Computer Security and Information Security

Computer Security Vulnerabilities


[EN] securityvulns.ru
no-pyccku


18.11.2014
Detailed
9!Microsoft Windows multiple security vulnerabilities
document OLE code execution, Internet Explorer multiple vulnerabilities, Schannel code execution, XML Core Services code execution, TCP/IP privilege escalation, Windows Audio Service privilege escalation, .NET Framework privilege escalation, RDP restrictions bypass, IIS restrictions bypass, IME privilege escalation, kernel-mode drivers DoS.
8!Microsoft Office multiple security vulnerabilities
document Few different memory corruptions on different documents parsing.
 Microsoft Active Directory Federation Services information leakage
document It's possible to access closed session.
 Microsoft SharePoint Server crossite scripting
document Stored XSS.
  


10.11.2014
Detailed
6!RSA Web Threat Detection SQL injection
document SQL injection by authenticated user.
6!Open-Xchange SQL injection
document SQLi in jslob API.
6!Cisco RV multiple security vulnerabilities
document Files access, code execution, crossite scripting.
6!FreeBSd ftp code execution
document Shell characters vulnerability on server response parsing.
6!qemu multiple security vulnerabilities
updated since 13.10.2014
document Multiple memory corruptions, DoS, information leakage.
 Symantec Endpoint Protection multiple security vulnerabilities
document XSS, XXE, unauthroized files access.
 CA Cloud Service Management multiple security vulnerabilities
document Replay-атаки, XSS, XXE, token validation vulnerability.
 LibreOffice use-after-free vulnereability
document Ingress remote control protocol use-after-free.
 Softing FG-100 security vulnerabilities
document Backdoor accounts, crossite scripting.
  

Archive by months:
*  2014/11*  2014/10
*  2014/9*  2014/8
*  2014/7*  2014/6
*  2014/5*  2014/4
*  2014/3*  2014/2
*  2014/1*  2013/12
*  2013/11*  2013/10
*  2013/9*  2013/8
*  2013/7*  2013/6
*  2013/5*  2013/4
*  2013/3*  2013/2
*  2013/1*  2012/12
*  2012/11*  2012/10
*  2012/9*  2012/8
*  2012/7*  2012/6
*  2012/5*  2012/4
*  2012/3*  2012/2
*  2012/1*  2011/12
*  2011/11*  2011/10
*  2011/9*  2011/8
*  2011/7*  2011/6
*  2011/5*  2011/4
*  2011/3*  2011/2
*  2011/1*  2010/12
*  2010/11*  2010/10
*  2010/9*  2010/8
*  2010/7*  2010/6
*  2010/5*  2010/4
*  2010/3*  2010/2
*  2010/1*  2009/12
*  2009/11*  2009/10
*  2009/9*  2009/8
*  2009/7*  2009/6
*  2009/5*  2009/4
*  2009/3*  2009/2
*  2009/1*  2008/12
*  2008/11*  2008/10
*  2008/9*  2008/8
*  2008/7*  2008/6
*  2008/5*  2008/4
*  2008/3*  2008/2
*  2008/1*  2007/12
*  2007/11*  2007/10
*  2007/9*  2007/8
*  2007/7*  2007/6
*  2007/5*  2007/4
*  2007/3*  2007/2
*  2007/1*  2006/12
*  2006/11*  2006/10
*  2006/9*  2006/8
*  2006/7*  2006/6
*  2006/5*  2006/4
*  2006/3*  2006/2
*  2006/1
All periods

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod
Share your news!
You may send information about any vulnerabilities to vuln@security.nnov.ru

Subscribe
Security news RSS/XML feed
Subscribtion options and news export - have SecurityVulns information on your site (no site script support required)!

3proxy forum:
how Compile
Changelog mentioned "ldapauth plugin"
Write to email if you have any question
Can you help to explain what '%D' means in the log format.
http(s) proxy problem on a ubuntu server 14.04 ?

Links
Find out who offer the best storage cloud plan here.
ExecutiveIce.com
1337Day Exploits Market
1337Day Exploits Market



Rating@Mail.ru