广告广告
  加入我的最爱 设为首页 风格修改
首页 首尾
 手机版   订阅   地图  繁体 
您是第 1938 个阅读者
 
发表文章 发表投票 回覆文章
  可列印版   加为IE收藏   收藏主题   上一主题 | 下一主题   
upside 手机 葫芦墩家族
个人头像
个人文章 个人相簿 个人日记 个人地图
特殊贡献奖 社区建设奖 优秀管理员勋章
头衔:反病毒 反诈骗 反虐犬   反病毒 反诈骗 反虐犬  
版主
分享: 转寄此文章 Facebook Plurk Twitter 复制连结到剪贴簿 转换为繁体 转换为简体 载入图片
推文 x0
安全测试Test Your Browser's Security Now
安全测试Test Your Browser's Security Now
Test Your Browser's Security Now
Test Your Browser's Security NowCareful! The test will try to crash your browser! Close all other browser windows before starting and bookmark this page. If your browser crashes during the test, restart it and return to this page. It will show which vulnerability crashed your browser and offer you to continue the test or view the results.

做以下测试

What do we test
Windows animated cursor overflow (CVE-2007-0038) Detailed test information
Mozilla crashes with evidence of memory corruption (CVE-2007-0777) Detailed test information
Internet Explorer bait & switch race condition (CVE-2007-3091) Detailed test information
Mozilla crashes with evidence of memory corruption (CVE-2007-2867) Detailed test information
Internet Explorer createTextRange arbitrary code execution (CVE-2006-1359) Detailed test information
Windows MDAC ADODB ActiveX control invalid length (CVE-2006-5559) Detailed test information
Adobe Flash Player video file parsing integer overflow (CVE-2007-3456) Detailed test information
XMLDOM substringData() heap overflow (CVE-2007-2223) Detailed test information
Mozilla crashes with evidence of memory corruption (rv:1.8.1.5) (CVE-2007-3734) Detailed test information
Opera JavaScript invalid pointer arbitrary code execution (CVE-2007-436) Detailed test information
Apple QuickTime MOV file JVTCompEncodeFrame heap overflow (CVE-2007-2295) Detailed test information
Mozilla code execution via QuickTime Media-link files (CVE-2006-4965) Detailed test information
Mozilla crashes with evidence of memory corruption (rv:1.8.1.8) ( CVE-2007-533) Detailed test information
Mozilla memory corruption vulnerabilities (rv:1.8.1.10) (CVE-2007-5959) Detailed test information
Mozilla crashes with evidence of memory corruption (rv:1.8.1.12) (CVE-2008-0412) Detailed test information
Apple QuickTime 'QTPlugin.ocx' ActiveX Control Multiple Buffer Overflows () Detailed test information

在首页下方...请选 Run all available tests 做完整测试!!!
测试时...请关闭您的扫毒软体..等防护工具..这样才能确是扫瞄到您系统存在漏洞..而不是依靠扫毒软体拦截.
测试网页 : http://bcheck.scan...check/



爸爸 你一路好走
献花 x0 回到顶端 [楼 主] From:台湾 | Posted:2008-03-13 16:37 |
andy33448
个人文章 个人相簿 个人日记 个人地图
初露锋芒
级别: 初露锋芒 该用户目前不上站
推文 x26 鲜花 x368
分享: 转寄此文章 Facebook Plurk Twitter 复制连结到剪贴簿 转换为繁体 转换为简体 载入图片

扫出来的结果如下 :
Test results
  • Mozilla crashes with evidence of memory corruption - passed
  • Internet Explorer bait & switch race condition - passed
  • Mozilla crashes with evidence of memory corruption - passed
  • Internet Explorer createTextRange arbitrary code execution - passed
  • Windows MDAC ADODB ActiveX control invalid length - passed
  • Adobe Flash Player video file parsing integer overflow - passed
  • XMLDOM substringData() heap overflow - passed
  • Mozilla crashes with evidence of memory corruption (rv:1.8.1.5) - passed
  • Opera JavaScript invalid pointer arbitrary code execution - passed
  • Apple QuickTime MOV file JVTCompEncodeFrame heap overflow - passed
  • Mozilla code execution via QuickTime Media-link files - passed
  • Mozilla crashes with evidence of memory corruption (rv:1.8.1.8) - passed
  • Mozilla memory corruption vulnerabilities (rv:1.8.1.10) - passed
  • Mozilla crashes with evidence of memory corruption (rv:1.8.1.12) - passed
  • Apple QuickTime 'QTPlugin.ocx' ActiveX Control Multiple Buffer Overflows - passed
Congratulations! The test has found no vulnerabilities in your browser!


献花 x0 回到顶端 [1 楼] From:台湾和信超媒体宽带网 | Posted:2008-03-18 19:50 |

首页  发表文章 发表投票 回覆文章
Powered by PHPWind v1.3.6
Copyright © 2003-04 PHPWind
Processed in 0.068224 second(s),query:16 Gzip disabled
本站由 瀛睿律师事务所 担任常年法律顾问 | 免责声明 | 本网站已依台湾网站内容分级规定处理 | 连络我们 | 访客留言