password, is often the most interesting thing to hackers, if the source code is seen in some way, the consequences are seri

Eight rules of Security to prevent ASP Web site Vulnerability intrusion

numbers, to block out special characters. The length of the input character is also limited. And not only in the client to enter the legality of the check, but also in the server-side program to do similar checks. 6. Database Download Vulnerability How it works: When you use Access as a background database, it is dangerous to have someone who knows or guesses th

PHP Vulnerability Full solution (v)-sql injection attack

Label:SQL injection attack (SQL injection) is an attacker who submits a carefully constructed SQL statement in the form, altering the original SQL statement, which would cause a SQL injection attack if the Web program did not check the submitted data. General steps for SQL injection attacks: 1. An attacker accesses a site with a SQL injection vulnerability, looking for an injection point 2, the attacker constructs the injection statement, the injected

"Go" nessus vulnerability scanning Tutorial installation Nessus tools

Reprint Address: Http://my.oschina.net/u/1585857/blog/477035#OSC_h1_1Nessus Vulnerability Scanning Tutorial installation Nessus toolsNessus Vulnerability Scanning Tutorial Installing the Nessus toolCatalogue [-] Nessus Vulnerability Scanning Tutorial installation Nessus tools Nessus Basic Knowledge Nessus Overview Installing the Nessus tool

Thoughts on PHP code auditing and vulnerability Mining

parm2 = 2 parm3 = 3... parmn = n .... WVS uses a local script to attack the database to replace and fill these parameters, construct a new URL, and then send a request to the server through GET or POST, and perform regular identification on the returned results. For example, "ou have an error in your SQL syntax. If it appears, record it, indicating that the script page may have a "Vulnerability. WVS di

How does a website prevent "Upload Vulnerability" intrusion?

xiaomm. asp: indicates that the database is successfully restored. Open IE and enter the asp path of the database to run the Trojan.[Precaution]: Delete the recovery/backup database function in the background management.Iv. Add upload type VulnerabilityCurrently, the upload type can be added to the background of most forums, which is a major

Mysql remote code execution/privilege escalation vulnerability

As far as my current tests are concerned, this vulnerability has two reasons:1. Use the default mysql installation method. The mysql User does not have the permission to access the configuration file/etc/mysql/my. cnf;2. If selinux or apparmor is not disabled, an error will be reported when executing the exp script.Legalhackers mentioned this vulnerability in the original article on the premise that many pe

Two recent IBM DB2 LUW vulnerability elevation Analyses

Two recent IBM DB2 LUW vulnerability elevation Analyses IBM recently released two security vulnerability patches for linux, unix, and windows that affect DB2. This article will discuss the two vulnerabilities (CVE-2014-0907 and CVE-2013-6744) of some technical details, in this way, the database administrator can evaluate the risks of the

0-day security: second edition of software vulnerability analysis technology

to join the compilation camp. The three are the public, not to mention the addition of four new attackers, which are far more powerful than the skypixer, should be "bright" and "quantitative" enough. BoAnother important reason for the re-release is to take the lead of the masses. Let's take a look at this compilation team. Shineast: kernel debugging expert and vulnerability mining expert. Responsible for Windows Kernel security. He will teach you how

Oracle Injection Vulnerability

, I would be fine, but now I have nothing to do.I took out a port scanning tool and scanned the server on the X network. No vulnerabilities were found, which is really depressing! After thinking about it, X network has been doing so for more than 10 years. I am afraid there will be no fewer security measures for these large website servers- ing, and IDS and firewalls. Patches will certainly be available soon, maybe there's a honeypot program waiting for you!After a while, I suddenly found out th

ACTCMS system vulnerability exploitation and repair

statement without any filtering. This vulnerability is generated. Nowadays, most experienced programmers tend to have similar problems when deleting records. The exploitation of this vulnerability has certain limitations. If you are familiar with the injection vulnerability principle, you may find that this vulnerability

The prevention of Cookies Spoofing Vulnerability (VBS+JS implementation)

First, the principle of attack Cookies cheat mainly utilizes the current network some user management system to use the user login information to store in the Cookies the unsafe practice to attack, its attack method relative to the SQL injection loophole and so on the vulnerability to be "difficult" some, but still very "fool".We know that the average cookie-based user system stores at least two variables in cookies: username and userlevel, where user

An ASP page vulnerability triggered a penetration attack

Attack | page In recent days, the network seems to be always not peaceful, since the WebDAV vulnerabilities of the overflow tool released, online potential "broiler" seems to be more slowly up. Although the patch has been released for several days, but some people have no heart ... But what I'm going to talk about today is not a WebDAV vulnerability overflow attack, but a penetration attack with an ASP leaf

Bash in Linux discovers significant security vulnerability modification methods

September 25 News from Beijing time, Linux users today got a "surprise"! The Red Hat security team found a cryptic and dangerous security flaw in a bash shell that is widely used in Linux. The vulnerability is known as "Bash Bug" or "Shellshock".When the user is properly accessed, the vulnerability allows the attacker's code to execute as if it were in the shell, which opens the door for a variety of attack

Security vulnerability Remediation Solutions

Tomcat 6.0.34, download the corresponding Tomcat 6.0.35, and so on.4.1 Apache Tomcat sendfile Request Security Restriction Bypass and denial of service vulnerability: This vulnerability is also addressed through the above version upgrade method. For details, please refer to the official explanation:http://tomcat.apache.org/security-5.html#Fixed_in_Apache_Tomcat_5.5.35 and http://secunia.com/advisories/4523

Total Pages: 15 1 .... 11 12 13 14 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.