Linux Kernel 'fragmentation. c' DoS Vulnerability
Release date:Updated on:
Affected Systems:Linux kernel Description:Bugtraq id: 71847CVE (CAN) ID: CVE-2014-9428
Linux Kernel is the Kernel of the Linux operating system.
Earlier than Linux Kernel 3.18
LibreSSL ssl_parse_clienthello_use_srtp_ext Function DoS Vulnerability
Release date:Updated on:
Affected Systems:LibreSSL Description:CVE (CAN) ID: CVE-2014-9424
LibreSSL is a branch of the OpenSSL encryption software library and is an open
Google discloses unrepaired Windows 8.1 Security Vulnerabilities
Google's security research database automatically discloses a Microsoft unrepaired Windows 8.1 Security Vulnerability 90 days later. For Google's 90-day automatic disclosure mechanism,
Linux Kernel rock. c Denial of Service Vulnerability (CVE-2014-9420)
Release date:Updated on:
Affected Systems:Linux kernel Description:Bugtraq id: 71883CVE (CAN) ID: CVE-2014-9420
Linux Kernel is the Kernel of the Linux operating system.
For
User impersonating of Hacking (II) stored procedure in SQL Server
Security pulse provided the first "SQL Server Stored Procedure Hacking (I) trusted Database" in the Hacking series of SQL Server Stored Procedure) impersonating users
Application
No Password for ssh-based communication between hosts
Node1: 172.16.58.1
Node2: 172.16.58.3
Node1 --> node2
First, generate a key in node1.
Run ssh-keygen-p''
If you want to save the path, press enter to default,
The private key is saved
Exploring PHP DoS Attacks
You can simulate simple attacks by yourself to learn more about how to be safer.
How does it work?
In general, hash tables are optimized very quickly. However, if someone inserts conflicting key values, the performance
CISSP training video: security architecture and design
In this video demonstration, Shon Harris detailed the security architecture and design fields, including system components, system protection, CPU and memory management.
The security
4A Security Analysis0x00. Overview
0.1 cause
Some time ago, I saw someone asking about the 4A penetration test in the zone. I have been in touch with several 4A and bastion host products. Today I will summarize the 4A problems I encountered during
31C3 CTF web off writeup0x00 background
31c3 CTF is very user-friendly and can be played after the competition is over. I read the question solution and wrote a writeup.0x01 pCRAPp
This question requires a lot of php skills. Submit the ticket in
Tmall vulnerability package (Chain Reaction Caused by arbitrary file downloads)
Download arbitrary files from a system
Reading and downloading any file on tiandihang B2B platformHttp:// B2B .tdxinfo.com/Buyer/SystemManage/DownLoad.aspx? Filename = C:
Phpok latest SQL injection (blind note)
In framework/www/open_control.php:
// URL list. The URL list function url_f () {$ id = $ this-> get ("id"); if (! $ Id) $ id = "content"; $ this-> assign ("id", $ id); $ pid = $ this-> get ("pid "); if ($ pid)
Sensitive Information Leakage of a substation in Ruili Network (which may affect the information of 5 million users)
Leakage of sensitive information in a substation of Ruili Network (which can directly threaten the user database)
SVN Information
SQL Injection for a website on Sina Weibo
SQL Injection for a website on Sina Weibo
Vulnerability url
Does the id parameter exist in the injection http://data.weibo.com/report/analystarticle? Id = 2205075871 http://data.weibo.com/report/reportDetail?
Converting image text to word-an overview of complex image text recognition materials
Ocr-Super free software:
Identification of Simplified Chinese + English-mixed documents; Identification of documents in English only; automatic layout analysis or
Phpok latest SQL injection and packaging
The website will load some resource engines during initialization, with a session_file.php loaded for session Initialization.
File framework/engine/session/file. php: function _ construct ($ config) {if (! $
Ignored development security issues0x00 background
This article aims to reveal the neglected development security issues, mainly for the infrastructure deployment environment basic solutions including (internal, external, cloud environment ).0x01
Reset any user password in the latest WSS version
The design defect of the latest WSS version causes any user password reset, including Administrator
File user_edit_password.php
This file and function is used to change the user password, which is
Let's look at Shell.
Speaking of Shell, I'm afraid everyone will be familiar with it. In addition, I think you should have a lot of your favorites. If you classify them by platform, they can basically be divided into two categories: for the web
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.