Simtrace: exploring the world of SIM cards
0 × 00 about SIM card
As we all know, SIM card is a small card inserted on a mobile phone. It is called the Subscriber Identity Module customer recognition Module. However, not many people in the world know
The kernel fixes a Local Elevation of Privilege Vulnerability that affects a large number of Android devices.
Perception Point researchers discovered a Linux kernel Local Elevation of Privilege Vulnerability, affecting Versions later than 3.8.
CVE-2015-3795
Http://blog.wuntee.sexy/CVE-2015-3795/
0x00 background
This vulnerability was reported to Apple in June 4. This vulnerability was fixed in the 10.10.5 security update released on April 9, August 13.
Related information:Apple
Android Trustzone Privilege Escalation Vulnerability (CVE-2015-6639)
Affected Systems:AndroidDescription:CVE (CAN) ID: CVE-2015-6639Android is a mobile phone operating system based on the Linux open kernel.In Android 5.1.1 and LMY49F versions 5.x
Malicious programs turn infected computers into Web proxies
Anonymous proxy is vital to protecting users' online privacy, but it is dangerous if a person's computer becomes a proxy server without consent. Researchers from the security company Palo
Honeywell 93gas Detector Path Traversal Vulnerability (CVE-2015-7907)
Affected Systems:
Honeywell Midas gas detectors Honeywell Midas Black gas detectors Description:
CVE (CAN) ID: CVE-2015-7907
Midas and Midas Black gas detectors are detectors
Secrets behind the Wolf: an in-depth analysis of a malicious trojan
A type of malicious virus is recently captured by the hab analysis system. The virus loads malicious sub-packages, downloads the root tool to obtain root privileges, installs
A website of Air China has a vulnerability in which you can obtain information about other user audio and video cards.
This vulnerability allows you to obtain a large number of user's audio and video card accounts, and perform point transfer,
Spring for Skype users: IP addresses can be renewed at last
Skype announced in an official blog this week that they can now hide users' IP addresses and protect users from cyberattacks. In the latest version of Skype, this new security feature is
An unauthorized Baidu system causes the Intranet Database Server to fall (mysql takes shell in linux)
@ Sky: I changed the folder.
Vulnerability address: http: // 180.149.144.247/phpmyadmin (accessible directly)Corresponding to Baidu takeout
A Xiaomi Video Phone vulnerability allows you to view background operation data
The latest Xiaomi system has an additional Xiaomi video phone number, which allows you to directly view background operation data.
Directly open the video phone
Six basic policies that need to be understood before building a cloud security system
Cloud adoption is unstoppable, but an endless stream of security events also put an important issue in front of every CIO and Security Department-in a more
Weak Lily net password causes a large amount of internal employee information leakage
Weak passwords on a platform of Lily net cause a large amount of internal employee information leakagePS: President, what are the targets?
Http://oa.baihe.com: 3220
A password management database may be leaked due to improper configuration of sogou.
A password management database may be leaked due to improper configuration of sogou.
Phpmyadmin has a setup. If the configuration is incorrect, you can directly
A rare loophole in giants (making you the richest person in the journey)
Maybe I'm a little surprised at the moment.
Giant Mall journey this can change point card, feel a little interesting, continue to look downThen I was surprised to find out
Node. js Remote Memory leakage Vulnerability
Recently, vulnerabilities have been found in the ws module that allows users to simply send ping data frames to allocate memory. This vulnerability will reject data sending requests and invalidate the
DVWA Series 16 File Inclusion Vulnerability mining and defense
Next we will analyze the source code of the File Inclusion Vulnerability in DVWA.The main page of the file is the D: \ AppServ \ www \ dvwa \ vulnerabilities \ fi \ index. php file. The
No unauthorized access to student information (involving 54 driving schools)
With more than 10 years of experience in the construction and maintenance of the driving school system, the development team that understands driving schools cannot help
ARP spoofing technology-obtain images of the Intranet destination IP addresses accessing the QQ space
The article is for study only. do not violate the law.
Requirement: Virtual Machine Kali linux SystemCommand "ip query command: ifconfigecho
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.