SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

Wednesday
July 30 2014



Try our Premium Alert Service
 
View All
View a Listing of All Recent Vulnerabilities
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com




Headline releases on this page are delayed.




Google Android Certificate Chain Validation Flaw Lets Applications Gain Elevated Privileges
A vulnerability was reported in Google Android. An application can obtain elevated privileges on the target system.
Impact: Disclosure of system information, Disclosure of user information, Modification of system information, Modification of user information, User access via local system
Cisco Prime Data Center Network Manager Input Validation Flaw Permits Cross-Site Scripting Attacks
A vulnerability was reported in Cisco Prime Data Center Network Manager. A remote user can conduct cross-site scripting attacks.
Impact: Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
HP VPN Firewall Module Unspecified Flaw Lets Remote Users Deny Service
A vulnerability was reported in HP VPN Firewall Modules. A remote user can cause denial of service conditions.
Impact: Denial of service via network
Bugzilla Input Validation Flaw in JSONP Endpoint Permits Cross-Site Request Forgery Attacks
A vulnerability was reported in Bugzilla. A remote user can conduct cross-site request forgery attacks.
Impact: Disclosure of user information
vBulletin Input Validation Flaw in 'ajax/render/memberlist_items' Lets Remote Users Inject SQL Commands
A vulnerability was reported in vBulletin. A remote user can inject SQL commands.
Impact: Disclosure of system information, Disclosure of user information, User access via network


Previous Headlines Are Available:
See Our Summary Listing of the SecurityTracker Archives.
SecurityTracker Logo 




Home   |    View Topics   |    Search   |    Contact Us

Copyright 2001 - 2014, SecurityGlobal.net LLC