Release date:Updated on:
Affected Systems:Apache Group Tomcat 7.xApache Group Tomcat 6.xUnaffected system:Apache Group Tomcat 7.0.23Apache Group Tomcat 6.0.35Description:--------------------------------------------------------------------------------Bugtraq id: 51442Cve id: CVE-2011-3375
Apache Tomcat is a popular open source JSP application server program.
Apache Tomcat has a Security Restriction Bypass Vulnerability. After successful exploitation
Apache Struts CSRF Bypass Vulnerability (CVE-2014-7809)
Release date:Updated on:
Affected Systems:Apache Group Struts 2.0.0-2.3.20Description:CVE (CAN) ID: CVE-2014-7809
Struts is an open source architecture used to build Web applications.
The token value generated by Apache Struts 2.0.0-2.3.20 can be predicted, which allows remote attackers to bypass the CSRF protection mechanism.
Link: http://www.sec
IBM WebSphere DataPower XC10 Security Restriction Bypass Vulnerability
Release date:Updated on:
Affected Systems:IBM WebSphere DataPower XC10 2.5IBM WebSphere DataPower XC10 2.1Description:CVE (CAN) ID: CVE-2014-6138
XC10 is a combination of the powerful WebSphere DataPower hardware platform and advanced IBM distributed cache technology.
IBM WebSphere DataPower XC10 devices 2.1 and 2.5 have security vulnerabilities. authenticated remote users can
Interior Design For Android SSL certificate verification Security Bypass Vulnerability
Release date:Updated on:
Affected Systems:Interior Design For AndroidDescription:Bugtraq id: 70674CVE (CAN) ID: CVE-2014-7618
Interior Design for Android Interior Design Android applications.
Interior Design 1.0 and other versions do not correctly verify the X.509 Certificate of the SSL server. The security restriction bypas
How to bypass the remote lock function of IOS8
The remote lock function of IOS helps users remotely lock their lost Apple devices, so that thieves or the person who finds the device cannot access the content of the device.
However, a security researcher recently posted a video on his blog that bypasses the IOS8 remote lock. According to his introduction, the User-Defined DNS is used on the Interface connected to wifi, and some bugs can be used to ac
Touch screen Newspaper Reading System V4.0 Sandbox Bypass
Terminal Sandbox Bypass
For the patch of 2010-046745, ie cannot be displayed at the place where the payment is made.Find a place with a text box, click it first, and then click another text box to jump out of the sandbox.
The latest version of V4 is released:
Find a webpage (here, you can find a place with built-in messages or registration, f
Cisco IOS Software Security Restriction Bypass Vulnerability (CVE-2015-0610)
Release date:Updated on:
Affected Systems:Cisco IOSDescription:Bugtraq id: 72565CVE (CAN) ID: CVE-2015-0610
Cisco IOS is an interconnected network operating system used on most Cisco system routers and network switches.
Cisco IOS has a security vulnerability in the access control list of an object group. unauthenticated remote attackers can exploit this vulnerability to
NTP 'ntp _ io. c' authentication Security Restriction Bypass Vulnerability
Release date:Updated on:
Affected Systems:NTP NTPd Description:Bugtraq id: 72584CVE (CAN) ID: CVE-2014-9298
Network Time Protocol (NTP) is a Protocol used to synchronize computer Time. It can synchronize computers with their servers or clock sources (such as quartzels and GPS.
Ntpd 4.2.7 and earlier versions have multiple vulnerabilities. ntp-keygen earlier than version 4.2.7p2
BusyBox Local Security Restriction Bypass Vulnerability (CVE-2014-9645)
Release date:Updated on:
Affected Systems:BusyBoxDescription:Bugtraq id: 72324CVE (CAN) ID: CVE-2014-9645
BusyBox is an executable implementation of many standard Linux tools.
BusyBox has a local security restriction bypass vulnerability in the implementation of the basename module parameters. Attackers can exploit this vulnerabilit
CURL/libcURL Remote Security Restriction Bypass Vulnerability (CVE-2014-8150)
Release date:Updated on:
Affected Systems:CURL 6.0-7.39.0Unaffected system:CURL> = 7.40.0Description:Bugtraq id: 71964CVE (CAN) ID: CVE-2014-8150
CURL/libcURL is a command line FILE transmission tool that supports FTP, FTPS, HTTP, HTTPS, GOPHER, TELNET, DICT, FILE, and LDAP.
CURL/libcURL 6.0-7.39.0 has the URL request injection vulnerability in the implementation of pars
Adobe Reader and Acrobat Security Bypass Vulnerability (CVE-2014-0568)
Release date:Updated on:
Affected Systems:Adobe Reader 11.xAdobe Reader 10.xDescription:Bugtraq id: 69828CVE (CAN) ID: CVE-2014-0568
Adobe Reader (also known as Acrobat Reader) is an excellent PDF document reading software developed by Adobe. Acrobat is a series of products launched in 1993 for enterprises, technicians and creative professionals, making smart document delivery and
Lbe can bypass anti-theft calls
After the lbe mobile phone is locked for theft, you can bypass the anti-theft interface to answer the call.After the mobile phone is locked for theft, it is normal that the incoming call will ring, but the phone cannot be answered because it is covered by the anti-theft interface.
However, after plugging in the headset, you can use the headset's line control to answer the c
Linux kernel prepend_path Function Security Restriction Bypass Vulnerability (CVE-2015-2925)Linux kernel prepend_path Function Security Restriction Bypass Vulnerability (CVE-2015-2925)
Release date:Updated on:Affected Systems:
Linux kernel 〈 4.2.4
Description:
CVE (CAN) ID: CVE-2015-2925Linux Kernel is the Kernel of the Linux operating system.In versions earlier than Linux kernel 4.2.4, The prepend_path fu
Researchers use bypass attacks to steal encrypted information
The attacks against SSL/TLS discovered in the past few years usually require attackers to be in the middle, that is, requiring them to sniff or manipulate traffic. Two security researchers reported a new method of combined bypass attacks at the Black Hat Security Conference, without man-in-the-middle sniffing traffic. This attack technology is c
Google Chrome same-Source Policy Bypass Vulnerability (CVE-2016-1711)Google Chrome same-Source Policy Bypass Vulnerability (CVE-2016-1711)
Release date:Updated on:Affected Systems:
Google Chrome
Description:
CVE (CAN) ID: CVE-2016-1711Google Chrome is a Web browser tool developed by Google.Google Chrome *>Suggestion:
Vendor patch:Google------The vendor has released a patch to fix this security pro
SSL/TLS LogJam mitm Security Restriction Bypass Vulnerability (CVE-2015-4000)SSL/TLS LogJam mitm Security Restriction Bypass Vulnerability (CVE-2015-4000)
Release date:Updated on:Affected Systems:
OpenSSL Project OpenSSL OpenSSL Project OpenSSL
Description:
Bugtraq id: 74733CVE (CAN) ID: CVE-2015-4000TLS is a secure transport layer protocol used to provide confidentiality and data integrity between two co
Oracle MySQL SSL certificate verification Security Restriction Bypass Vulnerability (CVE-2015-3152)Oracle MySQL SSL certificate verification Security Restriction Bypass Vulnerability (CVE-2015-3152)
Release date:Updated on:Affected Systems:
Oracle MySQL Server
Description:
Bugtraq id: 74398CVE (CAN) ID: CVE-2015-3152Oracle MySQL Server is a lightweight relational database system.Oracle MySQL Server *
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.