CnCxzSec's Blog
0x00Directory
0x01 Introduction
0x02 crossdomain. xml configuration
0x03 Summary
0x01Introduction
The only restriction policy for cross-origin flash is the crossdomain. xml file, which limits whether flash can read and write
If the table prefix is obtained through the preceding SQL error message, the hash with the username admin can be cracked.
To cp. php? Ac = profile & op = info POST submit parameters:Profilesubmit = 1 & formhash = 232d1c54 & info [A', (select 1 from
Author: Darshit AsharaDate: 21/08/2011Vendor: WordpressVersion: 3.2.1
Incorrect WordPress core module code (post-template.php)This causes cross-site scripting.I can simply updateView plaincopy to clipboardprint? Will affect the index page and the
By Flyh4tMail: phpsec # hotmail.com
An illustration:
Phpcms uses the sys_auth function to encrypt and decrypt cookie information. Multiple files in the system directly obtain the variable from the cookie to enter the program process.Because sys_auth
Title: WordPress GD Star Rating plugin
Author: Miroslav Stampar (miroslav. stampar (at) gmail.com www.2cto.com @ stamparm)
: Http://downloads.wordpress.org/plugin/gd-star-rating.zip
Tested version: 1.9.10
Tip: magic_quotes has to be turned off
-
InnerHTML is a strange HTML attribute, not supported by W3C standards, but almost all vendors support this attribute by default. Recently, some tests have used this attribute, here are some interesting questions about innerHTML. All elements have
Meditate Web Content Editor 'username _ input' SQL-Injection vulnerability
By Stefan Schurtz www.2cto.com
Affected program: Successfully tested on Meditate 1.2
Official Address: http://www.arlomedia.com/
Problem status: fixed
=============
Escape parameters and user input
This is a classic XSS attack that can open your services or Web applications and be attacked by hackers. According to the design, the website displays the user ID, which is passed as a URL parameter. The
The php xss cross-site attack solution is probably a function searched on the Internet, but to be honest, it really doesn't fully understand the meaning of this function. First, replace all special characters in hexadecimal notation, and then
The barrel theory is also called the short-board theory, and the short-board management theory. The so-called "Barrel Theory" is also called the "barrel law". Its core content is: the amount of water in a bucket, it does not depend on the highest
Author: Liuker Original: http://www.anying.org/thread-88-1-1.html reprint must be noted.0x1 Preface: I really don't know what to write. The current WEB penetration methods come and go. So I wrote an article using the latest project.0x2Because XX
Yisi ESPCMS is an enterprise website management system built based on LAMP. It is easy to operate, powerful, stable, scalable, and secure, and convenient for secondary development and post-maintenance, it helps you quickly and easily build a
The Spring Festival is full of spring. A friend of mine is very lonely at night, so he threw me one stop and asked me to join him. Let's take a look at the software. It seems that I have heard of it.(PS: You are familiar with such cool names ). Ask
I. Application of PHP configuration in file inclusion the File Inclusion Vulnerability occurs when a programmer introduces external submitted data to the inclusion process, this vulnerability is currently the most frequently used vulnerability in
Although I have set the reading permission for this post, I will not name it if our moderators, core, and honors have lent their IDs to others.
If some of your friends in the internal team really need an ID to read the post in the Forum, let me know.
0x00 background
Microsoft has added xss Filter since IE8 beta2. Like most security products, the protection countermeasure is to use rules to filter Attack codes. Based on the availability and efficiency considerations, add the blacklist and
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.