廣告廣告
  加入我的最愛 設為首頁 風格修改
首頁 首尾
 手機版   訂閱   地圖  簡體 
您是第 1913 個閱讀者
 
發表文章 發表投票 回覆文章
  可列印版   加為IE收藏   收藏主題   上一主題 | 下一主題   
upside 手機 葫蘆墩家族
個人頭像
個人文章 個人相簿 個人日記 個人地圖
特殊貢獻獎 社區建設獎 優秀管理員勳章
頭銜:反病毒 反詐騙 反虐犬   反病毒 反詐騙 反虐犬  
版主
分享: 轉寄此文章 Facebook Plurk Twitter 複製連結到剪貼簿 轉換為繁體 轉換為簡體 載入圖片
推文 x0
安全測試Test Your Browser's Security Now
安全測試Test Your Browser's Security Now
Test Your Browser's Security Now
Test Your Browser's Security NowCareful! The test will try to crash your browser! Close all other browser windows before starting and bookmark this page. If your browser crashes during the test, restart it and return to this page. It will show which vulnerability crashed your browser and offer you to continue the test or view the results.

做以下測試

What do we test
Windows animated cursor overflow (CVE-2007-0038) Detailed test information
Mozilla crashes with evidence of memory corruption (CVE-2007-0777) Detailed test information
Internet Explorer bait & switch race condition (CVE-2007-3091) Detailed test information
Mozilla crashes with evidence of memory corruption (CVE-2007-2867) Detailed test information
Internet Explorer createTextRange arbitrary code execution (CVE-2006-1359) Detailed test information
Windows MDAC ADODB ActiveX control invalid length (CVE-2006-5559) Detailed test information
Adobe Flash Player video file parsing integer overflow (CVE-2007-3456) Detailed test information
XMLDOM substringData() heap overflow (CVE-2007-2223) Detailed test information
Mozilla crashes with evidence of memory corruption (rv:1.8.1.5) (CVE-2007-3734) Detailed test information
Opera JavaScript invalid pointer arbitrary code execution (CVE-2007-436) Detailed test information
Apple QuickTime MOV file JVTCompEncodeFrame heap overflow (CVE-2007-2295) Detailed test information
Mozilla code execution via QuickTime Media-link files (CVE-2006-4965) Detailed test information
Mozilla crashes with evidence of memory corruption (rv:1.8.1.8) ( CVE-2007-533) Detailed test information
Mozilla memory corruption vulnerabilities (rv:1.8.1.10) (CVE-2007-5959) Detailed test information
Mozilla crashes with evidence of memory corruption (rv:1.8.1.12) (CVE-2008-0412) Detailed test information
Apple QuickTime 'QTPlugin.ocx' ActiveX Control Multiple Buffer Overflows () Detailed test information

在首頁下方...請選 Run all available tests 做完整測試!!!
測試時...請關閉您的掃毒軟體..等防護工具..這樣才能確是掃瞄到您系統存在漏洞..而不是依靠掃毒軟體攔截.
測試網頁 : http://bcheck.scan...check/



爸爸 你一路好走
獻花 x0 回到頂端 [樓 主] From:臺灣 | Posted:2008-03-13 16:37 |
andy33448
個人文章 個人相簿 個人日記 個人地圖
初露鋒芒
級別: 初露鋒芒 該用戶目前不上站
推文 x26 鮮花 x368
分享: 轉寄此文章 Facebook Plurk Twitter 複製連結到剪貼簿 轉換為繁體 轉換為簡體 載入圖片

掃出來的結果如下 :
Test results
  • Mozilla crashes with evidence of memory corruption - passed
  • Internet Explorer bait & switch race condition - passed
  • Mozilla crashes with evidence of memory corruption - passed
  • Internet Explorer createTextRange arbitrary code execution - passed
  • Windows MDAC ADODB ActiveX control invalid length - passed
  • Adobe Flash Player video file parsing integer overflow - passed
  • XMLDOM substringData() heap overflow - passed
  • Mozilla crashes with evidence of memory corruption (rv:1.8.1.5) - passed
  • Opera JavaScript invalid pointer arbitrary code execution - passed
  • Apple QuickTime MOV file JVTCompEncodeFrame heap overflow - passed
  • Mozilla code execution via QuickTime Media-link files - passed
  • Mozilla crashes with evidence of memory corruption (rv:1.8.1.8) - passed
  • Mozilla memory corruption vulnerabilities (rv:1.8.1.10) - passed
  • Mozilla crashes with evidence of memory corruption (rv:1.8.1.12) - passed
  • Apple QuickTime 'QTPlugin.ocx' ActiveX Control Multiple Buffer Overflows - passed
Congratulations! The test has found no vulnerabilities in your browser!


獻花 x0 回到頂端 [1 樓] From:臺灣和信超媒體寬帶網 | Posted:2008-03-18 19:50 |

首頁  發表文章 發表投票 回覆文章
Powered by PHPWind v1.3.6
Copyright © 2003-04 PHPWind
Processed in 0.059373 second(s),query:16 Gzip disabled
本站由 瀛睿律師事務所 擔任常年法律顧問 | 免責聲明 | 本網站已依台灣網站內容分級規定處理 | 連絡我們 | 訪客留言