Release date:Updated on:
Affected Systems:RedHat JBoss EAP 5.1.2RedHat Red Hat JBoss Enterprise Web Platform 5.1.2Description:--------------------------------------------------------------------------------Bugtraq id: 54089Cve id: CVE-2012-1154
JBoss Enterprise Application Platform (EAP) is a middleware Platform for J2EE applications.
Red Hat JBoss Enterprise Application Platform 5.1.2 has a remote Security Restriction Bypass Vulnerability. Attacke
Release date:Updated on:
Affected Systems:Symantec Web Gateway 5.0.3Symantec Web Gateway 5.0.1Description:--------------------------------------------------------------------------------Bugtraq id: 54429Cve id: CVE-2012-2957
Symantec Web Gateway is a Symantec Enterprise Web threat protection solution.
Symantec Web Gateway 5.0.x.x has a local Authentication Bypass Vulnerability. Successful exploitation allows local attackers to process some local fi
Release date: 2011-11-09Updated on: 2011-11-16
Affected Systems:Adobe Flash Player 9.xAdobe Flash Player 10.xAdobe AIR 3.xUnaffected system:Adobe Flash Player for Android 11.1.102.59Adobe Flash Player 11.1.102.55Adobe AIR 3.1.0.4880Description:--------------------------------------------------------------------------------Bugtraq id: 50629Cve id: CVE-2011-2458
Adobe Flash Player is an integrated multimedia Player.
Adobe Flash Player has a Security Restriction
Release date: 2011-12-15Updated on: 2011-12-19
Affected Systems:Websense Web Security Gateway Anywhere 7.6Websense Web Filter 7.6Web Security 7.6Description:--------------------------------------------------------------------------------Bugtraq id: 51087
Websense Tron is a content security solution.
Websense Tron has an Authentication Bypass Vulnerability. Attackers can exploit this vulnerability to bypass
Release date:Updated on:
Affected Systems:Apache Group Tomcat 7.xApache Group Tomcat 6.xUnaffected system:Apache Group Tomcat 7.0.23Apache Group Tomcat 6.0.35Description:--------------------------------------------------------------------------------Bugtraq id: 51442Cve id: CVE-2011-3375
Apache Tomcat is a popular open source JSP application server program.
Apache Tomcat has a Security Restriction Bypass Vulnerability. After successful exploitation
Apache Struts CSRF Bypass Vulnerability (CVE-2014-7809)
Release date:Updated on:
Affected Systems:Apache Group Struts 2.0.0-2.3.20Description:CVE (CAN) ID: CVE-2014-7809
Struts is an open source architecture used to build Web applications.
The token value generated by Apache Struts 2.0.0-2.3.20 can be predicted, which allows remote attackers to bypass the CSRF protection mechanism.
Link: http://www.sec
IBM WebSphere DataPower XC10 Security Restriction Bypass Vulnerability
Release date:Updated on:
Affected Systems:IBM WebSphere DataPower XC10 2.5IBM WebSphere DataPower XC10 2.1Description:CVE (CAN) ID: CVE-2014-6138
XC10 is a combination of the powerful WebSphere DataPower hardware platform and advanced IBM distributed cache technology.
IBM WebSphere DataPower XC10 devices 2.1 and 2.5 have security vulnerabilities. authenticated remote users can
Interior Design For Android SSL certificate verification Security Bypass Vulnerability
Release date:Updated on:
Affected Systems:Interior Design For AndroidDescription:Bugtraq id: 70674CVE (CAN) ID: CVE-2014-7618
Interior Design for Android Interior Design Android applications.
Interior Design 1.0 and other versions do not correctly verify the X.509 Certificate of the SSL server. The security restriction bypas
How to bypass the remote lock function of IOS8
The remote lock function of IOS helps users remotely lock their lost Apple devices, so that thieves or the person who finds the device cannot access the content of the device.
However, a security researcher recently posted a video on his blog that bypasses the IOS8 remote lock. According to his introduction, the User-Defined DNS is used on the Interface connected to wifi, and some bugs can be used to ac
Touch screen Newspaper Reading System V4.0 Sandbox Bypass
Terminal Sandbox Bypass
For the patch of 2010-046745, ie cannot be displayed at the place where the payment is made.Find a place with a text box, click it first, and then click another text box to jump out of the sandbox.
The latest version of V4 is released:
Find a webpage (here, you can find a place with built-in messages or registration, f
Cisco IOS Software Security Restriction Bypass Vulnerability (CVE-2015-0610)
Release date:Updated on:
Affected Systems:Cisco IOSDescription:Bugtraq id: 72565CVE (CAN) ID: CVE-2015-0610
Cisco IOS is an interconnected network operating system used on most Cisco system routers and network switches.
Cisco IOS has a security vulnerability in the access control list of an object group. unauthenticated remote attackers can exploit this vulnerability to
NTP 'ntp _ io. c' authentication Security Restriction Bypass Vulnerability
Release date:Updated on:
Affected Systems:NTP NTPd Description:Bugtraq id: 72584CVE (CAN) ID: CVE-2014-9298
Network Time Protocol (NTP) is a Protocol used to synchronize computer Time. It can synchronize computers with their servers or clock sources (such as quartzels and GPS.
Ntpd 4.2.7 and earlier versions have multiple vulnerabilities. ntp-keygen earlier than version 4.2.7p2
BusyBox Local Security Restriction Bypass Vulnerability (CVE-2014-9645)
Release date:Updated on:
Affected Systems:BusyBoxDescription:Bugtraq id: 72324CVE (CAN) ID: CVE-2014-9645
BusyBox is an executable implementation of many standard Linux tools.
BusyBox has a local security restriction bypass vulnerability in the implementation of the basename module parameters. Attackers can exploit this vulnerabilit
CURL/libcURL Remote Security Restriction Bypass Vulnerability (CVE-2014-8150)
Release date:Updated on:
Affected Systems:CURL 6.0-7.39.0Unaffected system:CURL> = 7.40.0Description:Bugtraq id: 71964CVE (CAN) ID: CVE-2014-8150
CURL/libcURL is a command line FILE transmission tool that supports FTP, FTPS, HTTP, HTTPS, GOPHER, TELNET, DICT, FILE, and LDAP.
CURL/libcURL 6.0-7.39.0 has the URL request injection vulnerability in the implementation of pars
Adobe Reader and Acrobat Security Bypass Vulnerability (CVE-2014-0568)
Release date:Updated on:
Affected Systems:Adobe Reader 11.xAdobe Reader 10.xDescription:Bugtraq id: 69828CVE (CAN) ID: CVE-2014-0568
Adobe Reader (also known as Acrobat Reader) is an excellent PDF document reading software developed by Adobe. Acrobat is a series of products launched in 1993 for enterprises, technicians and creative professionals, making smart document delivery and
Lbe can bypass anti-theft calls
After the lbe mobile phone is locked for theft, you can bypass the anti-theft interface to answer the call.After the mobile phone is locked for theft, it is normal that the incoming call will ring, but the phone cannot be answered because it is covered by the anti-theft interface.
However, after plugging in the headset, you can use the headset's line control to answer the c
Linux kernel prepend_path Function Security Restriction Bypass Vulnerability (CVE-2015-2925)Linux kernel prepend_path Function Security Restriction Bypass Vulnerability (CVE-2015-2925)
Release date:Updated on:Affected Systems:
Linux kernel 〈 4.2.4
Description:
CVE (CAN) ID: CVE-2015-2925Linux Kernel is the Kernel of the Linux operating system.In versions earlier than Linux kernel 4.2.4, The prepend_path fu
Researchers use bypass attacks to steal encrypted information
The attacks against SSL/TLS discovered in the past few years usually require attackers to be in the middle, that is, requiring them to sniff or manipulate traffic. Two security researchers reported a new method of combined bypass attacks at the Black Hat Security Conference, without man-in-the-middle sniffing traffic. This attack technology is c
Google Chrome same-Source Policy Bypass Vulnerability (CVE-2016-1711)Google Chrome same-Source Policy Bypass Vulnerability (CVE-2016-1711)
Release date:Updated on:Affected Systems:
Google Chrome
Description:
CVE (CAN) ID: CVE-2016-1711Google Chrome is a Web browser tool developed by Google.Google Chrome *>Suggestion:
Vendor patch:Google------The vendor has released a patch to fix this security pro
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.