Computer Security and Information Security

Computer Security Vulnerabilities


[EN] securityvulns.ru
no-pyccku


23.02.2015
Detailed
8!Samba memory corruption
document Uninitilezed pointer free'ing potentially leads to code execution.
8!EMC Documentum multiple security vulnerabilities
updated since 14.06.2014
document Code injection, privilege escalation.
7!Cisco WebEx Meetings Server code execution
document Shell injection.
6!Apache Tomcar request spoofing
document Request spoofing on chunked encoding processing.
 HP UCMDB information disclosure
document 
 HP SiteScope privilege escalation
document 
 condor code execution
document Unfiltered shell characters on mailx invocation.
 EMC Captiva Capture information leakage
document Cleartext password may be logged.
 vorbis-tools DoS
document out-of-bounds read on raw files processing.
 liveMedia integer overflow
document Integer overflow on RTSP parsing.
 IBM Endpoint Manager crossite scripting
document Relay Diagnostics crossite scripting.
 Web applications security vulnerabilities summary (PHP, ASP, JSP, CGI, Perl)
updated since 22.02.2015
document PHP inclusions, SQL injections, directory traversals, crossite scripting, information leaks, etc.
 LG On Screen Phone authentication bypass
document Authentication is IP address based.
 Mooplayer buffer overflow
document Buffer overflow on .m3u files parsing.
  


22.02.2015
Detailed
6!ISC bind named DoS
document DNSSEC parsing assert().
6!PHP multiple security vulnerabilities
updated since 11.02.2015
document exif_process_unicode() DoS, var_unserializer.re code execution, information disclosure.
 Elasticsearch restrictions bypass
document Sandbox restrictions bypass.
 Google mail application DoS
document DoS on message parsing.
 Netatmo Weather Station information leakage
document Information leakage.
 NetGear WNDR security vulnerabilities
document Information leakage, authentication bypass.
 LibreOffice memory corruption
document Memory corruption on RTF parsing.
 UnZip multiple security vulnerabilities
updated since 23.12.2014
document Few buffer overflows.
  


16.02.2015
Detailed
6!vlc multiple security vulnerabilities
document Integer overflows, buffer overflows.
  

Archive by months:
*  2015/2*  2015/1
*  2014/12*  2014/11
*  2014/10*  2014/9
*  2014/8*  2014/7
*  2014/6*  2014/5
*  2014/4*  2014/3
*  2014/2*  2014/1
*  2013/12*  2013/11
*  2013/10*  2013/9
*  2013/8*  2013/7
*  2013/6*  2013/5
*  2013/4*  2013/3
*  2013/2*  2013/1
*  2012/12*  2012/11
*  2012/10*  2012/9
*  2012/8*  2012/7
*  2012/6*  2012/5
*  2012/4*  2012/3
*  2012/2*  2012/1
*  2011/12*  2011/11
*  2011/10*  2011/9
*  2011/8*  2011/7
*  2011/6*  2011/5
*  2011/4*  2011/3
*  2011/2*  2011/1
*  2010/12*  2010/11
*  2010/10*  2010/9
*  2010/8*  2010/7
*  2010/6*  2010/5
*  2010/4*  2010/3
*  2010/2*  2010/1
*  2009/12*  2009/11
*  2009/10*  2009/9
*  2009/8*  2009/7
*  2009/6*  2009/5
*  2009/4*  2009/3
*  2009/2*  2009/1
*  2008/12*  2008/11
*  2008/10*  2008/9
*  2008/8*  2008/7
*  2008/6*  2008/5
*  2008/4*  2008/3
*  2008/2*  2008/1
*  2007/12*  2007/11
*  2007/10*  2007/9
*  2007/8*  2007/7
*  2007/6*  2007/5
*  2007/4*  2007/3
*  2007/2*  2007/1
*  2006/12*  2006/11
*  2006/10*  2006/9
*  2006/8*  2006/7
*  2006/6*  2006/5
*  2006/4*  2006/3
*  2006/2*  2006/1
All periods

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod
Share your news!
You may send information about any vulnerabilities to vuln@security.nnov.ru

Subscribe
Security news RSS/XML feed
Subscribtion options and news export - have SecurityVulns information on your site (no site script support required)!

3proxy forum:
Log denied requests?
How to config 3proxy with user password authentication?
ftp transparent proxy
how Compile
Changelog mentioned "ldapauth plugin"

Links
Find out who offer the best storage cloud plan here.
ExecutiveIce.com
Madbid
life insurance quotes best online
1337Day Exploits Market
1337Day Exploits Market



Rating@Mail.ru