Computer Security and Information Security

Computer Security Vulnerabilities


[EN] securityvulns.ru
no-pyccku


24.11.2014
Detailed
7!Apple iOS multiple security vulnerabilities
document Information leakage, unsigned code execution, code execution, restrictions bypass, memory corruption.
7!GnuTLS memory corruption
document Memory corruption on ECC.
6!Apple Mac OS X multiple security vulnerabilities
document Information leakage, memory corruption.
6!Asterisk multiple security vulnerabilities
document Restrictions bypass, privilege escalation, DoS.
 Apple TV multiple security vulnerabilities
document Memory corruptions, unsigned code execution, privilege escalation.
 mountall privilege escalation
document umask is handled incorrectly.
 libcurl information leakage
document Memory content leakage via POST.
 Ruby DoS
document Resources exhaustion on XML parsing. Memory corruption in encodes().
 AppArmor restrictions bypass
document Restrictions bypass in apparmor_parser
 libvirt information leakage
document Information access via qemuDomainFormatXML.
 wireshark multiple security vulnerabilities
document Buffer overflow and DoS-conditions on different protocols parsing.
 MIT krb5 privilege escalation
document Under some conditions, kadm5_randkey_principal_3() returns old keys.
 LibreOffice use-after-free vulnereability
updated since 10.11.2014
document Ingress remote control protocol use-after-free, memory corruption in OLE preview.
  


18.11.2014
Detailed
9!Microsoft Windows multiple security vulnerabilities
document OLE code execution, Internet Explorer multiple vulnerabilities, Schannel code execution, XML Core Services code execution, TCP/IP privilege escalation, Windows Audio Service privilege escalation, .NET Framework privilege escalation, RDP restrictions bypass, IIS restrictions bypass, IME privilege escalation, kernel-mode drivers DoS.
  

Archive by months:
*  2014/11*  2014/10
*  2014/9*  2014/8
*  2014/7*  2014/6
*  2014/5*  2014/4
*  2014/3*  2014/2
*  2014/1*  2013/12
*  2013/11*  2013/10
*  2013/9*  2013/8
*  2013/7*  2013/6
*  2013/5*  2013/4
*  2013/3*  2013/2
*  2013/1*  2012/12
*  2012/11*  2012/10
*  2012/9*  2012/8
*  2012/7*  2012/6
*  2012/5*  2012/4
*  2012/3*  2012/2
*  2012/1*  2011/12
*  2011/11*  2011/10
*  2011/9*  2011/8
*  2011/7*  2011/6
*  2011/5*  2011/4
*  2011/3*  2011/2
*  2011/1*  2010/12
*  2010/11*  2010/10
*  2010/9*  2010/8
*  2010/7*  2010/6
*  2010/5*  2010/4
*  2010/3*  2010/2
*  2010/1*  2009/12
*  2009/11*  2009/10
*  2009/9*  2009/8
*  2009/7*  2009/6
*  2009/5*  2009/4
*  2009/3*  2009/2
*  2009/1*  2008/12
*  2008/11*  2008/10
*  2008/9*  2008/8
*  2008/7*  2008/6
*  2008/5*  2008/4
*  2008/3*  2008/2
*  2008/1*  2007/12
*  2007/11*  2007/10
*  2007/9*  2007/8
*  2007/7*  2007/6
*  2007/5*  2007/4
*  2007/3*  2007/2
*  2007/1*  2006/12
*  2006/11*  2006/10
*  2006/9*  2006/8
*  2006/7*  2006/6
*  2006/5*  2006/4
*  2006/3*  2006/2
*  2006/1
All periods

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod
Share your news!
You may send information about any vulnerabilities to vuln@security.nnov.ru

Subscribe
Security news RSS/XML feed
Subscribtion options and news export - have SecurityVulns information on your site (no site script support required)!

3proxy forum:
how Compile
Changelog mentioned "ldapauth plugin"
Write to email if you have any question
Can you help to explain what '%D' means in the log format.
http(s) proxy problem on a ubuntu server 14.04 ?

Links
Find out who offer the best storage cloud plan here.
ExecutiveIce.com
1337Day Exploits Market
1337Day Exploits Market



Rating@Mail.ru