|
I can with Apache suffix name analytical loophole analysis | Hits:15 |
We all know windows2003 + IIS6.0. If the directory structure in XXX. Asp such directory, then all this list of files extensions, no matter why will come as asp analytical. We usually say the loophole for windows2003 +... | 11/17/2010 |
Ptrace vulnerabilities analysis | Hits:5 |
4. Ptrace bugs discovered and use a method 5. Reference material 1. Ptrace introduction For the convenience of application software development and debugging from Unix early version of start provides a for the operation... | 11/16/2010 |
The "dynamism" of the mobile 8.0 system vulnerability analysis | Hits:3 |
Joe guest loophole rout security perimeter Get procedure, first is black box test, just added a single quotes will pop up a dialog box, as shown in figure 1 shows, an estimated prevent injection procedure. To find a lot of link tests are... | 11/15/2010 |
MS07-055 TIFF image processing documents stack overflow vulnerability analysis | Hits:2 |
TIFF (Mac TagImageFileformat) is widely used in image formats, it by Aldus and Microsoft joint development, was initially for cross-platform storage scan images, need and design. Its characteristic is image formats complex and storage of... | 11/13/2010 |
IE remote code execute LingRi vulnerability analysis | Hits:7 |
A, events overview 2010 on November 3, Microsoft released 2458511 number security bulletins, points out its Internet Explorer browser exist in a new LingRi loopholes. Ann days laboratory in the first time this incident response... | 11/11/2010 |
CVE - 2009-4324 vulnerability analysis | Hits:8 |
Vulnerability describes: In this vulnerability and CVE NVD on as follows the same description, it is worth noting that Use - a sentence copy xpa -. Use - xpa vulnerability in the Doc - copy of media. NewPlayer j j API in Adobe Reader in in... | 11/10/2010 |
Universal password login into holes analysis and repair | Hits:2 |
JE CMS = 1.0.0 program appear in two holes, a logon authentications can use master in password around. Another place is SQL injection loopholes. 1. By SQL Injection Bypass Authentication Vulnerability / / logon authentications loopholes... | 11/09/2010 |
Php_info vulnerability analysis | Hits:6 |
First of all we want to know 1. Request_filename means that the current connection requests the file path, the root or alias commands and URI request generated. The variables are local file system file name 2.! E judgment does not exist 3.... | 11/08/2010 |
LingRi attack vulnerability analysis | Hits:3 |
On November 4 news, Microsoft to release, warned that hackers are a new LingRi attack on IE holes for a new round of targeted malware attacks. The security vulnerabilities can let hackers implement remote arbitrary code execution... | 11/06/2010 |
Adobe Flash flinging poor vulnerability analysis | Hits:6 |
A few weeks ago, Internet someone found a new Adobe Acrobat Reader/poor loophole, flinging before long it immediately appear special using the vulnerability of attacks. From technical Angle, the attack of attraction is that it USES... | 11/05/2010 |
Get shells code new method | Hits:3 |
Shells is actually a short executable, have the code segment, data segment and stacks. Only this program segment in main memory location only during program execution to determine, but at compile time does not know, this will... | 11/04/2010 |
PHP application common vulnerability analysis | Hits:2 |
[global variable] In PHP variables don't need to advance statement, they will be used for the first time, they automatically create the type also need not specified, they will be determined according... | 11/03/2010 |
CVE - 2010-3654 loophole preliminarily analyzed | Hits:20 |
Author: Cryin Summary: Adobe Flash Player 10.1.85.3 and earlier on Windows, Linux, Mac OS X, and Solaris 10.1.95.2 earlier on.. Android worth authplay. DLL (aka AuthPlayLib. J j libauthplay bundle or so 0.0.0) in Adobe Reader and Acrobat 9... | 11/02/2010 |
SP vulnerability analysis and solution | Hits:3 |
1 in the ASP program after add a special symbols, can see the ASP source program Affected version: Win95 + PWS IIS3.0 98 + pws4 does not exist loophole. IIS4.0 above version does not exist in this loophole. Description: These special... | 11/01/2010 |
Loophole research methods summary | Hits:2 |
Now information security has become popular in the industry, and software bugs and in information security inside occupies a very important position, so it is necessary for us to research loophole, find out the procedure in the bug for... | 10/30/2010 |
|