New Linux Trojan Ekocms appears, screenshots, recording
Dr. Web, a Russian software vendor, recently discovered the Linux platform's new Trojan Linux. Ekocms.1. Currently, from the Trojan samples intercepted, the Trojan can take screenshots and
Linux Kernel group_info UAF vulnerability exploitation (CVE-2014-2851)
This case studies CVE-2014-2851 vulnerabilities that affect Linux kernels until 3.14.1. First of all, I am very grateful to Thomas for his help. He gave his initial analysis and
Huawei P8 GPU driver DoS Vulnerability (with test code)
Multiple Huawei P8 mobile phones use arm mali gpu. This chip driver has a Denial-of-Service vulnerability. Attackers with any permission can exploit this vulnerability to crash the mobile
Do you believe this? The smartphone may disappear within five years.
1. Do you believe it? The smartphone may disappear within five years.
Five years later, Apple may no longer be able to make money by creating a new iPhone. Want to know why?
Trinity chipset Line Card Denial of Service Vulnerability (CVE-2015-7748)Trinity chipset Line Card Denial of Service Vulnerability (CVE-2015-7748)
Release date:Updated on:Affected Systems:
Juniper Networks Trinity
Description:
CVE (CAN) ID:
MIT krb5 build_principal_va Denial of Service Vulnerability (CVE-2015-2697)MIT krb5 build_principal_va Denial of Service Vulnerability (CVE-2015-2697)
Release date:Updated on:Affected Systems:
MIT Kerberos 5
Description:
CVE (CAN) ID: CVE-2015
Penetration learning notes-tools-firewall traversal (1)
Preparations before the experiment: 1100000000h-master.zip (the ladder we used to traverse the firewall) 2. A web page of windows server firewall, a virtual machine with only port 80, is
Analysis Report: embedding malicious payload Word documents
A week ago, Mr. Xavier Mertens, sans isc management and freedom security consultant, analyzed a malicious Word document. The following is his analysis report.
Event background
Last week,
Vvv virus truth
According to the 360 Internet Security Center, CryptoLocker (a file encryption swindler) Trojans have been suspended for a period of time and are spreading infections in China at the beginning of this month. The Trojan is a variant
Amazing shape: Kingston launches "Security USB flash drive"
Kingston has launched a new USB flash drive series to provide a better experience for security-oriented IT professionals. This product, called USB flash drive 2000, provides first-class
Youku encrypted videos have multiple universal passwords that can bypass the restriction (odd flower vulnerability)
Youku encrypted videos with multiple universal passwordsDetailed description:
Enter two double quotation marks in the password box.
Commands executed by a station in ChangHong enter the Enterprise Intranet (affecting the security of dozens of hosts) + multiple backdoor files are found to have been infiltrated
Commands executed by a station in ChangHong enter the enterprise's
Magento storage xss detailed analysis
Affected Versions: Magento CE
0x00 Magento Introduction
Magento is a professional open-source e-commerce system. The legendary world's No. 1 e-commerce system. Magento is designed flexibly and has a modular
Password bypass in DVWA series 11 Brute Force
Next, let's analyze the Brute Force cracking of Brute Force in DVWA. Enter the user name and password in the text box on the page. If the input is incorrect, an error is prompted.The correct password is
Improper configuration of Financial Management fan services leads to leakage of background management system source code
Incorrect git ConfigurationHttp: // 42.62.67.117/. git/configAccess http: // 42.62.67.117/wp-admin/jump to
Hong Kong Cloud technology main site SQL Injection Vulnerability (leakage of tens of millions of installed machine information)
RT
Main site address:
http://**.**.**.**/pc/index.aspx
Injection address:
Http: // **. **/pc/productlist. aspx? Productid
SQL injection vulnerability in the APP on the official website of hailoan
SQL injection vulnerability in the APP on the official website of hailoan
Purpose: To detect the APP of good loan network and find SQL injection in the following places:
Air Security-Sichuan Airlines's alternative brute-force bypass Verification Code (resulting in leakage of internal information)
RTDetailed description:
High RANK; Sichuan Airlines's MAIL system uses IBM Lotus Domino MAIL Server with verification
A website in COFCO has the SQL Injection Vulnerability (more than 800 tables can be retrieved from the database)
COFCO Trade Business Management System: http: // 219.143.252.178/. The SQL injection vulnerability exists. Through injection, more than 8
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.