123
返回列表 发新帖
楼主: cf658888
收起左侧

[已解决] 会英文的请看一下这是不是--浏览器漏洞测试 !!!!!!!!!

  [复制链接]
天涯明月
发表于 2010-2-7 09:31:13 | 显示全部楼层
测试结果
Internet Explorer 诱饵 & 切换争用条件-通过
Internet Explorer createTextRange 执行任意代码-通过
Windows MDAC ADODB ActiveX 控件无效长度-通过
Adobe Flash Player 视频文件分析整数溢出-通过
XMLDOM substringData() 堆溢出-通过
Apple QuickTime MOV 文件 JVTCompEncodeFrame 堆溢出-通过
Apple QuickTime 'QTPlugin.ocx' ActiveX 控制多个缓冲区溢出-通过
窗口位置属性跨域脚本-通过
Internet Explorer XML 嵌套 SPAN 元素内存损坏-通过
祝贺 !测试您的浏览器中发现没有漏洞 !
我用的是ie8
runyon
发表于 2010-2-7 09:40:01 | 显示全部楼层
Internet Explorer bait & switch race condition - passed
Internet Explorer createTextRange arbitrary code execution - passed
Windows MDAC ADODB ActiveX control invalid length - passed
Adobe Flash Player video file parsing integer overflow - passed
XMLDOM substringData() heap overflow - passed
Apple QuickTime MOV file JVTCompEncodeFrame heap overflow - passed
Apple QuickTime 'QTPlugin.ocx' ActiveX Control Multiple Buffer Overflows - passed
Window location property cross-domain scripting - passed
Internet Explorer XML nested SPAN elements memory corruption - passed
cf658888
 楼主| 发表于 2010-2-7 16:10:07 | 显示全部楼层
回复 21# 天涯明月

有中文看 , 太好了
sololp 该用户已被删除
发表于 2010-2-7 16:17:49 | 显示全部楼层
Mozilla crashes with evidence of memory corruption - passed
Internet Explorer bait & switch race condition - passed
Mozilla crashes with evidence of memory corruption - passed
Internet Explorer createTextRange arbitrary code execution - passed
Windows MDAC ADODB ActiveX control invalid length - passed
Adobe Flash Player video file parsing integer overflow - passed
XMLDOM substringData() heap overflow - passed
Mozilla crashes with evidence of memory corruption (rv:1.8.1.5) - passed
Opera JavaScript invalid pointer arbitrary code execution - passed
Apple QuickTime MOV file JVTCompEncodeFrame heap overflow - passed
Mozilla code execution via QuickTime Media-link files - passed
Mozilla crashes with evidence of memory corruption (rv:1.8.1.8) - passed
Mozilla memory corruption vulnerabilities (rv:1.8.1.10) - passed
Mozilla crashes with evidence of memory corruption (rv:1.8.1.12) - passed
Apple QuickTime 'QTPlugin.ocx' ActiveX Control Multiple Buffer Overflows - passed
Window location property cross-domain scripting - passed
Mozilla Firefox MathML integer overflow - passed
Internet Explorer XML nested SPAN elements memory corruption - passed
Congratulations! The test has found no vulnerabilities in your browser!

我是IE 6
sinondo
发表于 2010-2-7 19:32:10 | 显示全部楼层
浏览器安全测试。我那chromeplus试试。
andyparallel
发表于 2010-2-8 16:27:43 | 显示全部楼层
我也全PASS了 火狐~~
qwe1q2w
头像被屏蔽
发表于 2010-2-8 17:03:54 | 显示全部楼层
火狐很好!
cnr4r
发表于 2010-2-8 17:36:32 | 显示全部楼层
都过了
cutcut 该用户已被删除
发表于 2010-2-8 17:56:24 | 显示全部楼层
还好还好 fx 3.6 没问题
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-2-2 01:58 , Processed in 0.077185 second(s), 14 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表