Computer Security and Information Security

Computer Security Vulnerabilities


[EN] securityvulns.ru
no-pyccku


05.05.2015
Detailed
9!GNU glibc security vulnerabilities
document Ğ¿gethostbyname_r() buffer overflow, getaddrinfo() race conditions.
7!qt multiple security vulnerabilities
document Memory corruptions on different graphics formats parsing.
7!wpa_supplicant buffer overflow
document Buffer overflow on p2p invitation packet parsing.
7!cURL security vulnerabilitiies
updated since 01.02.2014
document Request may be sent via wrong connection if NTLM authentication is used. Information disclosure, DoS.
6!Elasticsearch directory traversal
document Directory traversal via requests to /_plugin
6!Linux kernel multiple security vulnerabilities
document DoS, privilege escalation, protection bypass.
6!Google Chrome / Chromium multiple security vulnerabilities
document 
6!libphp-snoopy code execution
document 
6!SQLite multiple security vulnerabilities
updated since 16.04.2015
document Over 20 errors, including uninitialized memory access.
 ProFTPD unauthorized files access
document Unauthorized files copy via mod_copy.
 OpenFire certificate validation vulnerability
document 
 usb-creator privilege escalation
document 
 perl-Module-Signature content spoofing
document Unsigned content can be interpreted as a signed.
 PHP security vulnerabilities
document apache2handler code execution, memory corruption on archives parsing.
 libvirt / qemu DoS
document Crash on Physical Region Descriptor Table decoder.
 LibreOffice memory corruption
document Memory corruption on HWP documents parsing.
 icecast DoS
document NULL pointer dereference on authentication by URL.
 owncloud multiple security vulnerabilities
document CSRF, XSS, limitations bypass.
 HUAWEI MobiConnect weak permissions
document Weak permissions for executable files.
 Different iOS / Android applications vulnerabilities
updated since 04.05.2015
document Information leaks, code execution, protection bypass, etc.
 dnsmasq uninitialized memory dereference
updated since 04.05.2015
document Uninitilized memory dereference on DNS request parsing.
 librsync weak permission
document Weak hash function is used.
 automount privilege escalation
document Insufficient local variables filtering.
 glusterfs DoS
document Infinite loop.
  


04.05.2015
Detailed
7!EMC Autostart data injection
document Commands injection is possible.
  

Archive by months:
*  2015/5*  2015/4
*  2015/3*  2015/2
*  2015/1*  2014/12
*  2014/11*  2014/10
*  2014/9*  2014/8
*  2014/7*  2014/6
*  2014/5*  2014/4
*  2014/3*  2014/2
*  2014/1*  2013/12
*  2013/11*  2013/10
*  2013/9*  2013/8
*  2013/7*  2013/6
*  2013/5*  2013/4
*  2013/3*  2013/2
*  2013/1*  2012/12
*  2012/11*  2012/10
*  2012/9*  2012/8
*  2012/7*  2012/6
*  2012/5*  2012/4
*  2012/3*  2012/2
*  2012/1*  2011/12
*  2011/11*  2011/10
*  2011/9*  2011/8
*  2011/7*  2011/6
*  2011/5*  2011/4
*  2011/3*  2011/2
*  2011/1*  2010/12
*  2010/11*  2010/10
*  2010/9*  2010/8
*  2010/7*  2010/6
*  2010/5*  2010/4
*  2010/3*  2010/2
*  2010/1*  2009/12
*  2009/11*  2009/10
*  2009/9*  2009/8
*  2009/7*  2009/6
*  2009/5*  2009/4
*  2009/3*  2009/2
*  2009/1*  2008/12
*  2008/11*  2008/10
*  2008/9*  2008/8
*  2008/7*  2008/6
*  2008/5*  2008/4
*  2008/3*  2008/2
*  2008/1*  2007/12
*  2007/11*  2007/10
*  2007/9*  2007/8
*  2007/7*  2007/6
*  2007/5*  2007/4
*  2007/3*  2007/2
*  2007/1*  2006/12
*  2006/11*  2006/10
*  2006/9*  2006/8
*  2006/7*  2006/6
*  2006/5*  2006/4
*  2006/3*  2006/2
*  2006/1
All periods

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod
Share your news!
You may send information about any vulnerabilities to vuln@security.nnov.ru

Subscribe
Security news RSS/XML feed
Subscribtion options and news export - have SecurityVulns information on your site (no site script support required)!

3proxy forum:
TOAnIFCJDnkcXVgOhUm
cIwJzlLzfuJOOSSGkz
YrpxYzcoCgNkqXm
3APA3A
Log denied requests?

Links
Madbid
Friv
Friv kizi games kizi 2 games free friv.
1337Day Exploits Market
1337Day Exploits Market



Rating@Mail.ru