Release date:Updated on: 2013-03-18
Affected Systems:Polycom HDX 9000Polycom HDX 8000Polycom HDX 7000Polycom HDX 6000Description:--------------------------------------------------------------------------------Bugtraq id: 58523Polycom HDX is a series of HD network cameras.
The Polycom HDX series has an authorization Security Bypass Vulnerability. Attackers can exploit this
Release date:Updated on:
Affected Systems:QEMU 0.9.1QEMU 0.9QEMU 0.8.2QEMU 0.6.1QEMU 0.10.6QEMU 0.10Description:--------------------------------------------------------------------------------Bugtraq id: 48659Cve id: CVE-2011-2527
QEMU is an open source simulator software.
Qemu kvm has the Local Security Restriction Bypass Vulnerability in the implementation of the-runas parameter. Local attackers can ex
Release date:Updated on:
Affected Systems:Moodle 2.xMoodle 1.9.xUnaffected system:Moodle 2.2.3Moodle 2.1.6Moodle 2.0.9Moodle 1.9.18Description:--------------------------------------------------------------------------------Bugtraq id: 53626Cve id: CVE-2012-2367
Moodle is a course Management System (CMS), also known as Learning Management System (LMS) or virtual learning environment (VLE ). It is a free Web application. Teachers can use it to build efficient online learning websites.
Moodle ha
Release date:Updated on:
Affected Systems:SEIL/x86 2.35SEIL/x86 1.00SEIL/X2 3.75SEIL/X2 2.30SEIL/X1 3.75SEIL/X1 2.30SEIL/B1 3.75.SEIL/B1 2.30.Description:--------------------------------------------------------------------------------Bugtraq id: 53821Cve id: CVE-2012-2632
SEIL Router is a vro from the Japanese SEIL manufacturer.
SEIL/x86 1.00 to 2.35, SEIL/X1 2.30 to 3.75, SEIL/X2 2.30 to 3.75, and SEIL/B1 2.30 to 3.75 have security restrictions on
Release date:Updated on:
Affected Systems:HP LaserJet P3015Description:--------------------------------------------------------------------------------Cve id: CVE-2011-4785
HP LaserJet P3015 is a high-speed, efficient, secure, and stable mid-range A4 laser printer. It is favored by many financial industry companies with flexible configuration and excellent performance.
The HP LaserJet P3015 has a security vulne
Release date:Updated on:
Affected Systems:Ruby on Rails 3.xUnaffected system:Ruby on Rails 3.0.4Description:--------------------------------------------------------------------------------Bugtraq id: 46292Cve id: CVE-2011-0448, CVE-2011-0449
Ruby on Rails (RoR or Rails) is an open-source Web application framework written in Ruby. It is developed in strict accordance with the MVC structure.
Ruby on Rails has security restriction bypass and SQL Injec
Release date:Updated on:
Affected Systems:Ubuntu 8.04 LTSUbuntu 6.06 LTSUbuntu 11.04Ubuntu 10.04 LTSUbuntu 10.10Description:--------------------------------------------------------------------------------Cve id: CVE-2010-1168, CVE-2010-1447
Perl is a free and powerful programming language. It is used for Web programming, database processing, XML processing, and system management.
Safe. the pm Perl module processes the Safe: reval and Safe: rdo access restriction errors, resulting in Safe. the
Release date: 2011-11-07Updated on: 2011-11-08
Affected Systems:IBM Rational Asset Manager 7.5Unaffected system:IBM Rational Asset Manager 7.5.1Description:--------------------------------------------------------------------------------Bugtraq id: 50559
IBM Rational Asset Manager (RAM) is a collaborative software development Asset management solution that supports reusable Asset specifications (RAS, allows organizations to identify, manage, and control the design, development, and use of softw
PHP 'pcnt _ exec () 'function null character Security Restriction Bypass VulnerabilityPHP 'pcnt _ exec () 'function null character Security Restriction Bypass Vulnerability
Release date:Updated on:Affected Systems:
PHP PHP PHP
Description:
Bugtraq id: 75056CVE (CAN) ID: CVE-2015-4026PHP is a widely used scripting language. It is especially suitable for Web
Apt Security Restriction Bypass Vulnerability (CVE-2014-0487)
Release date:Updated on:
Affected Systems:Ubuntu aptDescription:Bugtraq id: 69836CVE (CAN) ID: CVE-2014-0487
The apt package is the advanced frontend of dpkg.
When APT does not comply with If-Modified-Since, the downloaded file is not verified again. Attackers can exploit this vulnerability to inst
Release date:Updated on:
Affected Systems:RedHat Fedora 16Description:--------------------------------------------------------------------------------Bugtraq id: 54197Cve id: CVE-2012-3356
Viewvc is a web-based CVS and SVN code repository browsing tool.
ViewVC has a security vulnerability. Attackers can exploit this vulnerability to bypass certain
PHP HTTP_PROXY environment variable Security Vulnerability (CVE-2016-5385)PHP HTTP_PROXY environment variable Security Vulnerability (CVE-2016-5385)
Release date:Updated on:Affected Systems:
PHP
Description:
CVE (CAN) ID: CVE-2016-5385PHP is a widely used scripting language. It is especially suitable for Web dev
Release date: 2012-03-12Updated on: 2012-03-13
Affected Systems:Apple Safari Unaffected system:Apple Safari 5.1.4 for WindowsDescription:--------------------------------------------------------------------------------Bugtraq id: 52423Cve id: CVE-2012-0640
WebKit is an open-source browser engine with Gecko (the typographical engine used by Mozilla Firefox) and Trident (also known as MSHTML, the typographical engine used by IE ). WebKit is also the name of the Apple Mac OS x System engine Framew
MySQL has the privilege escalation and security restriction bypass vulnerability. Affected system: MySQLABMySQL description: MySQL is a widely used open-source relational database system with running versions on various platforms. On MySQL, access to the affected system:
MySQL AB MySQL
Description:
MySQL is a widely used open-source relational database system with running versions on various platforms.
Release date: 2011-09-05Updated on: 2011-09-05
Affected Systems:Novell Cloud Manager 1.xDescription:--------------------------------------------------------------------------------Cve id: CVE-2011-2654
Novell Cloud Manager is a solution for building and managing clouds.
Novell Cloud Manager has a security restriction bypass vulnerability when initializing RPC method objects. Remote attackers can exploit
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.