vulnerability database

Want to know vulnerability database? we have a huge selection of vulnerability database information on alibabacloud.com

Mshta vulnerabilities for hackers to open remote control of the door (map) _ Vulnerability Research

This is a hacker can be ecstatic new vulnerabilities, once the vulnerability is activated, there will be a large number of computer hackers in the hands of the chicken, the remote control is inevitable ... After a brief "respite" from Microsoft's Windows operating system, it has been a major part of the Microsoft Windows Mshta scripting exploits that have been successfully identified in several high-risk system vulnerabilities recently, with the relen

Joomla deserialization Vulnerability Detection

registers the write function as the processing function for writing SESSION content. However, in addition to a character replacement for data variables, the write function saves the data to the database without any operations. This replacement will not affect SESSION serialization and deserialization. One sentence mentioned in these analysis articles: Key name + vertical bar + value processed by the deserialization of the serialize () function. It is

OpenVAS Vulnerability Scanning basic teaching OpenVAS overview and installation and configuration OpenVAS services

OpenVAS Vulnerability Scanning basic teaching OpenVAS overview and installation and configuration OpenVAS Services OpenVAS FundamentalsThe OpenVAS (Open vulnerability Assessment System) is an open vulnerability assessment system with a core part of a server. The server includes a set of network vulnerability testers th

AspProductCatalog vulnerability analysis and exploitation (details)

Author: Spring brother home page: http://riusksk.blogbus.comThis article is first published in the black line of defense. For more information, see the source!Foreword AspProductCatalog is a database-driven product catalog that combines ASP and MS Access, primarily for enterprise owners to publish their products online. This is a very easy-to-install and use Web application. However, it has two vulnerabilities recently: XSS and

ASP Vulnerability Analysis and resolution (7)

18, MS ODBC database connection overflow caused nt/9x denial of service attack Vulnerability Description: A Microsoft ODBC database may have potential overflow problems when connecting and disconnecting (Microsoft Access database related). Connecting directly to the second database

CGI security vulnerability Data Quick Check v1.0 (turn four)

way that is exhaustive. Recommendation: It is recommended that access to the/IISADMPWD directory be prohibited Workaround: Delete the achg.htr file ____________________________________________________________________________________ 81 Type: Attack type Name: exprcale.cfm Risk Rating: Medium Description: In ColdFusion Web directory:/cfdocs/expeval/exprcalc.cfm file, this file has a vulnerability that allows users to read any file on the server har

ASP Vulnerability Analysis and resolution (6)

Resolves 18, MS ODBC database connection overflow causes nt/9x denial of service attack Vulnerability Description: A Microsoft ODBC database may have potential overflow problems when connecting and disconnecting (Microsoft Access database related). Connecting directly to the second

Analysis and protection of Apache Tomcat information leakage and Remote Code execution vulnerability

Attack and Defense laboratory Bo Shuofang Background informationApache and Tomcat are Web server, general Apache is static resolution, Tomcat is the Java application Server, dynamic parsing jsp, PHP, etc., is a container (servlet), can run independently of Apache. For example: Apache is a car, which can be loaded with things, such as HTML, but not the water, to fill the water must have containers (barrels), and this bucket can not be placed in the car, this is tomcat.Vulnerability overviewSeptem

Research on debugging system process (graph) _ Vulnerability from ms03-049 exploit

For readers: Vulnerability analyst, Black fan Pre-Knowledge: The basic debugging steps of overflow vulnerability, SoftICE Basic use method Wtf:windows XP SP2 believe that everyone is concerned about a system, this version just launched, because of its overflow protection mechanism, the traditional way of overflow has been lost, it has been favored. I remember when the peers began to mutter about the need to

Cross-Site Scripting Vulnerability explanation and Protection

results immediately after the input is complete2. After the input is complete, it is stored in a text file or database and then output the result.Note: the latter may make your website invisible! :(In addition to some normal situations, implicit input can also be implemented by using servers or CGI programs to process error messages. [Hazards]The most important thing is probably to consider this issue. The list below may not be comprehensive or syste

Simple SQL Injection Vulnerability Analysis

At present, many people basically use SQL injection in the intrusion process, but how many people know why such an injection vulnerability exists? Some will casually say that the character filtering is lax. But is that true? To learn this, we must not only know its nature, but also what it is! Only by linking theory with practice can we improve our technology. SQL injection is used in databases to manage large amounts of data in actual use. The

Analysis of PHP Function Vulnerability principle

)Issue 2: Return NULL when working with arraysSource:Test:Principle Analysis:MD5 (String,raw) syntax: string must, specify the string to be computed, raw optional, specify the output format, TRUE-16 character binary format, false-default, 32-character hexadecimal number.The function author specifies that the string type to be processed is str string for normal output. The pass array cannot be processed. Causes the output to be nullIssue 3: Creating a SQL Injection vulnerabilitySome query stateme

With Google you instantly become hackers _ vulnerability research

, then the harm is very great Google can also be used to search for a number of vulnerable programs, such as Zeroboard before the discovery of a file code leak vulnerability, you can use Google to find online use of this program station Point: Intext:zeroboard filetype:php or use: Inurlutlogin.php?_zb_path= site:.jp To find the page we need. phpMyAdmin is a powerful database * for software, some sites

Vulnerability analysis and hacker intrusion prevention method of ASP website

Author: pizzaviatSource: Eighth RegimentHow to better achieve the prevention of hacker attacks, I mention personal views! First, the free program does not really have a fee, since you can share the original code, then the attacker can analyze the code. If you pay attention to precautions in detail, your site's security will be greatly improved. Even if there are vulnerabilities such as SQL injection, attackers will not be able to take your site immediately. Due to the ease of use of ASP, more an

Wdcp X-Forwarded-For Injection Vulnerability Analysis

Wdcp X-Forwarded-For Injection Vulnerability Analysis 0x1 vulnerability updates on the official website: 20130804 (2.5.8) Fix an SQL injection security vulnerability and leak database information (must be upgraded) Description 2.5.7 and earlier versions have the injection vulnerab

PHP Remote DoS Vulnerability in-depth analysis and protection solution

PHP Remote DoS Vulnerability in-depth analysis and protection solution On July 6, May 14, the Remote DoS vulnerability in php was reported in China, with the official code 69364. This vulnerability is used to construct a poc initiation link, which can easily cause 100% cpu usage on the target host, involving multiple PHP versions. The aligreennet threat response

Security researchers discovered the Instagram vulnerability and was threatened by FaceBook executives

Ruby key token.2. Ruby (3.x) is running on the host. Ruby of this version is affected by the code execution vulnerability through Ruby session cookies.With this vulnerability, weberger can force the server to spit out a database containing login details, including creden。 for Instagram and Facebook employees. Although these passwords are encrypted with "bcrypt",

The NSA has long been exploiting the Heartbleed vulnerability and denied

the NSA to collect user data, even though it raises doubts about the motivation and effectiveness of the NSA. However, the NSA insists on denying the use of the Heartbleed vulnerability. The industry believes that the NSA can quickly discover this vulnerability shortly after the emergence of the Heartbleed vulnerability, which is not surprising because it is a s

Sqliscanner: A passive SQL injection vulnerability scanning Tool based on Sqlmap and Charles

Project Address: SqliscannerBrief introduction Corporation a passive SQL injection vulnerability scanning Tool based on Sqlmap and Charles A module isolated from the internal security platform supporting the scanning of Har files (with Charles use: Tools=>auto Save)Characteristics Mailbox Notifications Task statistics Sqlmap reproducing command generation Depend on Python 3.x Django 1.9 PostgreSQL

MySQL Security Analysis: mitigates the zero-day MySQL Vulnerability

Some of the world's largest companies (such as Facebook, Google and Adobe) and many smaller companies are using Oracle's MySQL database server software. Its performance, reliability, and ease of use make it an indispensable part of thousands of Web applications built on the LAMP (Linux, Apache, MySQL, Perl/PHP/Python) platform. In view of its large user base, recent zero-day vulnerabilities in MySQL have aroused high attention of the IT security team

Total Pages: 15 1 .... 11 12 13 14 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.