security vulnerability database

Learn about security vulnerability database, we have the largest and most updated security vulnerability database information on alibabacloud.com

SSL/TLS LogJam mitm Security Restriction Bypass Vulnerability (CVE-2015-4000)

SSL/TLS LogJam mitm Security Restriction Bypass Vulnerability (CVE-2015-4000)SSL/TLS LogJam mitm Security Restriction Bypass Vulnerability (CVE-2015-4000) Release date:Updated on:Affected Systems: OpenSSL Project OpenSSL OpenSSL Project OpenSSL Description: Bugtraq id: 74733CVE (CAN) ID: CVE-2015-4000TLS is a secure

Apache Cordova iOS Security Restriction Bypass and resource loading Vulnerability (CVE-2015-5207)

Apache Cordova iOS Security Restriction Bypass and resource loading Vulnerability (CVE-2015-5207)Apache Cordova iOS Security Restriction Bypass and resource loading Vulnerability (CVE-2015-5207) Release date:Updated on:Affected Systems: Apache Group Cordova iOS Description: CVE (CAN) ID: CVE-2015-5207Apache Cord

Upload vulnerability to Popular science [1]-file Upload form is a major threat to web security

whitelist list. (Only mime-type in this list are allowed) Generates a random file name, plus the file extension previously generated, Do not rely solely on client-side validation, which is not enough. Ideally, both client and server-side validation are available. Summary As mentioned above, malicious users have many means to bypass File upload form security verification. Therefore, when implementing a file upload form in a Web application, you should

Cisco IOS authorization Security Restriction Bypass Vulnerability

Release date:Updated on: Affected Systems:Cisco IOS 15.xCisco ios xe 3.xUnaffected system:Cisco IOS 15.1 SGCisco IOS 15.0SACisco ios xe 3.6.0SCisco ios xe 3.2.xSGDescription:--------------------------------------------------------------------------------Bugtraq id: 52755Cve id: CVE-2012-0384 Cisco's Internet Operating System (IOS) is a complex operating system optimized for Internet connection. When Cisco IOS software uses AAA authorization, there is a secur

Linux Kernel verifies the Local Security Restriction Bypass Vulnerability of the "map_count" variable

Release date:Updated on: Affected Systems:Linux kernel 2.6.xDescription:--------------------------------------------------------------------------------Bugtraq id: 46492Cve id: CVE-2011-1010 Linux Kernel is the Kernel used by open source Linux. Linux Kernel verifies that the "map_count" variable has a local security restriction bypass vulnerability. Attackers can exploit this

CURL/libcURL NTLM connection Remote Security Restriction Bypass Vulnerability (CVE-2015-3143)

CURL/libcURL NTLM connection Remote Security Restriction Bypass Vulnerability (CVE-2015-3143)CURL/libcURL NTLM connection Remote Security Restriction Bypass Vulnerability (CVE-2015-3143) Release date:Updated on:Affected Systems: CURL 7.10.6-7.41.0 Description: Bugtraq id: 74299CVE (CAN) ID: CVE-2015-3143CURL/libc

Asterisk 'externalivr' application Shell Command Execution Security Restriction Bypass Vulnerability

Asterisk 'externalivr' application Shell Command Execution Security Restriction Bypass Vulnerability Release date:Updated on: Affected Systems:Asterisk Business Edition C. x. xDescription:--------------------------------------------------------------------------------Bugtraq id: 55351Cve id: CVE-2012-2186 Asterisk is a free and open-source software that enables the Telephone User Switch (PBX) function.

Mb_ereg (I) _ replace () code injection vulnerability and its extended regular application security problems

Author: ryat # wolvez.orgTeam: http://www.80vul.comDate: 2009-04-30 Description Mb_ereg_replace () is a function that supports multi-byte Regular Expression replacement. The function prototype is as follows: String mb_ereg_replace (string $ pattern, string $ replacement, string $ string [, string $ option = "msr"]) When the option parameter of mb_ereg (I) _ replace () is set to e, the replacement parameter [after proper reverse reference replacement] will be executed as the php code, however, ph

Apache Ranger Security Restriction Bypass Vulnerability (CVE-2016-0735)

Apache Ranger Security Restriction Bypass Vulnerability (CVE-2016-0735)Apache Ranger Security Restriction Bypass Vulnerability (CVE-2016-0735) Release date:Updated on:Affected Systems: Apache Group Ranger 0.5.x Description: CVE (CAN) ID: CVE-2016-0735Ranger is a comprehensive data

OpenStack Neutron Security Restriction Bypass Vulnerability (CVE-2015-5240)

OpenStack Neutron Security Restriction Bypass Vulnerability (CVE-2015-5240)OpenStack Neutron Security Restriction Bypass Vulnerability (CVE-2015-5240) Release date:Updated on:Affected Systems: openstack Neutron openstack Neutron 2015.1-2015.1.2 Description: CVE (CAN) ID: CVE-2015-5240OpenStack Neutron is a network-as-

Norman Security Suite Local Privilege Escalation Vulnerability (CVE-2014-0816)

Release date:Updated on: Affected Systems:Norman Security Suite 8Description:--------------------------------------------------------------------------------Bugtraq id: 65806CVE (CAN) ID: CVE-2014-0816 Norman Security Suites are anti-virus software. The Norman Security Suite 10.1 and earlier versions have the local privilege escalation

PHP "crypt ()" MD5 Salt Security Vulnerability

Release date:Updated on: Affected Systems:PHP 5.3.xDescription:--------------------------------------------------------------------------------PHP is a popular scripting environment. PHP has a security vulnerability in the implementation of the "crypt ()" function. Remote attackers can exploit this vulnerability to bypass certain

IBM Rational Build Forge Security Settings Information Leakage Vulnerability

Release date:Updated on: Affected Systems:IBM Rational Build Forge 7.xDescription:--------------------------------------------------------------------------------IBM Rational Build Forge is an automated process execution software that helps customers Build, test, and release automated software. It is also a continuous Integration Server. IBM Rational Build Forge has a vulnerability in security settings. M

BusyBox Local Security Restriction Bypass Vulnerability (CVE-2014-9645)

BusyBox Local Security Restriction Bypass Vulnerability (CVE-2014-9645) Release date:Updated on: Affected Systems:BusyBoxDescription:Bugtraq id: 72324CVE (CAN) ID: CVE-2014-9645 BusyBox is an executable implementation of many standard Linux tools. BusyBox has a local security restriction bypass vulnerability in the

CURL/libcURL Remote Security Restriction Bypass Vulnerability (CVE-2014-8150)

CURL/libcURL Remote Security Restriction Bypass Vulnerability (CVE-2014-8150) Release date:Updated on: Affected Systems:CURL 6.0-7.39.0Unaffected system:CURL> = 7.40.0Description:Bugtraq id: 71964CVE (CAN) ID: CVE-2014-8150 CURL/libcURL is a command line FILE transmission tool that supports FTP, FTPS, HTTP, HTTPS, GOPHER, TELNET, DICT, FILE, and LDAP. CURL/libcURL 6.0-7.39.0 has the URL request injectio

OpenSSL man-in-the-middle Security Restriction Bypass Vulnerability

OpenSSL man-in-the-middle Security Restriction Bypass Vulnerability Release date:Updated on: Affected Systems:OpenSSL Project OpenSSL OpenSSL Project OpenSSL 1.0.1-1.0.1kOpenSSL Project OpenSSL 1.0.0-1.0.0pDescription:Bugtraq id: 71936CVE (CAN) ID: CVE-2015-0204 OpenSSL is an open-source SSL implementation that implements high-strength encryption for network communication. It is widely used in various ne

2018-2019-1 20165320 "The foundation of Information security system Design" buffer Overflow vulnerability experiment

exploit.c file to compile.6. Running the programAfter the address protection mechanism has been modified, the run is unsuccessful and the segment error is displayed. Experimental HarvestFeel according to the steps of the experiment step by step, really can get the corresponding results, but the whole experiment is a walk a process, or do not understand the relevant memory overflow of the specific process, as well as the relevant attack ideas, their level or not standards, there is a long way

Linux glibc security vulnerability cve-2015-7547 Repair and detection method

[TCP] Request1 Len Recv 44[UDP] Total Data Len Recv 44[UDP] Total Data Len Recv 44Connected with 127.0.0.1:34044[TCP] Total Data Len Recv 46[TCP] Request1 Len Recv 44[UDP] Total Data Len Recv 44[UDP] Total Data Len Recv 44Connected with 127.0.0.1:34045[TCP] Total Data Len Recv 46[TCP] Request1 Len Recv 44[UDP] Total Data Len Recv 44[UDP] Total Data Len Recv 44Connected with 127.0.0.1:34046[TCP] Total Data Len Recv 46[TCP] Request1 Len Recv 44[UDP] Total Data Len Recv 36[UDP] Total Data Len Recv

Adobe Flash Player and AIR Security Restriction Bypass Vulnerability (CVE-2014-0535)

Adobe Flash Player and AIR Security Restriction Bypass Vulnerability (CVE-2014-0535) Release date:Updated on: Affected Systems:Adobe Flash Player 13.xAdobe AIR 13.xDescription:--------------------------------------------------------------------------------Bugtraq id: 67970CVE (CAN) ID: CVE-2014-0535Adobe Flash Player is an integrated multimedia Player. Adobe AIR is a technology developed based on the combin

Unbound Security Restriction Bypass Vulnerability (CVE-2017-15105)

Unbound Security Restriction Bypass Vulnerability (CVE-2017-15105)Unbound Security Restriction Bypass Vulnerability (CVE-2017-15105) Release date:Updated on:Affected Systems: Unbound Description: Bugtraq id: 102817CVE (CAN) ID: CVE-2017-15105Unbound is a recursive and cached DNS parser.Unbound 1.6.8 and earlier

Total Pages: 15 1 .... 11 12 13 14 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.