Reprint: http://jaq.alibaba.com/community/art/show?articleid=1942015 Mobile Security Vulnerability Annual ReportChapter 2015 Application Vulnerabilities1.1. Open application vulnerability types and distributions in the industry2015 is an
Shellshock vulnerability review and analysis test
0x00 vulnerability Overview
Many may have a deep memory of the Heartbleed Bug in the first half of 2014. In September 2014, another "destruction-level" vulnerability-Bash software security
Method Analysis for fixing weblogic JAVA deserialization Vulnerability
Oracle has not released official JAVA deserialization vulnerability patches for weblogic in public. Currently, there are only two solutions:Use SerialKiller to replace the
Gray hat hackers: Ethics, penetration testing, attack methods, and vulnerability analysis technology of just hackers (version 3rd)Basic InformationOriginal Title: gray hat hacking: the Ethical hacker's handbook, Third EditionAuthor: [us] Shon Harris
PHP Common Vulnerability Attack analysis, PHP vulnerability attack
Summary: PHP program is not impregnable, with the extensive use of PHP, some hackers are also in the absence of the trouble to find PHP, through the PHP program vulnerability to
Android DropBox SDK Vulnerability (CVE-2014-8889) Analysis0x00 Preface
This article is a translation of the detailed analysis of DropBox SDK vulnerabilities by the ibm iss security team.
Today, personal data is stored on the cloud, so that services
Ruby on Rails dynamic rendering Remote Code Execution Vulnerability (CVE-2016-0752)0x00 Overview
If your application uses a dynamic rendering path (dynamic render paths), such as rendering params [: id], using local file inclusion Sion ), remote
BadIRET vulnerability Exploitation
The Linux kernel code file arch/x86/kernel/entry_64.S versions earlier than 3.17.5 did not correctly handle errors related to the SS (stack) segment register, this allows the local user to initiate an IRET command
Tomcat is a small Web application server, which is favored by small enterprise webmasters. The open source code of the Tomcat server occupies a small amount of system resources, provides good scalability, and supports load balancing and email
Portal application Apache Jetspeed 2.3.0 and earlier versions: Remote Code Execution Vulnerability Analysis
As one of my personal projects on "security of open-source software for friendship detection", I am going to play with Apache Jetspeed 2
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.