Borland Silk Central TeeChart ActiveX Control Vulnerability

Borland Silk Central TeeChart ActiveX Control Vulnerability Release date:Updated on: 2014-06-03 Affected Systems:Borland Silk Central 13.0Description:--------------------------------------------------------------------------------Borland Silk

CKEditor Preview plug-in Cross-Site Scripting Vulnerability (CVE-2014-5191)

CKEditor Preview plug-in Cross-Site Scripting Vulnerability (CVE-2014-5191) Release date:Updated on: Affected Systems:Drupal CKEditor Description:--------------------------------------------------------------------------------Bugtraq id: 69161CVE (

MaxDB handshake Message Processing Denial of Service Vulnerability

MaxDB handshake Message Processing Denial of Service Vulnerability Release date:Updated on: Affected Systems:SAP Basis Community MaxDB 7.xDescription:--------------------------------------------------------------------------------MaxDB is a

Wireshark Multiple Vulnerabilities (MDVSA-2014: 050)

cve

Wireshark Multiple Vulnerabilities (MDVSA-2014: 050) Release date:Updated on: Affected Systems:Wireshark 1.8.0-1.8.12Wireshark 1.10.0-1.10.5Description:--------------------------------------------------------------------------------CVE (CAN) ID: CVE-

Baidu browser xss can be hijacked

Baidu browser xss can be hijacked 1. Cause of the VulnerabilityThe problem lies in bdbrowser: // tabpage/. When you click "manually edit", the top 8 of "most frequently accessed" appears. As a result, the title of the webpage is not encoded and is

HP NonStop NetBatch Security Vulnerability (CVE-2014-2627)

HP NonStop NetBatch Security Vulnerability (CVE-2014-2627) Release date:Updated on: Affected Systems:HP NonStop NetBatch J06-J06.17.01HP NonStop NetBatch H06-H06.28HP NonStop NetBatch limit 6.14-limit 6.32.01Description:----------------------------

ECshop history patch new backdoor Vulnerability

ECshop history patch new backdoor Vulnerability Release date:Updated on: Affected Systems:ECShop 273utf8_patch006Description:--------------------------------------------------------------------------------ECSHOP is an open-source online shop

WordPress Lead Octopus Power 'id' parameter SQL Injection Vulnerability

WordPress Lead Octopus Power 'id' parameter SQL Injection Vulnerability Release date:Updated on: Affected Systems:WordPress Lead Octopus PowerDescription:--------------------------------------------------------------------------------Bugtraq id: 6893

SystemTap "staprun" Privilege Escalation Security Vulnerability

SystemTap "staprun" Privilege Escalation Security Vulnerability Release date:Updated on: Affected Systems:SystemTap 1.xDescription:--------------------------------------------------------------------------------Cve id: CVE-2011-2502 QEMU is an

GnuTLS TLS and DTLS Information Leakage Vulnerability

GnuTLS TLS and DTLS Information Leakage Vulnerability Release date:Updated on: 2013-02-27 Affected Systems:GNU GnuTLS 3.xGNU GnuTLS 2.xUnaffected system:GNU GnuTLS 2.12.14Description:-----------------------------------------------------------------

Use mimikatz to obtain the win7 Password

Use mimikatz to obtain the win7 Password Mimikatz: Http://www.webshell.cc/wp-content/uploads/2012/02/mimikatz_trunk.zip Http://blog.gentilkiwi.com/downloads/mimikatz_trunk.zip   Blog.gentilkiwi.com should be a French blog.   Use mimikatz to obtain

Libav LZO 'av _ lzo1x_decode' Function Memory Corruption Vulnerability

Libav LZO 'av _ lzo1x_decode' Function Memory Corruption Vulnerability Release date:Updated on: Affected Systems:LibavDescription:--------------------------------------------------------------------------------Bugtraq id: 68217CVE (CAN) ID: CVE-201

Efficient vulnerability Mining

Efficient vulnerability MiningNowadays, there are a lot of attacks on the Web Front-end. Most attack methods are based on "clients. But few people have noticed it, so this article is available. When I want to find a new attack method, most people

Remote control of your mobile phone

Remote control of your mobile phoneThe AVL mobile security team recently discovered a method to steal user privacy by using the lightweight web Server jetty. by visiting a specific url in a browser, you can obtain user privacy information. Working

Shell resets the password for the new MySQL version

Shell resets the password for the new MySQL versionAfter the old version of MySQL is installed successfully, the root account has no password, which is convenient but insecure. From version 5.6.8 (the latest version is 5.6.20), a random temporary

Shell Common commands

Shell Common commands 1. ls: similar to the dir command in dos The most common parameters of ls include-a-l-F. Ls- Linux Files. files starting with ls are regarded as hidden files and cannot be seen only by using ls commands. In addition to

SYN Attack and Defense under CentOS

SYN Attack and Defense under CentOS(1) SYN Attack principlesSYN attacks are a type of DOS attacks. They consume server CPU and memory resources by sending a large number of semi-connection requests due to TCP protocol defects. SYN attacks can affect

Baidu cloud acceleration waf Bypass

Baidu cloud acceleration waf Bypass Http://www.im286.com/forum.php? Id = 1 and 1 = 1 through which we know that the website uses the waf of Baidu cloud acceleration.However, Baidu waf does not process the % character, causing SQL injection to be

PHP Trojan-free function collection (character processing function, encryption and decryption algorithm)

PHP Trojan-free function collection (character processing function, encryption and decryption algorithm) AddSlashes: adds a slash to the string.Bin2hex: Binary to hexadecimal.Chop: removes consecutive gaps.Chr: returns the character of the ordinal

Pageadmin SQL injection vulnerability and repair

Pageadmin SQL injection vulnerability and repair/E/aspx/get_comment.aspx Protected void Page_Load (Object src, EventArgs e) {string SQL; OleDbCommand comm; Conn theconn = new Conn (); if (Request. form ["post"] = "add") {IsMember = Request. form

Total Pages: 1330 1 .... 431 432 433 434 435 .... 1330 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.