Isc bind buffer. c DoS Vulnerability (CVE-2015-8705)Isc bind buffer. c DoS Vulnerability (CVE-2015-8705)
Release date:Updated on:Affected Systems:
Isc bind 9.10.x
Description:
CVE (CAN) ID: CVE-2015-8705BIND is a widely used DNS protocol.Isc
How to Set and use Firefox sandbox
This article describes and introduces some common Sandbox Settings of Firefox browsers, which can be used as a reference for operations during leisure time.
On October 16, August 2015, security expert Cody Crews
FFmpeg ff_get_buffer Function Denial of Service Vulnerability (CVE-2015-8663)FFmpeg ff_get_buffer Function Denial of Service Vulnerability (CVE-2015-8663)
Release date:Updated on:Affected Systems:
FFmpeg
Description:
CVE (CAN) ID: CVE-2015-866
ISC Kea DoS Vulnerability (CVE-2015-8373)ISC Kea DoS Vulnerability (CVE-2015-8373)
Release date:Updated on:Affected Systems:
ISC Kea 1.0.0-betaISC Kea 0.9.2
Description:
CVE (CAN) ID: CVE-2015-8373Kea is an open-source DHCPv4 and DHCPv6 server
Arbitrary File Download Vulnerability in a cloud application of qunying
Official cloud application file downloads have security risksDetailed description:
Code Region
Web vulnerabilities on major automatic card issuance platforms allow you to view card passwords and transaction information
You can use the Web vulnerabilities of the automatic card issuance platform to obtain transaction information such as card
SQL injection vulnerability exists in multiple sites of Chengdu yichuang WWW (package submission/script)
Multiple SQL Injection Vulnerabilities in Chengdu yichuang WWW Main Site
The Chengdu yichuang WWW master site has multiple SQL Injection
An interesting instance makes NoSQL injection no longer mysterious
This article focuses on the security issues brought about by mongodb, and then introduces the injection of NoSQL by an interesting CTF instance.MongoDB can adapt to open-source
Midea's sales company's bar code system (formal environment) has command execution. Getshell can roam more than 50 machines through the Intranet.
Sales Company barcode System (official environment)
Http://rdbcs.midea.com.cn: 8000/
JAVA
Live800 customer service system Arbitrary File Download Vulnerability
A vulnerability is detected by hackers. Many large manufacturers are using the vulnerability, which is very harmful.
Fuzz generates a downlog. jsp file on the live800 customer
A system vulnerability package in gionee may leak the IMEI serial number of 3.69 million users (unauthorized access/SQL injection)
Export the IMEI serial number file of the 3.69 million user in one click, and calculate 20 rank
Http: // 218.16.100.212
Chinacache new posture arbitrary Password Reset
Before the white hat submitted the Chinese talent through any password reset wooyun-2015-0117458, because the number of digits of the verification code is short and do not limit the number of times.
An unauthorized access to a redis service in the smart server is root (suspected to be a mini-meter cylinder)
An unauthorized access to a redis service in the smart server is root (suspected to be a mini-meter cylinder)
It is not good to ignore
Multiple internal systems of the central control group can be infiltrated, resulting in a large amount of information leakage.
Founded in 1993, the central control group is China's leading provider of automation and information technology, products,
Website SSL vulnerability repair Guide
Some time ago, I scanned the company's website and used the awvs scanner. I found several SSL vulnerabilities. I found some repair suggestions on the Internet and shared them with you, if you encounter the same
16 database DBA permissions for a certain power system SQL Injection
16 database DBA permissions for a certain power system SQL InjectionDetailed description:
**.**.**.**/
POST/loginAction. do HTTP/1.1Content-Length: 52Content-Type: application/x-
The SQL injection vulnerability in a housing provident fund management system is of high permissions.
Ben diaosi saw the high-rise buildings on the floor outside the window, but he did not have his own one square meter. He saw the Provident Fund
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.