Computer Security and Information Security

Computer Security Vulnerabilities


[EN] securityvulns.ru
no-pyccku


25.05.2015
Detailed
7!PostgreSQL multiple security vulnerabilities
document DoS, information disclosure.
6!Apple Watch multiple security vulnerabilities
document Information interception, memory corruptions, code execution, information disclosure, DoS, privilege escalation.
6!Google Chrome / Chromium multiple security vulnerabilities
updated since 05.05.2015
document 
 fuse NTFS-3G privilege escalation
document Insufficient filtering of environment variables.
  


18.05.2015
Detailed
 Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
updated since 17.05.2015
document PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
  


17.05.2015
Detailed
6!SAP applications buffer overflow
document Buffer overflow in LZC/LZH implementation.
6!Cisco Telepresence security vulnerabilities
document Code execution, authentication bypass, DoS.
6!libvirt / qemu security vulnerabilities
updated since 05.05.2015
document Crash on PCI registers, IDE controller and Physical Region Descriptor Table decoder. Code execution.
 Websense Content Gateway certificates check vulnereability
document Compromised certificates are incorrectly checked.
 Pure Faction game server buffer overflow
document Buffer overflow via game chat.
 Apache Tomcat security vulnerabilities
updated since 11.05.2015
document Resources exhaustion, restrictions bypass.
  


13.05.2015
Detailed
9!Microsoft Windows multiple security vulnerabilities
document Buffer overflow, memory corruption, code execution, privilege escalation, restrictions bupass, DoS, information disclosure.
9!Adobe Flash Player multiple security vulnerabilities
document Buffer overflows, memory corruptions, integer overflows, race conditions, restriction bypass.
9!Mozilla Firefox / Thunderbird / Seamonkey multiple security vulnerabilities
document Multiple buffer overflows, memory corruptions, information disclosures, restriction bypass.
8!Adobe Reader / Acrobat multiple security vulnerabilities
document Memory corruptions, buffer overlfows, restrictions bypass, DoS.
7!Microsoft SharePoint Server code execution
document Code execution via document content.
7!Microsoft Office memory corruptions
document Memory corruptions on documents parsing.
  


12.05.2015
Detailed
6!quassel SQL injection
document SQL injection via messages.
6!mercurial code execution
document Code injection via clone command.
6!Novell ZenWorks Configuration Management code execution
document Code execution via web interface.
  

Archive by months:
*  2015/5*  2015/4
*  2015/3*  2015/2
*  2015/1*  2014/12
*  2014/11*  2014/10
*  2014/9*  2014/8
*  2014/7*  2014/6
*  2014/5*  2014/4
*  2014/3*  2014/2
*  2014/1*  2013/12
*  2013/11*  2013/10
*  2013/9*  2013/8
*  2013/7*  2013/6
*  2013/5*  2013/4
*  2013/3*  2013/2
*  2013/1*  2012/12
*  2012/11*  2012/10
*  2012/9*  2012/8
*  2012/7*  2012/6
*  2012/5*  2012/4
*  2012/3*  2012/2
*  2012/1*  2011/12
*  2011/11*  2011/10
*  2011/9*  2011/8
*  2011/7*  2011/6
*  2011/5*  2011/4
*  2011/3*  2011/2
*  2011/1*  2010/12
*  2010/11*  2010/10
*  2010/9*  2010/8
*  2010/7*  2010/6
*  2010/5*  2010/4
*  2010/3*  2010/2
*  2010/1*  2009/12
*  2009/11*  2009/10
*  2009/9*  2009/8
*  2009/7*  2009/6
*  2009/5*  2009/4
*  2009/3*  2009/2
*  2009/1*  2008/12
*  2008/11*  2008/10
*  2008/9*  2008/8
*  2008/7*  2008/6
*  2008/5*  2008/4
*  2008/3*  2008/2
*  2008/1*  2007/12
*  2007/11*  2007/10
*  2007/9*  2007/8
*  2007/7*  2007/6
*  2007/5*  2007/4
*  2007/3*  2007/2
*  2007/1*  2006/12
*  2006/11*  2006/10
*  2006/9*  2006/8
*  2006/7*  2006/6
*  2006/5*  2006/4
*  2006/3*  2006/2
*  2006/1
All periods

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod
Share your news!
You may send information about any vulnerabilities to vuln@security.nnov.ru

Subscribe
Security news RSS/XML feed
Subscribtion options and news export - have SecurityVulns information on your site (no site script support required)!

3proxy forum:
Write to email if you have any question
3APA3A
Log denied requests?
How to config 3proxy with user password authentication?
ftp transparent proxy

Links
Madbid
Friv
Friv kizi games kizi 2 games free friv.
1337Day Exploits Market
1337Day Exploits Market



Rating@Mail.ru