Release date:Updated on:
Affected Systems:Dotclear Description:--------------------------------------------------------------------------------Bugtraq id: 67560CVE (CAN) ID: CVE-2014-3781DotClear is a Blog system based on PHP and MySQL.Dotclear 2.6.2 and earlier versions have the Authentication Bypass Vulnerability. Attackers can exploit this vulnerability to bypass the authentication mechanism and perform
Release date:Updated on:
Affected Systems:Openstack KeystoneDescription:--------------------------------------------------------------------------------Bugtraq id: 55524Cve id: CVE-2012-4413
OpenStack Keystone is a project that provides identity, Token, directory, and policy services for the OpenStack series.
Keystone has a security restriction bypass vulnerability, which allows authenticated attackers to bypas
Release date:Updated on:
Affected Systems:McAfee Application ControlDescription:--------------------------------------------------------------------------------Bugtraq id: 55558
McAfee Application Control helps enterprises efficiently prevent unauthorized applications from running on servers and terminals.
McAfee Application Control has a security restriction bypass vulnerability that allows automatic file operation. Attackers can exploit this vuln
Release date: 2012-08-02Updated on:
Affected Systems:Opera Software Opera Web Browser 12.xOpera Software Opera Web Browser 11.xDescription:--------------------------------------------------------------------------------Bugtraq id: 54788
Opera is a browser from Norway.
The security restriction bypass vulnerability exists in Opera Web Browser 12.01 and earlier versions. Attackers can exploit this vulnerability to by
Release date:Updated on:
Affected Systems:Siemens COMOSDescription:--------------------------------------------------------------------------------Bugtraq id: 54978Cve id: CVE-2012-3009
Siemens COMOS is a world-leading software solution provider in the integrated lifecycle engineering field.
Siemens COMOS has a security restriction bypass vulnerability with unknown details. Attackers can exploit this vulnerability to
Release date:Updated on:
Affected Systems:Apache Group CXFDescription:--------------------------------------------------------------------------------Bugtraq id: 53880CVE (CAN) ID: CVE-2012-2378
Apache CXF is an open-source service framework used to compile and develop services using front-end programming APIs such as JAX-WS and JAX-RS.
Apache CXF has a Security Restriction Bypass Vulnerability. Attackers can exploit this vulnerability to
Release date:Updated on:
Affected Systems:RedHat JBoss EAP 5.1.2RedHat Red Hat JBoss Enterprise Web Platform 5.1.2Description:--------------------------------------------------------------------------------Bugtraq id: 54089Cve id: CVE-2012-1154
JBoss Enterprise Application Platform (EAP) is a middleware Platform for J2EE applications.
Red Hat JBoss Enterprise Application Platform 5.1.2 has a remote Security Restriction Bypass Vulnerability. Attacke
Release date:Updated on:
Affected Systems:Symantec Web Gateway 5.0.3Symantec Web Gateway 5.0.1Description:--------------------------------------------------------------------------------Bugtraq id: 54429Cve id: CVE-2012-2957
Symantec Web Gateway is a Symantec Enterprise Web threat protection solution.
Symantec Web Gateway 5.0.x.x has a local Authentication Bypass Vulnerability. Successful exploitation allows local attackers to process some local fi
Release date: 2011-11-09Updated on: 2011-11-16
Affected Systems:Adobe Flash Player 9.xAdobe Flash Player 10.xAdobe AIR 3.xUnaffected system:Adobe Flash Player for Android 11.1.102.59Adobe Flash Player 11.1.102.55Adobe AIR 3.1.0.4880Description:--------------------------------------------------------------------------------Bugtraq id: 50629Cve id: CVE-2011-2458
Adobe Flash Player is an integrated multimedia Player.
Adobe Flash Player has a Security Restriction
Release date: 2011-12-15Updated on: 2011-12-19
Affected Systems:Websense Web Security Gateway Anywhere 7.6Websense Web Filter 7.6Web Security 7.6Description:--------------------------------------------------------------------------------Bugtraq id: 51087
Websense Tron is a content security solution.
Websense Tron has an Authentication Bypass Vulnerability. Attackers can exploit this vulnerability to bypass
Release date:Updated on:
Affected Systems:Apache Group Tomcat 7.xApache Group Tomcat 6.xUnaffected system:Apache Group Tomcat 7.0.23Apache Group Tomcat 6.0.35Description:--------------------------------------------------------------------------------Bugtraq id: 51442Cve id: CVE-2011-3375
Apache Tomcat is a popular open source JSP application server program.
Apache Tomcat has a Security Restriction Bypass Vulnerability. After successful exploitation
Apache Struts CSRF Bypass Vulnerability (CVE-2014-7809)
Release date:Updated on:
Affected Systems:Apache Group Struts 2.0.0-2.3.20Description:CVE (CAN) ID: CVE-2014-7809
Struts is an open source architecture used to build Web applications.
The token value generated by Apache Struts 2.0.0-2.3.20 can be predicted, which allows remote attackers to bypass the CSRF protection mechanism.
Link: http://www.sec
IBM WebSphere DataPower XC10 Security Restriction Bypass Vulnerability
Release date:Updated on:
Affected Systems:IBM WebSphere DataPower XC10 2.5IBM WebSphere DataPower XC10 2.1Description:CVE (CAN) ID: CVE-2014-6138
XC10 is a combination of the powerful WebSphere DataPower hardware platform and advanced IBM distributed cache technology.
IBM WebSphere DataPower XC10 devices 2.1 and 2.5 have security vulnerabilities. authenticated remote users can
Interior Design For Android SSL certificate verification Security Bypass Vulnerability
Release date:Updated on:
Affected Systems:Interior Design For AndroidDescription:Bugtraq id: 70674CVE (CAN) ID: CVE-2014-7618
Interior Design for Android Interior Design Android applications.
Interior Design 1.0 and other versions do not correctly verify the X.509 Certificate of the SSL server. The security restriction bypas
How to bypass the remote lock function of IOS8
The remote lock function of IOS helps users remotely lock their lost Apple devices, so that thieves or the person who finds the device cannot access the content of the device.
However, a security researcher recently posted a video on his blog that bypasses the IOS8 remote lock. According to his introduction, the User-Defined DNS is used on the Interface connected to wifi, and some bugs can be used to ac
Touch screen Newspaper Reading System V4.0 Sandbox Bypass
Terminal Sandbox Bypass
For the patch of 2010-046745, ie cannot be displayed at the place where the payment is made.Find a place with a text box, click it first, and then click another text box to jump out of the sandbox.
The latest version of V4 is released:
Find a webpage (here, you can find a place with built-in messages or registration, f
Cisco IOS Software Security Restriction Bypass Vulnerability (CVE-2015-0610)
Release date:Updated on:
Affected Systems:Cisco IOSDescription:Bugtraq id: 72565CVE (CAN) ID: CVE-2015-0610
Cisco IOS is an interconnected network operating system used on most Cisco system routers and network switches.
Cisco IOS has a security vulnerability in the access control list of an object group. unauthenticated remote attackers can exploit this vulnerability to
NTP 'ntp _ io. c' authentication Security Restriction Bypass Vulnerability
Release date:Updated on:
Affected Systems:NTP NTPd Description:Bugtraq id: 72584CVE (CAN) ID: CVE-2014-9298
Network Time Protocol (NTP) is a Protocol used to synchronize computer Time. It can synchronize computers with their servers or clock sources (such as quartzels and GPS.
Ntpd 4.2.7 and earlier versions have multiple vulnerabilities. ntp-keygen earlier than version 4.2.7p2
BusyBox Local Security Restriction Bypass Vulnerability (CVE-2014-9645)
Release date:Updated on:
Affected Systems:BusyBoxDescription:Bugtraq id: 72324CVE (CAN) ID: CVE-2014-9645
BusyBox is an executable implementation of many standard Linux tools.
BusyBox has a local security restriction bypass vulnerability in the implementation of the basename module parameters. Attackers can exploit this vulnerabilit
CURL/libcURL Remote Security Restriction Bypass Vulnerability (CVE-2014-8150)
Release date:Updated on:
Affected Systems:CURL 6.0-7.39.0Unaffected system:CURL> = 7.40.0Description:Bugtraq id: 71964CVE (CAN) ID: CVE-2014-8150
CURL/libcURL is a command line FILE transmission tool that supports FTP, FTPS, HTTP, HTTPS, GOPHER, TELNET, DICT, FILE, and LDAP.
CURL/libcURL 6.0-7.39.0 has the URL request injection vulnerability in the implementation of pars
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.