|
How to deal with the hacker | Hits:20 |
Hackers found I rushed to see, those consin virus file without exception in D: \ \ \ \ system32 in winnt make, a nc. J, opentelnet exe exe etc. Obviously, these are not hack tools, but the virus, cousin computer hackers invasion. Start... | 10/11/2010 |
WS_FTP FTPD overrun vulnerabilities | Hits:44 |
Based on the analysis of WS_FTP below 4.0.1 EVAL (47156314. The Server version, only STAT orders The situation. In fact, WS_FTP STAT processing orders, there are many places, but the length, there is a place where he missed, So, our chance... | 10/09/2010 |
Windows POSIX subsystem permissions. Ascending loophole | Hits:47 |
A loophole.... Microsoft's MS04-020 announcement describes POSIX subsystems permissions loopholes, announcement address ascending: http://www.microsoft.com/technet/security/bulletin/MS04-020.mspx CVE announcement: http:... | 10/08/2010 |
Write access to iis analysis | Hits:17 |
Write access If you want to test a directory for web users have write access, can be used as follows: Telnet - to the server and web port (80) sent a request. Any/dir/my_file, TXT HTTP / 1.1 Host: iis - server Length: 10 - search... | 09/30/2010 |
Reader5.1 Acrobat. Loopholes sep | Hits:20 |
Only to the Acrobat Reader 5.1 effectively In a XDF files into a long XFDF XMLNS, causes overflow Question code 001B 2200E249:55 EBP shall 001B: 2200E24A 8BEC MOV EBP, ESP 001B: 2200E24C 81EC40010000 SUB ESP, 00000140 / /... | 09/29/2010 |
Upfile. "dynamism" the asp file loophole explanation | Hits:23 |
Loophole hazard: 1. Users can build directory. 2. Users can upload the file name arbitrarily suffix. Look below the first fast in the asp file. In this code: If not MyFso. FolderExists (up_path) then Set up_path = MyFso CreateFolder ... | 09/28/2010 |
Remote file contains details loopholes | Hits:23 |
AuThor: CrAcKlOvE * * * * * * emA! L: CrAcKlOvE# zJ.com * HoMePaGe: N/a * * * * * * * * DoWn, don * * * * * * * * * * * * * * * * * * * * * * * * * * * * 1) what is remote files contain bugs? First, let's look at the following code, CODE ?... | 09/27/2010 |
B2B e-commerce shopping website into holes Cookies | Hits:18 |
The Cookies injection exists in multiple B2B shopping system, has the domain of hi-tech testing, tang network technology. Don't know who the copy of the code. Here is the tang net shopping online electronic commerce technology management... | 09/26/2010 |
MvMmall vulnerability analysis | Hits:45 |
Through analysis. This session is through the records include/session. Scale-up. PHP files. This document mvm_session class View returned Locate 14, 20: print? 01 handler () {hire those knowledgeable programmers. 02 session_module_name (j)... | 09/25/2010 |
IE infinite loop analysis denial-of-service vulnerabilities | Hits:22 |
The holes exist ActiveX control. Attackers can entice users access, malicious page malicious code can run any Windows command, use a lot of memory, cause visitors IE browser collapse. The test code HTML add / add your title. head... | 09/21/2010 |
0day vulnerability analysis, the latest | Hits:25 |
After the program written into direct K off rising operating double-click reboot (no) Below is the vulnerability using code - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -... | 09/20/2010 |
The default configuration is analyzed. The existing now loophole | Hits:62 |
Just after holidays come back, see now, but the loophole molest redhat official patch has. Strange domestic nobody noticed? In the Redhat bugzilla on March 16th report, April 27 CVE - 2010-0738 actually is now a loophole,... | 09/18/2010 |
Factors GShop online shop system vulnerability analysis SQL injection | Hits:37 |
Google: inurl: showhelp. Asp? Your title = about us In this document showhelp. Asp Id = request (id). Thetitle = request (add). If id = and thetitle = then Tip 5 redirect. j tipstr = no parameters of asp? Please return. The first 5) For... | 09/17/2010 |
ECSHOP that new SQL injection loophole analysis | Hits:106 |
ECSHOP mall category pages to filter system is lax SQL injection vulnerabilities Add: time 2010-05-08 System Numbers: WAVDB - 01592 Affect version: ECShop V2.7.2 UTF8_Release0505 Introduction: the program ECSHOP is a source of free... | 09/16/2010 |
V10.09 grows fast version vulnerabilities | Hits:55 |
Upload loophole: Loophole page: / up/asp. Add Methods: using directly behind in a loophole guestbook page address: http://www.91t7t8.com/up/add.asp, such as: X.a sp; local structural The pictures, JPG, using the analytic iis6.0... | 09/15/2010 |
|