security vulnerability database

Learn about security vulnerability database, we have the largest and most updated security vulnerability database information on alibabacloud.com

Ruby on Rails 'create _ with () 'Function Security Restriction Bypass Vulnerability

Ruby on Rails 'create _ with () 'Function Security Restriction Bypass Vulnerability Release date: Updated on: Affected Systems: Ruby on Rails Description: Bugtraq id: 69265 CVE (CAN) ID: CVE-2014-3514 Ruby on Rails (RoR or Rails) is an open-source Web application framework written in Ruby. It is developed in strict accordance with the MVC structure. Ruby on Rails has a

OpenStack Keystone domain-range token revocation failure Security Restriction Bypass Vulnerability

OpenStack Keystone domain-range token revocation failure Security Restriction Bypass Vulnerability Release date:Updated on: Affected Systems:Openstack KeystoneDescription:--------------------------------------------------------------------------------Bugtraq id: 69051OpenStack Keystone is a project that provides identity, Token, directory, and policy services for the OpenStack series.Keystone has a

SystemTap "staprun" Privilege Escalation Security Vulnerability

SystemTap "staprun" Privilege Escalation Security Vulnerability Release date:Updated on: Affected Systems:SystemTap 1.xDescription:--------------------------------------------------------------------------------Cve id: CVE-2011-2502 QEMU is an open source simulator software. Qemu kvm has the Local Security Restriction Bypass

Ruby "Exception # to_s" method bypasses the Security Restriction Vulnerability

Release date:Updated on: Affected Systems:Yukihiro Matsumoto Ruby 1.8.xUnaffected system:Yukihiro Matsumoto Ruby 1.8.7-Description:--------------------------------------------------------------------------------Bugtraq id: 46458 Ruby is a powerful object-oriented scripting language. The Ruby "Exception # to_s" method has a Security Restriction Bypass Vulnerability. Remote attackers can exploit this

"Exposure" Apple App Store over thousands iOS app storage security vulnerability

application before submitting an Apple App Store review," said Josh Goldfarb, FireEye's emerging technology leader. Once approved, it will formally enter the Apple App Store, which can send illegal malicious instructions to the device. ”As for how to circumvent the risk of jspatch, Goldsmith says: "My advice is very standard: Download only the apps you need, and you know, you trust." Beware of apps that ask you for permission to access. Remember to provide access only to those apps that you thi

XML Security Library "xslt. c" Arbitrary File Access Vulnerability

Release date:Updated on: Affected Systems:Debian Linux 5.0 xMandrakeSoft Linux Mandrake 2010.0 x86_64MandrakeSoft Linux Mandrake 2009.0 x86-64MandrakeSoft Linux Mandrake 2009.0MandrakeSoft Linux Mandrake 10.0Aleksey Sanin XML Security Library 1.2.16Unaffected system:Aleksey Sanin XML Security Library 1.2.17Description:--------------------------------------------------------------------------------Bugtraq i

IBM Rational Automation Framework Web UI Security Bypass Vulnerability

IBM Rational Automation Framework Web UI Security Bypass Vulnerability Release date:Updated on: Affected Systems:IBM Rational Automation Framework 3.xDescription:--------------------------------------------------------------------------------Bugtraq id: 57008CVE (CAN) ID: CVE-2012-4816 The IBM Rational Automation Framework automatically performs middleware environment building, middleware management, and de

PostgreSQL Security Restriction Bypass Vulnerability (CVE-2014-0060)

Release date:Updated on: Affected Systems:PostgreSQL 8.xDescription:--------------------------------------------------------------------------------Bugtraq id: 65723CVE (CAN) ID: CVE-2014-0060 PostgreSQL is an advanced object-relational database management system that supports extended SQL standard subsets. PostgreSQL 9.3.3, 9.2.7, 9.1.12, 9.0.16, and earlier than 8.4.20 have security vulnerabilities...

Website Vulnerability--the security risk of File judging function (actual combat article)

PHP is a common open-source scripting language with C as the underlying language, supports almost all popular databases and operating systems, and is much more efficient than CGI, which is fully generated HTML markup, and is primarily suitable for web development. The most important thing is that PHP can be used in C, C + + program extension! All the file operation functions are sensitive functions, when such functions are used improperly or unsafe references, it will lead to problems i

Cisco IOS Software Security Restriction Bypass Vulnerability (CVE-2015-0610)

Cisco IOS Software Security Restriction Bypass Vulnerability (CVE-2015-0610) Release date:Updated on: Affected Systems:Cisco IOSDescription:Bugtraq id: 72565CVE (CAN) ID: CVE-2015-0610 Cisco IOS is an interconnected network operating system used on most Cisco system routers and network switches. Cisco IOS has a security v

Security experience: Be careful when the Uniform Resource Identifier vulnerability is exploited

vulnerability exploitation program ." Using protocol processing programs and using the legitimate features of popular software, the two researchers claimed they had found a way to steal data from the victim's computer, you can also upload the data to a remote server. The exploitation of this URI Vulnerability will launch a new round of problems for developers and users. Developers need to evaluate whether

Mozilla Firefox content security policy sensitive information leakage Vulnerability

Release date:Last Updated:Hazard level:Vulnerability Type: Information LeakageThreat Type: Vulnerability introduction: Mozilla Firefox is a free, open-source browser applicable to Windows, Linux, and MacOS X platforms. Content Security Policy (CSP) in Mozilla Firefox 4.x to 5 does not allow you to move proxy authentication certificates from the listed request headers. Attackers can obtain sensitive infor

Siemens Ruggedcom WIN product Remote Security Restriction Bypass Vulnerability (CVE-2015-1448)

Siemens Ruggedcom WIN product Remote Security Restriction Bypass Vulnerability (CVE-2015-1448) Release date:Updated on: Affected Systems:Siemens Ruggedcom WIN 72xxSiemens Ruggedcom WIN 70xxSiemens Ruggedcom WIN 52xxSiemens Ruggedcom WIN 51xxDescription:Bugtraq id: 72521CVE (CAN) ID: CVE-2015-1448 Siemens Ruggedcom WIN is an efficient and broadband wireless base station User device that complies with IEEE 80

QEMU 'cirrus _ vga. c' Security Bypass Vulnerability

QEMU 'cirrus _ vga. c' Security Bypass Vulnerability Release date: 2014-4 4Updated on: 2014-6 6 Affected Systems:QEMUDescription:Bugtraq id: 71477CVE (CAN) ID: CVE-2014-8106 QEMU is an open source simulator software. QEMU has an invalid Cirrus blit region check vulnerability. Attackers can exploit this vulnerability

GitLab is not affected by Rails Security Vulnerability CVE-2014-3483

GitLab is not affected by Rails Security Vulnerability CVE-2014-3483 Yesterday, the Rails framework released a recommendation on SQL injection security: security advisory for SQL injection vulnerability CVE-2014-3483. GitLab officially tested and published a message saying:

Linux Kernel local security function Bypass Vulnerability (CVE-2014-5206)

Linux Kernel local security function Bypass Vulnerability (CVE-2014-5206) Release date:Updated on: Affected Systems:Linux kernelDescription:--------------------------------------------------------------------------------Bugtraq id: 69214CVE (CAN) ID: CVE-2014-5206Linux Kernel is the Kernel of the Linux operating system.Linux kernel has the Security Restriction By

Linux Kernel local security function Bypass Vulnerability (CVE-2014-5207)

Linux Kernel local security function Bypass Vulnerability (CVE-2014-5207) Release date:Updated on: Affected Systems:Linux kernelDescription:--------------------------------------------------------------------------------Bugtraq id: 69216CVE (CAN) ID: CVE-2014-5207Linux Kernel is the Kernel of the Linux operating system.Linux kernel has the Security Restriction By

Apache Cordova For Android Security Restriction Bypass Vulnerability (CVE-2014-3500)

Apache Cordova For Android Security Restriction Bypass Vulnerability (CVE-2014-3500) Release date:Updated on: Affected Systems:Apache Group Cordova Description:--------------------------------------------------------------------------------Bugtraq id: 69038CVE (CAN) ID: CVE-2014-3500Apache Cordova is a platform for building local mobile applications using HTML, CSS, and JavaScript.Android applications built

HP NonStop NetBatch Security Vulnerability (CVE-2014-2627)

HP NonStop NetBatch Security Vulnerability (CVE-2014-2627) Release date:Updated on: Affected Systems:HP NonStop NetBatch J06-J06.17.01HP NonStop NetBatch H06-H06.28HP NonStop NetBatch limit 6.14-limit 6.32.01Description:--------------------------------------------------------------------------------Bugtraq id: 69006CVE (CAN) ID: CVE-2014-2627HP NonStop NetBatch is a batch Task Scheduler.HP NonStop NetBatc

PHP Vulnerability Full solution (a) the security of the PHP website

This article mainly describes the common attack methods for PHP websites, including common SQL injection, cross-site attack types. Several important parameter settings of PHP are also introduced. The following series of articles will stand in the attacker's perspective, revealing PHP security issues for you, while providing a corresponding solution.The following are the main types of attacks for PHP websites:1. Order Injection (Command injection)2. Ev

Total Pages: 15 1 .... 10 11 12 13 14 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.