Computer Security and Information Security

Computer Security Vulnerabilities


[EN] securityvulns.ru
no-pyccku


24.08.2015
Detailed
9!Microsoft Windows multiple security vulnerabilities
updated since 11.08.2015
document OpenType fonts parsing code execution, multiple Internet Explorer and Edge vulnerabilities, code execution and information disclosure in system libraries, code execution via RDP and AMB, privilege escalation, information disclosure via WebDAV.
9!Microsoft Windows multiple security vulnerabilities
updated since 18.11.2014
document OLE code execution, Internet Explorer multiple vulnerabilities, Schannel code execution, XML Core Services code execution, TCP/IP privilege escalation, Windows Audio Service privilege escalation, .NET Framework privilege escalation, RDP restrictions bypass, IIS restrictions bypass, IME privilege escalation, kernel-mode drivers DoS.
8!EMC Documentum multiple security vulnerabilities
updated since 14.06.2014
document Code injection, privilege escalation.
6!HP KeyView multiple security vulnerabilities
document Multiple vulnerabilities with potential code execution impact.
6!HP Operations Manager i code execution
document 
6!McAfee Application Control multiple security vulnerabilities
document Restrictions bypass, unsafe libraries usage, privilege escalation.
6!Websense Triton Content Manager buffer overflow
document Buffer overflow on request parsing.
6!GnuTLS double free
document Double free on DN parsing.
6!gdk-pixbuf buffer overflow
document Heap buffer overflow on BMP parsing.
6!Apache Subversion security vulnerabilities
document Authentication bypass, unauthorized files access.
6!VLC uninitialized pointer dereference
document Uninitialized pointer dereference on 3GP parsing.
 HP Central View applications information leakage
document 
 Fortiguard FortiSandbox XSS
document Crossite scripting in web interface.
 Apache ActiveMQ DoS
document Undocumented shutdown command.
 Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
document PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
 QNAP devices protection bypass
document Decyphering ispossible without knowledge of key information.
 Hawkeye-G XSS
document Crossite scripting in web interface.
 Basware Banking/Maksuliikenne security vulnerabilities
document 
 Dell Netvault Backup DoS
document Crash on network request parsing.
 OpenStack Keystone restrictions bypass
document Certificates validation bypass.
 OpenStack Swift security vulnerabilities
document Few restriction bypass vulnerabilities.
 EMC RSA BSAFE multiple security vulnerabilities
document Integer overflow in base64 decode, multiple crypto vulnerabilities.
 EMC RSA Archer CSRF
document Multiple CSRF vulnerabilities.
 SAP Mobile Platform DataVault multiple security vulnerabilities
document Multiple cryptographical vulnerabilities.
 SAP Afaria 7 multiple security vulnerabilities
document Buffer overflow, information leakage, DoS.
 conntrack DoS
document Crash on different network packets.
 Net-SNMP memory corruption
document Memory corruption on server response parsing.
 Trend Micro Deep Discovery security vulnerabilities
document Authentication bypass, crossite scripting.
 Cumulus Linux's Switch Configuration Tools Backend privilege escalation
document Privilege escalation via command injection.
 OpenSSH resreictions bypass
updated since 02.08.2015
document It's possible to bypass MaxAuthTries restrictions.
  

Archive by months:
*  2015/8*  2015/7
*  2015/6*  2015/5
*  2015/4*  2015/3
*  2015/2*  2015/1
*  2014/12*  2014/11
*  2014/10*  2014/9
*  2014/8*  2014/7
*  2014/6*  2014/5
*  2014/4*  2014/3
*  2014/2*  2014/1
*  2013/12*  2013/11
*  2013/10*  2013/9
*  2013/8*  2013/7
*  2013/6*  2013/5
*  2013/4*  2013/3
*  2013/2*  2013/1
*  2012/12*  2012/11
*  2012/10*  2012/9
*  2012/8*  2012/7
*  2012/6*  2012/5
*  2012/4*  2012/3
*  2012/2*  2012/1
*  2011/12*  2011/11
*  2011/10*  2011/9
*  2011/8*  2011/7
*  2011/6*  2011/5
*  2011/4*  2011/3
*  2011/2*  2011/1
*  2010/12*  2010/11
*  2010/10*  2010/9
*  2010/8*  2010/7
*  2010/6*  2010/5
*  2010/4*  2010/3
*  2010/2*  2010/1
*  2009/12*  2009/11
*  2009/10*  2009/9
*  2009/8*  2009/7
*  2009/6*  2009/5
*  2009/4*  2009/3
*  2009/2*  2009/1
*  2008/12*  2008/11
*  2008/10*  2008/9
*  2008/8*  2008/7
*  2008/6*  2008/5
*  2008/4*  2008/3
*  2008/2*  2008/1
*  2007/12*  2007/11
*  2007/10*  2007/9
*  2007/8*  2007/7
*  2007/6*  2007/5
*  2007/4*  2007/3
*  2007/2*  2007/1
*  2006/12*  2006/11
*  2006/10*  2006/9
*  2006/8*  2006/7
*  2006/6*  2006/5
*  2006/4*  2006/3
*  2006/2*  2006/1
All periods

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod
Share your news!
You may send information about any vulnerabilities to vuln@security.nnov.ru

Subscribe
Security news RSS/XML feed
Subscribtion options and news export - have SecurityVulns information on your site (no site script support required)!

Links
Friv
Friv kizi games kizi 2 games free friv.
buy instagram followers
3proxy proxy server by 3APA3A



Rating@Mail.ru