X. Org X Server 'xkb/xkb. c' Information Leakage Vulnerability
Release date:Updated on:
Affected Systems:X.org X ServerDescription:Bugtraq id: 72578CVE (CAN) ID: CVE-2015-0255
X. Org Server is the official reference implementation of X Window
FFmpeg 'libavcodec/utvideodec. c' Denial of Service Vulnerability (CVE-2014-9604)
FFmpeg 'libavcodec/utvideodec. c' Denial of Service Vulnerability (CVE-2014-9604)
Release date:Updated on:
Affected Systems:FFmpeg Description:Bugtraq id: 72272CVE (
MiniBB "code" SQL Injection Vulnerability
Release date:Updated on:
Affected Systems:MiniBB Description:CVE (CAN) ID: CVE-2014-9254
MiniBB is an independent and open-source online forum constructor.
In versions earlier than MiniBB 3.1, when "action"
Linux kernel MDP driver Privilege Escalation Vulnerability (CVE-2014-4323)
Release date:Updated on:
Affected Systems:Linux kernel 3.xDescription:CVE (CAN) ID: CVE-2014-4323
Linux Kernel is the Kernel of the Linux operating system.
Linux kernel 3. in
LibreOffice '. rtf' File Import DoS Vulnerability
Release date:Updated on:
Affected Systems:Libreoffice Description:Bugtraq id: 71313CVE (CAN) ID: CVE-2014-9093
LibreOffice is a suite that can be executed on various platforms and is compatible
Hijack SSH session injection port forwarding0x00 Preface
Yesterday, the links in A niuba group were actually suitable for leaving backdoors. They belong to the Post Exploitation stage. I have never used this method before. They are all dumpfounded
Experience Sharing: building a social engineering database TIPS
Recently, we have been building a social engineering database. There are also many articles on the Internet, but few details are involved. I would like to share some of my experiences
The verification vulnerability of the installation package during sogou pinyin upgrade can be found in the LAN
The sogou PinYin Input Method (including the sogou browser) can bypass the client's verification of the installation package during
Hackers use PDF generators to steal files on WEB Servers
Tcpdf pdf builder is one of the most popular PHP libraries used to create PDF documents and one of the most popular open source projects today. It has millions of users every day, and its
Basic Introduction to Android Trojan
This article introduces Android-based mobile malware as a basic introduction. It provides an analysis and Tool Guide for beginners. The Trojan Horse to be analyzed is the syssecapp.apk in 2013. The Trojan Horse
Linux Rootkit detection method based on memory Analysis0x00 Introduction
A Linux server finds an exception. For example, it is determined that the Rootkit has been implanted, but the routine Rootkit detection method by O & M personnel is invalid.
NodeJS application repository phishingPreface
The castle is always broken from the inside. A powerful system can also be controlled. If the intrusion is initiated directly from the human link, then the strong line of defense will also become a
Optimistic about your portal-data transmission on the client-adjust the http referer using the browser1. In the Internet, a large amount of data is transmitted through URL parameters. Most of the data is not transmitted through encryption. As I have
Pack the latest version of ThinkSAAS Vulnerability
SQL Injection + File Inclusion +...Learn from xfkxfk, pack multiple vulnerabilities, and want to go through a major vendor process.
In the latest version, the tsUrlCheck () function has multiple
07073 game network root injection: 5 k tables on all websites, hundreds of databases can be written to shell 2
Website
Tieba1_7073.com
This is time based sqli.POC
POST /home/getstatus/ HTTP/1.1Host: tieba.07073.comUser-Agent: Mozilla/5.0 (Windows NT
Geek Park official website administrator Cookie leakage directly into the background and Solution
Geekpark.netA few months ago, the WooYun salon connected the same WiFi with the reporter sister of geek Park and caught her Cookie with the dSploit
A SQL injection vulnerability in ThinkSNS (bypass anti-injection)
A SQL injection vulnerability exists in ThinkSNS and attackers can bypass anti-injection to obtain arbitrary data.
Vulnerability code: \ apps \ public \ Lib \ Action \ TestAction.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.