|
China's total system of image search into analyzing the vulnerability | Hits:20 |
First statement, I have not discovered this vulnerability, I just made an analysis, the deficiency please post comments. This site was considered safe entirestation system, in fact now also. (later patch emerged upload loophole, not on the... | 01/12/2011 |
PHPWIND1.3.6 BBS vulnerability analysis | Hits:11 |
PHPWIND BBS is a popular PHP BBS, interface aesthetics, function also is more powerful. But you look carefully will find both from interface function or code style, it and DISCUZ are very similar, the specific reason I want also naturally,... | 01/11/2011 |
WINDOWS password leak loophole relevant code and analysis | Hits:18 |
Loophole explanation: WINDOWS system access to a Shared files (file:\\ agreement, can be in HTM inside inclusion this agreement), will automatically try to the current user identity connection (sending username, password encryption), if... | 01/10/2011 |
How to utilize the DEBUG holes | Hits:16 |
Web page automatic transmission system, v1.0 This procedure may put a *. Exe executable (DOS, win9x are available) code into a javascript script, when someone visit this script, this script automatically decoding the original *. Exe file... | 01/08/2011 |
Loophole from Solaris mig-at instructions can delete arbitrary system files | Hits:20 |
Involve procedures: From Solaris mig-at Description: From Solaris' mig-at 'instructions can delete arbitrary system files Detailed: Solaris contains mig-at instruction in dealing with '- r' command line parameters... | 01/07/2011 |
Source code open I can with Apache Tomcat leakage defects | Hits:20 |
Involve procedures: I can with Apache Tomcat JDK 1.3.1 and its previous version Description: I can with Apache Tomcat null bytes directory/documents leakage defects Detailed: I can with Apache Tomcat is a popular source code open JSP... | 01/07/2011 |
Net cafe vulnerability analysis | Hits:16 |
The net cafe of person many, the management also difficult, hence net cafe management software is coming. Network management software to, hence webmasters relax, every open a computer, start-up software, ases if to also do not have a thing... | 01/05/2011 |
IE7 0Day loophole analysis | Hits:18 |
The harmfulness of great 0Day IE7 loopholes, below is 0Day code snippets: Ann days laboratory points out, overflow is due to XML analytical string SRC clips lead to, because SR string of # 114, # sequel, # 114 Abnormal characters... | 01/04/2011 |
Ptrace holes found and analysis | Hits:25 |
1. Ptrace introduction For the convenience of application software development and debugging from Unix early version of start provides a for the operation of the process control and track the means that the system call ptrace (). Through... | 12/31/2010 |
China online trading platform quickly oday analysis | Hits:25 |
China online trading platform quickly oday program: China speed wilfing transaction platform Holes explains: upload, BaoKu Google keyword: inurl: list_buy. Asp? Class_1 EXP test: (duplicate code save as HTML file) HTML head meta... | 12/30/2010 |
The luck school website system v1.3 upload loopholes | Hits:10 |
Open the admin directory, is found to have a upload this file is j asp, submit to the submission of judgement, there are such a word If Uprequest. Form ( file_Err ) 0 then the select case Uprequest. The form file_Err ) ( But I see a half... | 12/29/2010 |
Windows file system small leak big use | Hits:5 |
1. The Windows a very useful file replace commands, bypass file protections Used to replace files, replace even are using documents can replace. Very invincible. For example: in the C: \ next built a directory, C: \ aaa... | 12/29/2010 |
Win 2000IPC $sharing loophole prevention and analysis | Hits:12 |
The IPC vulnerability describes Use Windows 2000 people all know, Windows 2000 default installation allows any user through empty users connect (IPC) get all accounts and sharing list system, which was originally in order to facilitate t... | 12/27/2010 |
Microsoft IE local file access and detecting vulnerability analysis | Hits:11 |
Microsoft IE in dealing with local files when interviewed some problems, combining the characteristics of Microsoft Windows may read some of the special local files, may have other use. As a browser inevitable to deal... | 12/25/2010 |
Discuz BBS system vulnerability analysis | Hits:30 |
Holes explains: Discuz BBS system is a set of using PHP + mysql database solution to run, in which found a security vulnerabilities, success using this hole can be extracted administrator password entered backstage, obtains the... | 12/24/2010 |
|