Computer Security and Information Security

Computer Security Vulnerabilities


[EN] securityvulns.ru
no-pyccku


23.03.2015
Detailed
 Google Android sandbox bypass
document Google App Engine Java sandbox escape.
 redcloth crossite scripting
document Crossite scripting in conversion to HTML.
 Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
document PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
  


22.03.2015
Detailed
9!Mozilla Firefox / Thunderbird / Seamonkey multiple security vulnerabilities
updated since 07.03.2015
document Restrictions bypass, information spoofing, information leakage, buffer overflows, memory corruptions, DoS, code execution.
 Dropbox SDK for Android account spoofing
document It's possible to spoof account via OAuth.
  


21.03.2015
Detailed
7!OpenSSL multiple security vulnerabilities
updated since 20.03.2015
document NULL pointer dereferences, reahable assert()s, memory corruptions.
6!SAP Business Objects multiple security vulnerabilities
document Unauthorized access to multiple components.
6!Jetty information leakage
document Memory buffers content leakage.
6!Citrix Nitro security vulnerabilities
document Crossite scripting, commands injection.
6!PHP multiple security vulnerabilities
updated since 18.03.2015
document Resources exhaustion, memory corruptions.
6!Apple Mac OS X multiple security vulnerabilities
updated since 16.03.2015
document Buffer overflows, DoS, memory corruption, restrictions bypass, weak cryptography.
 SAP HANA XSS
document Crossite scripting in Web-based Development Workbench.
 D-Link and TRENDnet routers vulnerabilities
document CSRF, authentication bypass.
 DSS TFTP directory traversal
document Directory traversal on file transmission.
 Websense Triton multiple security vulnerabilities
document Crossite scripting, authentication bypass, commands injection.
 Citrix Command Center authentication bypass
document Advent JMX is accessible.
 Citrix NetScaler VPX crossite scripting
document Crossite scripting in help pages.
 Apache Xerces-C DoS
document Memory corruption on XML parsing.
 EMC Secure Remote Services Virtual Edition multiple security vulnerabilities
updated since 16.03.2015
document Code execution, SQL injection, buffer overflow.
 EMC M&R multiple security vulnerabilities
updated since 25.01.2015
document Crossite scripting, insecure data storage, directory traversal, unrestricted files upload.
 Viber code execution
document Unsafe Javascript interface in combination with unencrypted data transmission.
  


18.03.2015
Detailed
7!Apple Safari / Webkit multiple security vulnerabilities
document Multiple memory corruptions, spoofing.
  

Archive by months:
*  2015/3*  2015/2
*  2015/1*  2014/12
*  2014/11*  2014/10
*  2014/9*  2014/8
*  2014/7*  2014/6
*  2014/5*  2014/4
*  2014/3*  2014/2
*  2014/1*  2013/12
*  2013/11*  2013/10
*  2013/9*  2013/8
*  2013/7*  2013/6
*  2013/5*  2013/4
*  2013/3*  2013/2
*  2013/1*  2012/12
*  2012/11*  2012/10
*  2012/9*  2012/8
*  2012/7*  2012/6
*  2012/5*  2012/4
*  2012/3*  2012/2
*  2012/1*  2011/12
*  2011/11*  2011/10
*  2011/9*  2011/8
*  2011/7*  2011/6
*  2011/5*  2011/4
*  2011/3*  2011/2
*  2011/1*  2010/12
*  2010/11*  2010/10
*  2010/9*  2010/8
*  2010/7*  2010/6
*  2010/5*  2010/4
*  2010/3*  2010/2
*  2010/1*  2009/12
*  2009/11*  2009/10
*  2009/9*  2009/8
*  2009/7*  2009/6
*  2009/5*  2009/4
*  2009/3*  2009/2
*  2009/1*  2008/12
*  2008/11*  2008/10
*  2008/9*  2008/8
*  2008/7*  2008/6
*  2008/5*  2008/4
*  2008/3*  2008/2
*  2008/1*  2007/12
*  2007/11*  2007/10
*  2007/9*  2007/8
*  2007/7*  2007/6
*  2007/5*  2007/4
*  2007/3*  2007/2
*  2007/1*  2006/12
*  2006/11*  2006/10
*  2006/9*  2006/8
*  2006/7*  2006/6
*  2006/5*  2006/4
*  2006/3*  2006/2
*  2006/1
All periods

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod
Share your news!
You may send information about any vulnerabilities to vuln@security.nnov.ru

Subscribe
Security news RSS/XML feed
Subscribtion options and news export - have SecurityVulns information on your site (no site script support required)!

3proxy forum:
3APA3A
Log denied requests?
How to config 3proxy with user password authentication?
ftp transparent proxy
how Compile

Links
Find out who offer the best storage cloud plan here.
ExecutiveIce.com
Madbid
1337Day Exploits Market
1337Day Exploits Market



Rating@Mail.ru