Computer Security and Information Security

Computer Security Vulnerabilities


[EN] securityvulns.ru
no-pyccku


20.04.2015
Detailed
6!libpng security vulnerabilities
updated since 15.05.2014
document Few integer overflows lead to heap buffer overrun.
 cabextract directory traversal
document Directory traversal on files extraction.
 python-numpy symbolic links vulnerability
document Symbolic links vulnerability on temporary files creation.
 snmplib / snmpd DoS
document Multiple DoS conditions.
 stunnel crypto vulnerabilities
document Entropy pools are reused if fork() if used for threading.
 libarchive directory traversal
updated since 16.03.2015
document Directory traversal and symbolic links vulnerability in cpio implementation.
  


19.04.2015
Detailed
8!Apple Safari / Webkit multiple security vulnerabilities
updated since 08.04.2015
document Invalid SSL validation, information leakage, crossite access, memory corruptions.
6!freexl multiple security vulnerabilities
document Multiple memory corruptions on Excel documents parsing.
6!Android multiple security vulnerabilities
document Restrictions bypass, code execution.
6!cups-filters code execution
updated since 18.03.2015
document cups-browsed shell characters vulnerability
 pillow multiple security vulnerabilities
document Symbolic links vulnerability, DoS, shell injection.
 Shibboleth Service Provider DoS
document Crash on parsing SAML message.
 dulwich security vulnerabilities
document Code execution, buffer overflow.
 cifs-utils buffer overflow
document pam_cifscreds buffer overflow.
 util-linux blkid commands injection
document 
 PulseAudio DoS
document Crash on empty UDP packet.
 Not Yet Commons SSL certificate spoofing
document Insufficient certificate checking.
 Jython weak permissions
document Weak permissions on cache files creation.
 gtk+ protection bypass
document Screen lock bypass.
 TP-LINK devices unauthorized files access
document Directory traversal in web interface.
  HP Support Solution Framework security vulnerabilities
document Code execution, information disclosure.
 112 ipTIME code execution
document Code execution via web interface.
  


17.04.2015
Detailed
8!Apple iOS multiple security vulnerabilities
document Restrictions bypass, privilege escalation, headers spoofing, XXE, memory corruptions, information disclosure, DoS, traffic hijacking.
  

Archive by months:
*  2015/4*  2015/3
*  2015/2*  2015/1
*  2014/12*  2014/11
*  2014/10*  2014/9
*  2014/8*  2014/7
*  2014/6*  2014/5
*  2014/4*  2014/3
*  2014/2*  2014/1
*  2013/12*  2013/11
*  2013/10*  2013/9
*  2013/8*  2013/7
*  2013/6*  2013/5
*  2013/4*  2013/3
*  2013/2*  2013/1
*  2012/12*  2012/11
*  2012/10*  2012/9
*  2012/8*  2012/7
*  2012/6*  2012/5
*  2012/4*  2012/3
*  2012/2*  2012/1
*  2011/12*  2011/11
*  2011/10*  2011/9
*  2011/8*  2011/7
*  2011/6*  2011/5
*  2011/4*  2011/3
*  2011/2*  2011/1
*  2010/12*  2010/11
*  2010/10*  2010/9
*  2010/8*  2010/7
*  2010/6*  2010/5
*  2010/4*  2010/3
*  2010/2*  2010/1
*  2009/12*  2009/11
*  2009/10*  2009/9
*  2009/8*  2009/7
*  2009/6*  2009/5
*  2009/4*  2009/3
*  2009/2*  2009/1
*  2008/12*  2008/11
*  2008/10*  2008/9
*  2008/8*  2008/7
*  2008/6*  2008/5
*  2008/4*  2008/3
*  2008/2*  2008/1
*  2007/12*  2007/11
*  2007/10*  2007/9
*  2007/8*  2007/7
*  2007/6*  2007/5
*  2007/4*  2007/3
*  2007/2*  2007/1
*  2006/12*  2006/11
*  2006/10*  2006/9
*  2006/8*  2006/7
*  2006/6*  2006/5
*  2006/4*  2006/3
*  2006/2*  2006/1
All periods

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod
Share your news!
You may send information about any vulnerabilities to vuln@security.nnov.ru

Subscribe
Security news RSS/XML feed
Subscribtion options and news export - have SecurityVulns information on your site (no site script support required)!

3proxy forum:
TOAnIFCJDnkcXVgOhUm
cIwJzlLzfuJOOSSGkz
YrpxYzcoCgNkqXm
3APA3A
Log denied requests?

Links
Madbid
Friv
Friv kizi games kizi 2 games free friv.
1337Day Exploits Market
1337Day Exploits Market



Rating@Mail.ru