Yun Da express information leakage (bidding plan + applicant information + administrative vehicle)
Huluwa, huluwa, one vine with Seven hangs ..Detailed description:
Standing on the shoulders of elders ~WooYun: internal information leakage caused by
Kerberos protocol vulnerability: The system is completely controlled.
Recently, security experts have discovered a "very destructive" vulnerability in Windows's Kerberos Authentication System. Last year, a similar vulnerability in the system was
From the green software alliance sub-station to the fall of the server
Due to the Administrator's negligence and unreasonable permission control, the server fellDetailed description:
Ftp://m.xdowns.com/Account: mPassword: mFirst, the FTP weak
UC Browser: Thoughts on ZipInputStream
Summary
ZipInputStream is just as disappointing to those who don't know ZipInputStream Armageddon (Movie: The End of the World!
ZipInputStream's insecure processing of zip files directly results in the final
Website security dog disables IIS execution program bypass
The website dongle intercepts command execution:
Programs in the white list will not be intercepted:
But the execution of the program in the White List is not the result we want
Reflection Interaction Mechanism in Android open-source penetration testing framework Drozer
I. Introduction
Drozer is an open-source Android penetration testing framework developed by MWR Labs. It can interact with Android virtual machines through
Vulnerability Analysis and exploitation of Windows Media Center
Released by Microsoft in September 8 this yearMS15-100 Security noticeFixed the remote code execution vulnerability in a Windows Media Center. If Windows Media Center opens a specially
Cyrus IMAP index_urlfetch Integer Overflow Vulnerability (CVE-2015-8077)Cyrus IMAP index_urlfetch Integer Overflow Vulnerability (CVE-2015-8077)
Release date:Updated on:Affected Systems:
Cyrus Cyrus IMAP Server 2.5.6Cyrus Cyrus IMAP Server
Sniffly: Uses HSTS and CSP to sniff browser history
Sniffly is an attack by using HSTS (HTTP Strict Transport Security) and Content Security Policy (Content Security Policy). It allows any website to sniff the user's browser history. This
How advanced hackers find Network Security Vulnerabilities
Hackers always want to know as much information as possible, such as whether to connect to the Internet, the internal network architecture, and the status of security measures. Once
The concept of "man" is not earth, "Fire Fighting" is fierce, and President Tan's methodology | focus on hackers and geeks
This series of articles is produced by Ann in the new information security media. Any opinion or position in the interviews is
AD Alliance turned into Trojan Alliance HackingTeam vulnerability weapons attacked millions of netizens
0x00
In early November, the 360 Internet Security Center monitored a spike in the interception volume of a downloading trojan named
CTF: Write-up of the encrypted and decrypted part of HITB 2015
IntroductionEncryption Class 300 points this challenge is about the quality p and q generated by RSA. At present, we have obtained an RSA-encrypted mail. msg and a certificate named
The csrf exists in the shipping address deleted from the network.
Detailed description:
Csrf exists in the shipping address. troubleshoot the problems in other places one by one.Delete the shipping address and capture packets;
We can see that the
Multiple csrf sites
Detailed description:
1. The website has multiple csrf vulnerabilities, such as modifying personal information and changing the shipping address. Modify the shipping address to modify the address. Modify the mobile phone address
SQL Injection exists in a clothing Management System & unrestricted Getshel (no DBA permission required)
Detailed description:
F22 clothing Management SoftwareOne injection, without the DBA permission
POST / HTTP/1.1Host:
Getshell can be written to IIS on a website of Kingdee.
Getshell can be written to IIS on a website of Kingdee.Detailed description:
Improper IIS configuration, which can be written to webshell
http://eas75.kingdee.com:85/Proof of vulnerability:
#-*-
An SQL injection exists at a specific place (it can span 5 databases and contain the Administrator table)
An SQL injection exists at a specific place (it can span 5 databases and contain the Administrator table)Detailed description:
Objective: To
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.