|
Clickjacking vulnerability analysis | Hits:44 |
A few days ago, a terrible cross-browser Clickjacking is gradually revealed attack vulnerability before people. Through this Clickjacking loopholes will you be in unsuspecting cases help hackers control your... | 12/23/2010 |
Free version dvBBS vulnerability analysis | Hits:13 |
There has been much prawn give free version of the dynamism of the mobile BBS played psyche, younger brother I discover a possible and those loopholes escaped prawn people's eyes, so out product comforms once. Ha ha, write in a hurry, such... | 12/22/2010 |
Talk about DVBBS loopholes | Hits:13 |
The wise Envymask help me to solve a lot of problems, although are brothers, I have to say thank you. Very surprised to see the DVBBS release security patch, originally someone remind the author program which exists in the class... | 12/21/2010 |
Analysis of the "dynamism" of the mobile hole | Hits:12 |
Conn. execute ( update user] [face = ' set newfilename ' ramp userid = userid) I don't see userid and see newfilename have filtering. Upward search newfilename, uh, see the: Newfilename = uploadFace / memberid _ upfilename (1) ... | 12/20/2010 |
LB5K BBS vulnerability analysis | Hits:19 |
Description: it is reported Torune Analysist and http://torune.126.com have discovered this loophole. From on time for, the vulnerability is they found before, I found in the rear. Involving version: ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ LB5K current all... | 12/18/2010 |
Micro darfur v1.51 (revised articles system) upload loopholes | Hits:8 |
Loophole files: / manage/video/upfile_soft. Asp -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- FileExt = lcase (right (file. The filename, 4) if fileExt = asp or fileExt = asa or fileExt = aspx then write font 5. Do = 2 file format... | 12/17/2010 |
DEDE critical files AND get back door source GetShell loopholes | Hits:20 |
Loophole has been publicly, here also announced Vulnerability names: DEDE critical files AND get back door source loopholes Release date: 2009-5-19 Affected system: DedecmsV53 - UTF8 - immigration... | 12/16/2010 |
EimsBlog system 0day loophole analysis. V2.4 | Hits:18 |
Backstage backup function lack of verification, causing local submit backup restore shells. Asp Vulnerability testing exp: table is width = 98% border = 0 cellspacing = 1 cellpAdding = 1 align = center in scale-up = form of =... | 12/15/2010 |
Memcached not IP restrictions vulnerability analysis | Hits:130 |
Loophole details the brief description: incorrect memcache configuration can lead to safety problems Details: C: \ nc - 61.135.178.118 vv 11211 61.135.178.118: inverse host lookup failed h_errno 11004: NO_DATA. (UNKNOWN) [61.135.178... | 12/14/2010 |
Everyone desktop hang horse vulnerability analysis | Hits:12 |
Loophole author: a passer-by submit time: 2010-11-06 open time: 2010-12-07 Loophole type: cross site scripting against harm level: high vulnerability status: the manufacturer has confirmed the holes -- -- -- -- -- -- -- -- -- -- -- -- --... | 12/13/2010 |
Thunderbolt PPLAYER DLL ActiveX controls j overrun vulnerabilities analysis | Hits:22 |
This paper analysis object is domestic popularity P2P download software thunderbolt a overrun vulnerabilities, about thunderbolt the use of the software and characteristics, here no longer waste of space. This article mainly includes... | 12/11/2010 |
Q 0Day broadcast remote overflow analysis | Hits:14 |
In the Internet to download something, unintentionally by a topic attracting: I use the best BT download software - Q planting. Q sow? Before like heard, but BT download the best software is not bit comets? How to change Q Q, broadcast... | 12/10/2010 |
MIME profile and the vulnerability analysis | Hits:10 |
1. MIME profile MIME (Multipurpose Internet E-mail Extentions), general translation multi-purpose web Mail expansion agreement . Just as its name implies, it can transmit multimedia documents, in an email additional various... | 12/09/2010 |
Formatting overrun vulnerabilities analysis (x86 / Sparc) | Hits:15 |
Directory: 1, what is formatted overrun vulnerabilities? 2, how to exploit in x86 / Sparc format string 3, determine retaddr/retloc values 4, general templates 1, what is formatted (format strings) overrun vulnerabilities? Here speak not... | 12/08/2010 |
Q - Zone cross site invasion of vulnerability analysis | Hits:125 |
Let's try to understand the Q - ZONE this cross site loophole it. Q - Zone cross site analyzing the vulnerability 1, Q - Zone to user input of filtering Enter q-zone, in turn, click Settings - set space - QQ name of space , here... | 12/07/2010 |
|