Application Server 1.0.2.2.2Oracle Oracle9i Application Server 1.0.2.2Oracle Oracle9i Application Server 1.0.2.1sOracle Oracle9i Application Server 1.0.2Oracle HTTP Server 9.2.0Oracle HTTP Server 9.1Oracle HTTP Server 9.0.3.1Oracle HTTP Server 9.0.2.3Oracle HTTP Server 9.0.2.3Oracle HTTP Server 9.0.2Oracle HTTP Server 9.0.1Oracle HTTP Server 8.1.7Oracle HTTP Server 1.0.2.2 Roll up 2Oracle HTTP Server 1.0.2.2Oracle HTTP Server 1.0.2.1Oracle HTTP Server 1.0.2.0Description:------------------------
Python CGIHTTPServer "is_cgi ()" Security Restriction Bypass Vulnerability
Release date:Updated on:
Affected Systems:Python python 3.xPython python 2.7.xDescription:--------------------------------------------------------------------------------CVE (CAN) ID: CVE-2014-4650Python is an object-oriented, literal translation computer programming language. The CGIHTTPServer module can be used to set simple HTTP servers.Python 2.7.3 processes the "is_cgi ()"
Release date: 2011-08-02Updated on: 2011-08-02
Affected Systems:Android Open Handset Alliance Android 3.xDescription:--------------------------------------------------------------------------------Cve id: CVE-2011-2357
Android is a project launched by Google through Open Handset Alliance. It is used to provide a complete set of software for mobile devices, including operating systems and middleware.
Android browsers have security problems in implementing sandbox verification. Remote attackers
Release date: 2011-10-20Updated on: 2011-10-20
Affected Systems:Cisco Show and Share 5.2 (2)Cisco Show and Share 5.2 (1)Cisco Show and Share 5 (2)Unaffected system:Cisco Show and Share 5.2 (2.1)Description:--------------------------------------------------------------------------------Cve id: CVE-2011-2584
Cisco Show and Share is a network broadcast and video sharing application that allows you to create secure video communications, optimize global video collaboration, and personalize connection
FreeBSD setusercontext () function bypass security restriction Vulnerability
Release date: 2010-08-18Updated on: 2010-08-19
Affected Systems:FreeBSD 8.0FreeBSD 7.2Description:--------------------------------------------------------------------------------Bugtraq id: 42533
FreeBSD is an open-source Unix system that runs on the Intel Platform and can be freely used.
The setusercontext () function in the lib/libutil/login_class.c file is used to apply sp
Release date:Updated on:
Affected Systems:Subversion 1.6.0-1.6.12Subversion 1.5.0-1.5.7Description:--------------------------------------------------------------------------------Subversion is an open-source multi-user version control system that supports non-ASCII text and binary data.
Subversion's WebDAV module (mod_dav_svn) has a vulnerability. Users may exploit this vulnerability to bypass security restrictions to access certain protected resour
Release date:Updated on: 2011-03-22
Affected Systems:IBM Lotus Domino 8.xIBM Lotus Domino 7.xIBM Lotus Domino 6.xDescription:--------------------------------------------------------------------------------Bugtraq id: 46985
Lotus Domino is an email and cluster platform that integrates email, document database, Rapid Application Development Technology, and Web technology.
The remote console verification bypass vulnerability exists in the implementation
Release date:Updated on:
Affected Systems:Hitachi JP1/File Transmission Server/FTPDescription:--------------------------------------------------------------------------------JP1/File Transmission Server/FTP is an FTP-based File transfer Server designed by Hitachi.
Hitachi JP1/File Transmission Server/FTP does not properly restrict access to directories, which can bypass security restrictions and illegally access restricted directory information.
*>
Release date:Updated on:
Affected Systems:CURL 7.xDescription:--------------------------------------------------------------------------------Bugtraq id: 63776CVE (CAN) ID: CVE-2013-4545
CURL is a command line FILE transmission tool that supports FTP, FTPS, HTTP, HTTPS, GOPHER, TELNET, DICT, FILE, and LDAP.
CURL 7.18.0-7.32.0 does not properly verify the SSL certificate. Therefore, the security restriction bypass vulnerability exists. After success
Release date:Updated on:
Affected Systems:Linux kernel Description:--------------------------------------------------------------------------------Bugtraq id: 64471CVE (CAN) ID: CVE-2013-4270
Linux Kernel is the Kernel of the Linux operating system.
In the implementation of the net_ctl_permissions function in Linux kernel versions earlier than 3.11.5 in net/sysctl_net.c, the uid and gid values are not correctly determined, this allows local users to bypass
Release date:Updated on:
Affected Systems:Palo Alto Network PAN-OS 5.0.9Palo Alto Network PAN-OSDescription:--------------------------------------------------------------------------------Bugtraq id: 64627
PAN-OS is used to control the operating system of the new generation firewall of Palo Alto Networks. It provides a wide range of firewall, management, and network functions.
Palo Alto Networks PAN-OS 5.0.9 has multiple security vulnerabilities. After successful exploitation, attackers can
Release date:Updated on:
Affected Systems:StrongSwan Description:--------------------------------------------------------------------------------Bugtraq id: 66815CVE (CAN) ID: CVE-2014-2338StrongSwan is an IPsec-based open-source VPN solution for Linux.An error occurs when strongSwan 4.0.7-5.1.2 processes the key update after an unestablished IKEv2 SA is started. This can cause bypassing the target authentication mechanism and obtaining unauthorized access permissions. Only active startup or re
Release date:Updated on: 2014-06-04
Affected Systems:TYPO3 TYPO3 Description:--------------------------------------------------------------------------------CVE (CAN) ID: CVE-2014-3944Typo3 is an open-source Content Management System (CMS) and Content Management Framework (CMF ).The Authentication component of TYPO3 6.2.0-6.2.3 does not properly cancel user sessions that have timed out, which allows remote attackers to bypass Authentication.Link: htt
Release date:Updated on:
Affected Systems:OpenSSH Description:--------------------------------------------------------------------------------Bugtraq id: 66355CVE (CAN) ID: CVE-2014-2532OpenSSH is an open-source implementation of the SSH protocol.In versions earlier than OpenSSH 6.6, sshd does not correctly support wildcards on AcceptEnv in sshd_config. This allows remote attackers to bypass the target environment restrictions by using substrings bef
Release date:Updated on: 2012-09-06
Affected Systems:Ubuntu Linux 12.04 LTS i386Ubuntu Linux 12.04 LTS amd64Openstack KeystoneDescription:--------------------------------------------------------------------------------Bugtraq id: 54709Cve id: CVE-2012-3426
OpenStack Keystone is a project that provides identity, Token, directory, and policy services for the OpenStack series.
OpenStack Keystone versions earlier than January 1, failed to correctly execute token expiration. You can use the token
Release date:Updated on:
Affected Systems:RSA Security Authentication Agent for Microsoft Windows 7.xRSA Security Authentication Client 3.xDescription:--------------------------------------------------------------------------------Cve id: CVE-2012-2287
The RSA Authentication Agent is a software used to verify remote access requests.
The Authentication function in emc rsa Authentication Agent 7.1/RSA Authentication Client 3.5 (Windows XP and Windows Server 2003). Under specific configuration,
Release date: 2012-10-07Updated on: 2012-10-09
Affected Systems:Monkey HTTP Daemon 0.9.3-1Description:--------------------------------------------------------------------------------Cve id: CVE-2012-4442
Monkey HTTP Daemon is a Web server software that supports Linux.
Monkey HTTP Daemon 0.9.3 retains redundant group IDs for non-root valid UID operations. By checking the competition conditions in the File Permission, local users are allowed to bypass
Release date:Updated on:
Affected Systems:Samsung Galaxy S IIIDescription:--------------------------------------------------------------------------------Samsung Galaxy S is a smartphone of Samsung's Android system.
Samsung Galaxy s iii running Android v4.0.4 has a security vulnerability that can be exploited by malicious users to control the affected devices. Malware must be installed for successful exploitation.
1) when processing certain files, there is an error in the document browser, wh
. phpDrwxr-xr-x 2 www 512 Oct 20 tmplink127 # cat exploit# Passwd#Root: *: 0: 0: god:/root:/bin/csh..
Now "tmplink" is a directory. so link "exploit" will be ".../../etc/passwd". We don't \Need bypass open_basedir, it is a design mistake. PHP will allow \"Tmplink/.../etc/passwd" because./tmplink/.../etc/passwd really exists.
PoC:Http://cxsecurity.com/issue/WLB-2012030270
Remember. Don't use open_basedir as a main security feature.
Suggestion:---------
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.