Apple Safari information leakage (CVE-2015-1112)Apple Safari information leakage (CVE-2015-1112)
Release date:Updated on:Affected Systems:
Apple Safari Apple Safari Apple Safari
Description:
Bugtraq id: 73974CVE (CAN) ID: CVE-2015-1112Safari
Xen Memory Corruption Vulnerability (CVE-2015-2151)
Release date:Updated on:
Affected Systems:XenSource Xen 3.2.x-4.5.xDescription:Bugtraq id: 73015CVE (CAN) ID: CVE-2015-2151
Xen is an open-source Virtual Machine monitor developed by the University
Tcpdump DoS Vulnerability (CVE-2015-2154)
Release date:Updated on:
Affected Systems:Tcpdump 4.xDescription:Bugtraq id: 73017CVE (CAN) ID: CVE-2015-2154
Tcpdump is a sniffing tool running on the command line. It allows users to intercept and
Ecava IntegraXor DLL Vulnerability (CVE-2015-0990)
Release date:Updated on:
Affected Systems:Ecava IntegraXor SCADA Server Description:CVE (CAN) ID: CVE-2015-0990
IntegraXor is used to create and run man-machine interfaces of Web-based SCADA
Cisco Catalyst 4500 SNMP round robin Denial of Service Vulnerability (CVE-2015-0687)Cisco Catalyst 4500 SNMP round robin Denial of Service Vulnerability (CVE-2015-0687)
Release date:Updated on:Affected Systems:
Cisco catalytic 4500
Description:
SMM Local Code Execution Vulnerability (CVE-2015-0949) for Multiple Products)
Release date:Updated on:
Affected Systems:DellHPDescription:Bugtraq id: 73261CVE (CAN) ID: CVE-2015-0949
System Management Mode (SMM) is the highest permission
Tcpdump "osi_print_cksum ()" Memory Corruption Vulnerability (CVE-2015-2153)
Release date:Updated on:
Affected Systems:Tcpdump 4.xDescription:CVE (CAN) ID: CVE-2015-2153
Tcpdump is a sniffing tool running on the command line. It allows users to
Ntpd MAC Spoofing Vulnerability (CVE-2015-1798)
Release date:Updated on:
Affected Systems:NTP NTP 4.xDescription:CVE (CAN) ID: CVE-2015-1798
Network Time Protocol (NTP) is a Protocol used to synchronize computer Time. It can synchronize computers
What is anti-DDoS (Distributed Denial of attack) in an easy way)
Preface"Since the first Internet architecture did not consider denial-of-service attacks, almost all Internet services suffered denial-of-service attacks ." This statement from RFC 473
NFS installation configuration in CentOS 6.5
I. Environment IntroductionNFS server: CentOS6.5 192.168.0.10NFS client: CentOS6.5 192.168.0.11Ii. Server installation and configuration1. Run the rpm-qa command to check whether the required installation
A parameter vulnerability in Tudou may result in the loss of some users (two classic cases are provided to see how I have successfully stolen user passwords)
Cause of parameter transfer problemsProvides classic cases to successfully steal user
Sina Weibo IPAD client XSS (file domain) + Worm Construction
This XSS is triggered in the local region (file: //), which is more interesting.
When we share information to Weibo through a third-party APP "kuaishou", the information content will
Logic vulnerabilities and solutions in yueda
001x background
Today, I updated the Android APP of yueda mobile APP. I only scanned the interface before, so I will register it with my mobile phone this time ~ The four-digit verification code was found
2345 potential risks of poor security due to browser design defects
It is not harmful, and can cause command execution under specific conditions.Detailed description:
2345 the browser does not have a security prompt for running some files locally,
Multiple stored XSS vulnerabilities in a function of Coremail
Coremail can import contacts in the personal address book in csv format.Import the following CSV file:
Contact Group, name, email address, residential address, residential address zip
Alibaba CTF 2015-XSS400 WriteUP
I have been sleeping for two days over the weekend. AliCTF and 0ctf are racing against the flag. In fact, I almost fell asleep until Monday, it is a pity that Alibaba has scored XSS400 points in the afternoon, which
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.