Adobe Flash Player and AIR type obfuscation Remote Code Execution Vulnerability (APSB15-19)Adobe Flash Player and AIR type obfuscation Remote Code Execution Vulnerability (APSB15-19)
Release date:Updated on:Affected Systems:
Adobe Flash Player Adobe
Microsoft fixed the Remote Code Execution Vulnerability of IE.
Microsoft urgently released patches to fix high-risk vulnerabilities in IE. Microsoft's security bulletin does not explain the details of a vulnerability, but simply says that
Three new false attack methods (Masque Attacks) for IOS)
In a recent version of IOS8.4, Apple fixed several vulnerabilities including allowing attackers to deploy two new types of masked attacks (CVE-2015-3722/3725, and CVE-2015-3725 ). We call
How to mine antivirus software vulnerabilities
A: "I heard that your University major is information security ?"
B: "Yes, lead ."A: "Well, install an anti-virus software ."B: "Leaders, please respect this major. Information security is ......"A:
A Preliminary Study on the high-risk vulnerability of Android Stagefright
Collation
The Stagefright vulnerability can cause remote code execution, or even sending MMS messages, which may intrude into users' mobile devices. This sounds like a big
The design defect of Ao you browser may lead to the reading of sensitive information such as user favorites/historical records.
A series of problems caused by design defects
Considering the user experience, the Browser allows the * .maxthon.cn
Analysis and protection: Win10 execution Stream Protection Bypass
Black Hat USA 2015 is in progress. In the latest contribution list published by Microsoft's security response center, Zhang Yunhai, a security researcher at lumon technology, ranks 6
Sybase Database Security
IntroductionThe full name of Sybase is SAP Sybase Adaptive Server Enterprise (ASE or Sybase ASE for short). It inherits the original MSSQL Code and is closely related to MSSQL. Sybase is a relational database system. It is a
Sensor settings in the OSSIM System
The setting of Sensor is particularly important. The specific setting method is similar to that of the sniffer. Many people have installed the sniffer. In large networks, this method is not as simple as accessing
Bank theft and password theft-ZUES (Zeus) Trojan Analysis Report
I. pdf file analysis sample file xxx.pdf after detailed analysis, no overflow vulnerabilities, shellcode AND exp of the PDF file were found. After opening the file, the anti-virus
System security-the file hiding method protects personal privacy and hides personal privacy of files.System security is a concern of everyone. The theft of confidential files, or the deletion of important things, is another irretrievable loss.
Reverse Foundation: Introduction to manual shell removal (1)
Here we have integrated some notes and documents from the previous manual shelling of the software, hoping to help the new students with reverse and shell removal.
1. Concepts
1.1
Password cracking artifact John the Ripper GUI-Johnny
Johnny is a cross-platform open-source GUI developed based on popular password cracking tool John the Ripper. What is John the Ripper? If the name is literally translated, it is JOHN's
Prevention of SQL Injection in php[1. server-side configuration]
Security, PHP code writing is one aspect, and PHP configuration is critical.
We manually install php. The default configuration file of php is in/usr/local/apache2/conf/php. ini, we
XSS Cross-Site Splitting0x01: Description
Recently, a phpcmsv9 website was built and used for testing. It is a low version and has many vulnerabilities. Many vulnerability analyses can be found on wooyun. In this case, I want to take a look at the
A certain system of Rubik's cube has SQL injection, and getshell can be used.
Weaver systems used
Http://oa.52mf.cn
Injection Point http://oa.52mf.cn/homepage/LoginHomepage.jsp? Hpid = 52 * & isfromportal = 1
custom injection marking character ('*'
PfSense Command Injection Vulnerability Analysis
In this article, we will introduce you to CVE-2014-4688 vulnerabilities in PfSense 2.1.3 and earlier; for a later version, pfSense has fixed this vulnerability.0x01 Diag_dns.php script Command
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.