Apple OSX Message cross-origin Scripting Vulnerability (CVE-2016-1764)
Apple's CVE-2016-1764, fixed in March, is an application-layer vulnerability that can cause remote attackers to leak all the message content and attachments with the iMessage
Use WinDbg to debug Windows Kernel Process Analysis (2)
The previous article introduced the basic environment settings and some basic debugging skills for windbg to debug the kernel. This article introduces some advanced debugging skills for windbg.0
OTR protocol implementation vulnerability affects open source IM software such as Pidgin
Many security instant chat tools, such as ChatSecure, Pidgin, Adium, and Kopete, use the Off-the-Record (OTR) Protocol to implement library libotr and
Manual security check to ensure system security and stable operation
Microsoft has heard of File digital signature verification. Microsoft introduces a digital signature mechanism for key files of the system to maintain system integrity. Because
Analysis of remote code execution vulnerability in Baidu Android Browser
A few weeks ago, I found a remote code execution vulnerability in Baidu Android browser. At first, I wanted to talk about this topic in Infiltrate this year until I saw the
How to perform security analysis on unknown apps on mobile phones
Mobile Anti-Virus Software mostly uses signatures to determine the virus. It cannot be prevented before the virus is intercepted. However, the anti-virus software on the PC end has a
SQL Injection and XSS vulnerabilities in a website of Dangdang
Love.dangdang.com is a literary page... however, SQL injection and XSS exist, and the database management account is dba without a password ....
SQL Injection: sqlmap-u
Threat intelligence basics: crawling, walking, and analysis (Part 2)
This is the second article in the basic threat intelligence trilogy. We will discuss how to use threat intelligence and its basic principles in security operations.Cooks, tailor,
Compile a Python applet to calculate the keyword analysis of the test script
Generally, when the automated test project reaches a certain program, a lot of test code will naturally be written. If some basic functions and business functions need to
Jumei youpin's merchant background account system is incomplete and requires token (you can log on to any merchant management background)
Imperfect Account System
Http://supplier.ext.jumei.com/index.php? R = site/login &? Request_uri = https % 3
Cross-Domain jsonp interface of a website of China Unicom leads to information leakage (risks arising from additional feature insertion by the operator)
Cross-Domain jsonp interface of a website of China Unicom causes information leakage, which may
Getshell (involving the core network segments of the Intranet and Credit System)
One of you has eight individual credit card licenses in China. In the credit investigation regulations, the license can be revoked for violation or leakage of
An SQL injection vulnerability exists in a system of huatai insurance (supporting UNION involving millions of data)
SQL Injection Vulnerability (supporting UNION and millions of data records). Check whether the SQL injection vulnerability is 20 rank.
Glassfish Arbitrary File Reading Vulnerability in an app server of youfu
Arbitrary File Reading Vulnerability in glassfish app ServerIp211.151.62.149Verify if the vulnerability exists
http://211.151.62.149:4848/theme/META-INF/%c0%ae%c0%ae/%c0%ae%c0%
Arbitrary User Password modification vulnerability on the official website of diamond bird
The vulnerability is detected in the personal center-Account Security mobile phone modification function. When modifying a mobile phone, you only need to
Domain name root server suffered two large-scale attacks: 5 million attacks per second
In the early morning of January 1, December 11, Beijing time, the root servers of multiple domain name systems were attacked twice at the beginning of last week.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.