Computer Security and Information Security

Computer Security Vulnerabilities


[EN] securityvulns.ru
no-pyccku


08.04.2014
Detailed
10!OpenSSL security vulnerabilities
document Information leakage, key recovery. This vulnerability is actively used in-the-wild.
6!OpenSSH protection bypass
document SSHFP protection bypass for client.
 Apple Mac OS X DoS
document DoS via symbolic links.
  


07.04.2014
Detailed
7!Openswan security vulnerabilities
document Buffer overflow, DoS.
6!RSA BSAFE multiple security vulnerabilities
document Buffer overflows, SSL attacks, protection bypass.
 Dassault Systemes Catia buffer overflow
document Buffer overflow on network request parsing.
 Symantec Endpoint Protection security vulnerabilities
document SQL injection, information leakage.
 Asus RT routers unauthorized access
document Full anonymous access is allowed be default. Authentication bypass. Crossite scripting.
 lxc protection bypass
document Invalid sshd mount permissions template.
 Apple BootCamp privilege escalation
document Kernel memory corruption on PE files parsing.
 OpenLDAP DoS
document Resources exhaustion.
 a2ps code execution
document Macro are not filtered in Postscript processin.
 Rhythm File Manager multiple security vulnerabilities
document Information leakage, privilege escalation, code execution.
  

Site news
3proxy tiny freeware proxy 0.7 released for Windows, Unix, Linux, MacOS X / iPhone New!
Article: Reverse Engineering with LD_PRELOAD
Archive by months:
*  2014/4*  2014/3
*  2014/2*  2014/1
*  2013/12*  2013/11
*  2013/10*  2013/9
*  2013/8*  2013/7
*  2013/6*  2013/5
*  2013/4*  2013/3
*  2013/2*  2013/1
*  2012/12*  2012/11
*  2012/10*  2012/9
*  2012/8*  2012/7
*  2012/6*  2012/5
*  2012/4*  2012/3
*  2012/2*  2012/1
*  2011/12*  2011/11
*  2011/10*  2011/9
*  2011/8*  2011/7
*  2011/6*  2011/5
*  2011/4*  2011/3
*  2011/2*  2011/1
*  2010/12*  2010/11
*  2010/10*  2010/9
*  2010/8*  2010/7
*  2010/6*  2010/5
*  2010/4*  2010/3
*  2010/2*  2010/1
*  2009/12*  2009/11
*  2009/10*  2009/9
*  2009/8*  2009/7
*  2009/6*  2009/5
*  2009/4*  2009/3
*  2009/2*  2009/1
*  2008/12*  2008/11
*  2008/10*  2008/9
*  2008/8*  2008/7
*  2008/6*  2008/5
*  2008/4*  2008/3
*  2008/2*  2008/1
*  2007/12*  2007/11
*  2007/10*  2007/9
*  2007/8*  2007/7
*  2007/6*  2007/5
*  2007/4*  2007/3
*  2007/2*  2007/1
*  2006/12*  2006/11
*  2006/10*  2006/9
*  2006/8*  2006/7
*  2006/6*  2006/5
*  2006/4*  2006/3
*  2006/2*  2006/1
All periods

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod
Share your news!
You may send information about any vulnerabilities to vuln@security.nnov.ru

Subscribe
Security news RSS/XML feed
Subscribtion options and news export - have SecurityVulns information on your site (no site script support required)!

Main forum:
Defending my computer and network?
Indexing every IP on the Internet
helping people
help to decoding string
Vulnerabilities on Linux Games

3proxy forum:
replica bags
AND YES,
Write to email if you have any question
Configure allow rule with cascading proxy in 3proxy
What internal and external IP means ?

Links
Find out who offer the best storage cloud plan here.
1337Day Exploits Market
1337Day Exploits Market



Rating@Mail.ru