Simtrace: exploring the world of SIM cards

Simtrace: exploring the world of SIM cards 0 × 00 about SIM card As we all know, SIM card is a small card inserted on a mobile phone. It is called the Subscriber Identity Module customer recognition Module. However, not many people in the world know

The kernel fixes a Local Elevation of Privilege Vulnerability that affects a large number of Android devices.

The kernel fixes a Local Elevation of Privilege Vulnerability that affects a large number of Android devices. Perception Point researchers discovered a Linux kernel Local Elevation of Privilege Vulnerability, affecting Versions later than 3.8.

CVE-2015-3795

cve

CVE-2015-3795   Http://blog.wuntee.sexy/CVE-2015-3795/ 0x00 background This vulnerability was reported to Apple in June 4. This vulnerability was fixed in the 10.10.5 security update released on April 9, August 13. Related information:Apple

Android Trustzone Privilege Escalation Vulnerability (CVE-2015-6639)

cve

Android Trustzone Privilege Escalation Vulnerability (CVE-2015-6639) Affected Systems:AndroidDescription:CVE (CAN) ID: CVE-2015-6639Android is a mobile phone operating system based on the Linux open kernel.In Android 5.1.1 and LMY49F versions 5.x

Android mediaserver Remote Code Execution Vulnerability (CVE-2015-6636)

cve

Android mediaserver Remote Code Execution Vulnerability (CVE-2015-6636)Android mediaserver Remote Code Execution Vulnerability (CVE-2015-6636) Release date:Updated on:Affected Systems: Android Android 6.0 ( Description: CVE (CAN) ID: CVE-2015-6

Malicious programs turn infected computers into Web proxies

Malicious programs turn infected computers into Web proxies Anonymous proxy is vital to protecting users' online privacy, but it is dangerous if a person's computer becomes a proxy server without consent. Researchers from the security company Palo

Honeywell 93gas Detector Path Traversal Vulnerability (CVE-2015-7907)

cve

Honeywell 93gas Detector Path Traversal Vulnerability (CVE-2015-7907) Affected Systems: Honeywell Midas gas detectors Honeywell Midas Black gas detectors Description: CVE (CAN) ID: CVE-2015-7907 Midas and Midas Black gas detectors are detectors

Secrets behind the Wolf: an in-depth analysis of a malicious trojan

Secrets behind the Wolf: an in-depth analysis of a malicious trojan A type of malicious virus is recently captured by the hab analysis system. The virus loads malicious sub-packages, downloads the root tool to obtain root privileges, installs

A website of Air China has a vulnerability in which you can obtain information about other user audio and video cards.

A website of Air China has a vulnerability in which you can obtain information about other user audio and video cards. This vulnerability allows you to obtain a large number of user's audio and video card accounts, and perform point transfer,

Spring for Skype users: IP addresses can be renewed at last

Spring for Skype users: IP addresses can be renewed at last Skype announced in an official blog this week that they can now hide users' IP addresses and protect users from cyberattacks. In the latest version of Skype, this new security feature is

An unauthorized Baidu system causes the Intranet Database Server to fall (mysql takes shell in linux)

An unauthorized Baidu system causes the Intranet Database Server to fall (mysql takes shell in linux) @ Sky: I changed the folder. Vulnerability address: http: // 180.149.144.247/phpmyadmin (accessible directly)Corresponding to Baidu takeout

A Xiaomi Video Phone vulnerability allows you to view background operation data

A Xiaomi Video Phone vulnerability allows you to view background operation data The latest Xiaomi system has an additional Xiaomi video phone number, which allows you to directly view background operation data. Directly open the video phone

Six basic policies that need to be understood before building a cloud security system

Six basic policies that need to be understood before building a cloud security system     Cloud adoption is unstoppable, but an endless stream of security events also put an important issue in front of every CIO and Security Department-in a more

Weak Lily net password causes a large amount of internal employee information leakage

Weak Lily net password causes a large amount of internal employee information leakage Weak passwords on a platform of Lily net cause a large amount of internal employee information leakagePS: President, what are the targets? Http://oa.baihe.com: 3220

A password management database may be leaked due to improper configuration of sogou.

A password management database may be leaked due to improper configuration of sogou. A password management database may be leaked due to improper configuration of sogou. Phpmyadmin has a setup. If the configuration is incorrect, you can directly

A rare loophole in giants (making you the richest person in the journey)

A rare loophole in giants (making you the richest person in the journey) Maybe I'm a little surprised at the moment. Giant Mall journey this can change point card, feel a little interesting, continue to look downThen I was surprised to find out

Node. js Remote Memory leakage Vulnerability

Node. js Remote Memory leakage Vulnerability Recently, vulnerabilities have been found in the ws module that allows users to simply send ping data frames to allocate memory. This vulnerability will reject data sending requests and invalidate the

DVWA Series 16 File Inclusion Vulnerability mining and defense

DVWA Series 16 File Inclusion Vulnerability mining and defense Next we will analyze the source code of the File Inclusion Vulnerability in DVWA.The main page of the file is the D: \ AppServ \ www \ dvwa \ vulnerabilities \ fi \ index. php file. The

No unauthorized access to student information (involving 54 driving schools)

No unauthorized access to student information (involving 54 driving schools) With more than 10 years of experience in the construction and maintenance of the driving school system, the development team that understands driving schools cannot help

ARP spoofing technology-obtain images of the Intranet destination IP addresses accessing the QQ space

ARP spoofing technology-obtain images of the Intranet destination IP addresses accessing the QQ space The article is for study only. do not violate the law. Requirement: Virtual Machine Kali linux SystemCommand "ip query command: ifconfigecho

Total Pages: 1330 1 .... 349 350 351 352 353 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.