SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

Wednesday
November 26 2014



Try our Premium Alert Service
 
View All
View a Listing of All Recent Vulnerabilities
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com




Headline releases on this page are delayed.




SecurityTracker is compliant with the new new Common Vulnerabilities and Exposures (CVE) Identifier numbering format

Adobe Flash Player Use-After-Free Memory Error Lets Remote Users Execute Arbitrary Code
A vulnerability was reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system.
Impact: Execution of arbitrary code via network, User access via network
Cisco IOS XR LISP TCP Flaw Lets Remote Users Deny Service
A vulnerability was reported in Cisco IOS XR. A remote user can cause denial of service conditions.
Impact: Denial of service via network
Liferay Enterprise Portal Enterprise Edition Input Validation Flaw in File Upload Comment Field Permits Cross-Site Scripting Attacks
A vulnerability was reported in Liferay Enterprise Portal Enterprise Edition. A remote user can conduct cross-site scripting attacks.
Impact: Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Asterisk DB Dialplan Function Lets Remote Authenticated Users Gain Elevated Privileges
A vulnerability was reported in Asterisk. A remote authenticated user can execute arbitrary code on the target system.
Impact: User access via network
Asterisk CONFBRIDGE Lets Remote Authenticated Users Execute Arbitrary System Commands
A vulnerability was reported in Asterisk. A remote authenticated user can gain elevated privileges on the target system.
Impact: Execution of arbitrary code via network, User access via network


Previous Headlines Are Available:
See Our Summary Listing of the SecurityTracker Archives.
SecurityTracker Logo 




Home   |    View Topics   |    Search   |    Contact Us

Copyright 2001 - 2014, SecurityGlobal.net LLC