vulnerability database

Want to know vulnerability database? we have a huge selection of vulnerability database information on alibabacloud.com

Serious security vulnerability detection and repair scheme for Linux glibc Library

January 27, 2015 The gethostbyname function of the Linux GNU glibc standard library burst into a buffer overflow vulnerability, with the vulnerability number cve-2015-0235. The hacker can realize the remote code execution through the GetHostByName series function, obtains the server control and the Shell permission, this vulnerability triggers the way many, the i

Powerful vulnerability Detection Tool: Retina CS

RETINACS Powerful Vulnerability Detection Tool eeye Digital Security Company was founded in the late 90 's, it is the world's leading security company, using the latest research results and innovative technologies to ensure your network Brother system security, and to provide you with the most powerful services: comprehensive, vulnerability assessment, intrusion prevention, customer security solutions. We

Tomcat vulnerability utilization and security reinforcement instance analysis

penetrate website instances Tomcat has a management backend by default. The default Management address is http: // IP or domain name: Port Number/manager/html. With this background, you can conveniently deploy, start, stop, or uninstall WEB applications without restarting the Tomcat service. However, improper configuration poses a major security risk. Attackers can exploit this vulnerability to quickly and easily intrude into a server. Let's look at

Php page vulnerability analysis and troubleshooting

injection. mysql is not flexible in SQL statement usage. therefore, many query statements that can be used in mssql cannot work in mysql. the common injection statements are as follows: aaa. php? Id = a' into outfile 'pass.txt or aaa. php? Id = a 'Into outfile 'pass.txt '/* can be changed to aaa. php? Id = a' or 1 = 1 union select id, name, password form users into outfile 'C:/a.txt In this way, you can export the database data as a file and view it

Latest Hacker technology: XSS cross-Site Scripting Attack Detail _ Vulnerability Research

General Introduction Simple description of what an XSS attack is How to find an XSS vulnerability General ideas for XSS attacks Attacks from within: How to find an internal XSS vulnerability How to construct an attack How to use What instance of the attack, such as Dvbbsbbsxp Attacks from the outside How to construct an XSS attack How to deceive an administrator to open How XSS and other technologies are li

Yunnan South Day Electronic Information Industry Co., Ltd. A station SQL injection vulnerability

220.163.13*.**[emailprotected]:~# sqlmap-u http://www.****.com.cn/****. aspx?keyword=-V 1--dbs--tamper=space2comment--level 3web server operating system:windows 2003 or XPweb Applicat Ion Technology:ASP.NET, Microsoft IIS 6.0, ASP. 2.0.50727back-end dbms:microsoft SQL Server 2005nb Sp;4 system-Level library Master: The primary control function the master database controls all aspects of SQL Server. This database

MetInfo (mi tuo) enterprise website management system 5.0.2 code audit vulnerability exploitation and repair Summary

= http: // localhost: 88/1 Contains the http://www.bkjia.com: 88/1. php file Fix: You should understand how to handle this. Do you need to change your code?Iii. Arbitrary File Deletion Vulnerability Delete 1, There is a file management in the background The vulnerability file is admin/system/uploadfile. php. Check the code. If ($ action = 'delete '){ $ Rurls. = ' fileurl ='. $ fileurl. ' file_classnow

PHP vulnerability full solution (details)

PHP websites are vulnerable to the following attacks:1. Command Injection)2. eval Injection)3. Script Insertion)4. Cross-Site Scripting (XSS)5. SQL injection attacks)6. Cross-Site Request Forgery (CSRF)7. Session Hijacking)8. Session Fixation)9. HTTP Response Splitting attack (HTTP Response Splitting)10. File Upload Attack)11. Directory Traversal Vulnerability (Directory Traversal)12. Remote File Inclusion attack)13. Dynamic Function injection (Dynami

LoreArticle. PHPSQL injection vulnerability

Lore is a WEB-based article management system. Lore does not fully Filter user-submitted URIs. remote attackers can exploit this vulnerability to launch SQL injection attacks to obtain sensitive information. The problem is that the Article. php script does not fully Filter user-submitted id parameters. when malicious SQL queries are submitted as parameter data, the original SQL logic can be changed to obtain sensitive information or possibly operate t

Memcached unauthorized access vulnerability and hardening

Memcached is a set of distributed cache systems. It stores data in memory in the form of key-value (key-value pairs), which are often read frequently by the application. Because the in-memory data is read far more than the hard disk, it can be used to speed up the application's access.Causes of vulnerability:Due to memcached security design flaws, clients can read and modify server cache content without authentication after connecting to the memcached server.

Linux re-exposure security vulnerability bash damage will be super-painstaking

September 25 Message: a Linux security vulnerability that is alleged to be more severe than "bleeding heart" was found, although no attack was found to exploit the vulnerability, but a lower operating threshold than "heart bleed" made it more dangerous than the former.Bash is the software used to control the command prompt for a Linux computer. "Bleeding with the heart" allows hackers to spy on the computer

Web site vulnerability detection for Blockchain site security analysis

At present, the mobile Internet, the blockchain more and more, in the blockchain security, a lot of the existence of the website vulnerability, the recharge of the blockchain and withdraw, the membership account of the storage of XSS theft vulnerability, account security, and so on these blockchain loopholes, we sine security to its collation and summary. At present the whole Blockchain website Security mar

Shopex post Remote code execution vulnerability Repair patch

Shopex released a single store version of V4.7.1 KS47103 fixed a remote code execution vulnerability. After receiving the vulnerability report (Shopex Remote Code Execution Vulnerability), the Shopex technician responded quickly and completed the patch production test and release work within 30 minutes. The vulnerability

To test whether a cross-site scripting vulnerability exists in a Web application

example, an attacker could send a maliciously crafted malicious URL to the victim via e-mail, IM, or other means. When the victim opens the URL in a Web browser, the Web site displays a page and executes the script on the victim's computer. Testing XSS Vulnerabilities I've been a full-time security advisor for years, and I've done this countless times. I boil down the good test plan to two words: thorough. For you and me, finding these vulnerabilities has nothing to do with having the opportuni

Detection and repair method of bash Vulnerability in UNIX-like system

Recent bash exploits have allowed many Unix-like lying guns. The following are the relevant detection methods and remediation methods (content source Aliyun Developer Forum) ----------------------------------------------------------------------------------------------------- Bash Emergency Vulnerability Alert, please note all users who are using Linux servers. This vulnerability directly affects unix-bas

Zabbix re-explosion high-risk SQL injection vulnerability, system permissions can be obtained

Vulnerability OverviewZabbix is an open source enterprise-class performance monitoring solution. Recently, Zabbix's jsrpc profileIdx2 parameter has the Insert method SQL injection vulnerability, the attacker does not need to authorize the login to log on the Zabbix management system, but also can easily obtain the Zabbix server's operating system permission directly through the script and so on function.off

Zabbix re-explosion high-risk SQL injection vulnerability, system permissions can be obtained

Label: Vulnerability Overview Zabbix is an open source enterprise-class performance monitoring solution. Recently, Zabbix's jsrpc profileIdx2 parameter has the Insert method SQL injection vulnerability, the attacker does not need to authorize the login to log on the Zabbix management system, but also can easily obtain the Zabbix server's operating system permission directly through the script and so on fun

Cause Analysis of CVE-2014-0321 Vulnerability

released and reused objects. Status before the object is released: It can be seen that the creation process and size of the ctreenode Node object (0x60) Status of the released object: Set the following breakpoint to track the status after the onerror callback function is executed. Bu mshtml! Csplicetreeengine: insertsplice + 0x11fa After tracking to the following locations, you can find that the reused object is passed to cinsertspliceundo: setdata as a parameter. 3.2.5. Memory placeholder

Website Security-XSS vulnerability attacks and Preventive Measures

embed malicious JavaScript, for example, you can obtain the javascript: document. cookie and so on. The other is that the area that supports rich text does not filter malicious JavaScript, such as the blogArticleAttackers can obtain malicious javascript such as cookies embedded in the content.CodeThese two types of phenomena are too many. On the contrary, the rich text area will be better, for example, UBB used in most forums. In addition, everyone will pay more attention to the rich text, howe

Android App Vulnerability Mining

0x001. Component exposes security vulnerabilitiesRefer to Android component security.2. Content Provider file Folder Traversal vulnerabilityReference content Provider file folder Traversal Vulnerability analysis.3, Androidmanifest.xml in allowbackup safety inspectionTwo minutes to steal the next goddess Weibo account? Explain the risks associated with Android App allowbackup configuration.4. Intent Hijacking risk Safety testRefer to the Android compon

Total Pages: 15 1 .... 11 12 13 14 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.