Recent vulnerabilities


Vulnerabilities are sorted by update time (recent to old).
ID Description Publish Date Update Date
ghsa-6v8p-jmjg-q3g9 (github) A vulnerability classified as critical has been found in Projectworlds Online Examination System ... 2025-04-29T12:30:21Z 2025-04-29T12:30:21Z
ghsa-6qwv-wfwp-j22f (github) A vulnerability classified as critical was found in code-projects Prison Management System 1.0. T... 2025-04-29T12:30:21Z 2025-04-29T12:30:21Z
ghsa-487w-xx5j-gqwc (github) When DNSdist is configured to provide DoH via the nghttp2 provider, an attacker can cause a denia... 2025-04-29T12:30:21Z 2025-04-29T12:30:21Z
ghsa-274g-94c9-xmph (github) In the Linux kernel, the following vulnerability has been resolved: vmxnet3: Fix packet corrupti... 2025-04-29T12:30:21Z 2025-04-29T12:30:21Z
ghsa-xp82-r324-2w4v (github) The SecuPress Free — WordPress Security plugin for WordPress is vulnerable to unauthorized modifi... 2025-04-29T09:31:37Z 2025-04-29T09:31:37Z
ghsa-x5q5-67q5-j256 (github) The Gutenverse – Ultimate Block Addons and Page Builder for Site Editor plugin for WordPress is v... 2025-04-29T09:31:37Z 2025-04-29T09:31:37Z
ghsa-65vr-4gg3-qw3m (github) The Calculated Fields Form WordPress plugin before 5.2.62 does not sanitise and escape some of it... 2025-04-29T06:30:38Z 2025-04-29T06:30:38Z
ghsa-j3qc-29cr-v3pc (github) A memory corruption vulnerability in the Unauthorized Change Prevention service of Trend Micro Ap... 2022-12-12T15:30:34Z 2025-04-29T06:30:37Z
ghsa-94m8-rgr8-rg5g (github) An issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML document with... 2022-11-23T00:30:16Z 2025-04-29T06:30:37Z
ghsa-6v6r-xmm5-77wp (github) Billing System Project v1.0 was discovered to contain a SQL injection vulnerability via the order... 2022-11-22T18:30:14Z 2025-04-29T06:30:37Z
ghsa-368f-pgc7-8c4c (github) An Out-of-bounds read vulnerability in Trend Micro Apex One and Apex One as a Service could allow... 2022-12-12T15:30:34Z 2025-04-29T06:30:37Z
ghsa-23jc-43ph-xg8h (github) An out-of-bounds access vulnerability in the Unauthorized Change Prevention service of Trend Micr... 2022-12-12T15:30:34Z 2025-04-29T06:30:37Z
ghsa-mxv8-5c66-f89g (github) Netgear R7000P V1.3.0.8 is vulnerable to Buffer Overflow in /usr/sbin/httpd via parameter wan_dns1_sec. 2022-11-22T15:30:25Z 2025-04-29T06:30:36Z
ghsa-m6p3-qgmc-f6gj (github) Netgear R7000P V1.3.0.8 is vulnerable to Buffer Overflow via parameter openvpn_server_ip. 2022-11-22T15:30:26Z 2025-04-29T06:30:36Z
ghsa-h72h-vw3h-ghqj (github) Netgear R7000P V1.3.1.64 is vulnerable to Buffer Overflow via parameter openvpn_server_ip. 2022-11-22T15:30:26Z 2025-04-29T06:30:36Z
ghsa-g2jv-q45g-fhrj (github) Netgear R7000P V1.3.0.8 is vulnerable to Buffer Overflow via parameter openvpn_push1. 2022-11-22T15:30:26Z 2025-04-29T06:30:36Z
ghsa-67ww-95hq-6qq8 (github) Netgear R7000P V1.3.0.8, V1.3.1.64 is vulnerable to Buffer Overflow via parameters: stamode_dns1_... 2022-11-22T15:30:26Z 2025-04-29T06:30:36Z
ghsa-47mf-j97x-4q7x (github) Netgear R7000P V1.3.1.64 is vulnerable to Buffer Overflow via parameter openvpn_push1. 2022-11-22T15:30:26Z 2025-04-29T06:30:36Z
ghsa-2w4j-j38j-hjcx (github) D-Link DIR823G 1.02B05 is vulnerable to Commad Injection. 2022-11-22T15:30:25Z 2025-04-29T06:30:36Z
ghsa-qwwq-h2vg-998f (github) Netgear R7000P V1.3.1.64 is vulnerable to Buffer Overflow via parameters KEY1 and KEY2. 2022-11-22T15:30:26Z 2025-04-29T06:30:35Z
ghsa-q78v-86wj-w8g8 (github) Netgear R7000P V1.3.0.8 is vulnerable to Buffer Overflow via parameters apmode_dns1_pri and apmod... 2022-11-22T15:30:26Z 2025-04-29T06:30:35Z
ghsa-hj9h-9m9c-w9vc (github) Netgear R7000P V1.3.1.64 is vulnerable to Buffer Overflow in /usr/sbin/httpd via parameters: star... 2022-11-22T15:30:26Z 2025-04-29T06:30:35Z
ghsa-p6wj-mf6q-h2qc (github) Netgear R7000P V1.3.1.64 is vulnerable to Buffer Overflow in /usr/sbin/httpd via parameter wan_dns1_pri. 2022-11-22T15:30:26Z 2025-04-29T06:30:34Z
ghsa-6g5w-w568-c7gp (github) Netgear R7000P V1.3.0.8 is vulnerable to Buffer Overflow via wan_dns1_pri. 2022-11-22T15:30:26Z 2025-04-29T06:30:34Z
ghsa-435m-534h-fq69 (github) Netgear R7000P V1.3.1.64 is vulnerable to Buffer Overflow via parameter enable_band_steering. 2022-11-22T15:30:26Z 2025-04-29T06:30:34Z
ghsa-39pg-x84f-79f4 (github) Netgear R7000P V1.3.0.8 is vulnerable to Buffer Overflow in /usr/sbin/httpd via parameter enable_... 2022-11-22T15:30:26Z 2025-04-29T06:30:34Z
ghsa-vxxj-cjwx-9587 (github) Billing System Project v1.0 was discovered to contain a SQL injection vulnerability via the endDa... 2022-11-22T03:30:56Z 2025-04-29T06:30:33Z
ghsa-jc8r-v6v4-2x76 (github) Billing System Project v1.0 was discovered to contain a SQL injection vulnerability via the order... 2022-11-22T03:30:56Z 2025-04-29T06:30:32Z
ghsa-vmwg-3cwg-gccp (github) A null pointer dereference was addressed with improved input validation. This issue is fixed in i... 2025-04-29T03:30:33Z 2025-04-29T03:30:34Z
ghsa-pjvr-p8qr-3fg8 (github) Rejected reason: Not used 2025-04-29T03:30:34Z 2025-04-29T03:30:34Z
Vulnerabilities are sorted by update time (recent to old).
ID CVSS Base Score Description Vendor Product Publish Date Update Date
cve-2022-45461 (NVD) The Java Admin Console in Veritas NetBackup through 10.1 and related Veritas products on Linux and UNIX allows authenticated non-root users (that have been explicitly added to the auth.conf file) to execute arbitrary commands as root. n/a
n/a
2022-11-17T00:00:00.000Z 2025-04-29T13:54:22.295Z
cve-2022-40954 (NVD) Apache Airflow Spark Provider RCE that bypass restrictions to read arbitrary files Apache Software Foundation
Apache Software Foundation
Apache Airflow Spark Provider
Apache Airflow
2022-11-22T00:00:00.000Z 2025-04-29T13:50:28.084Z
cve-2025-45947 (NVD) N/A An issue in phpgurukul Online Banquet Booking System V1.2 allows an attacker to execute arbitrary code via the /obbs/change-password.php file of the My Account - Change Password component n/a
n/a
2025-04-28T00:00:00.000Z 2025-04-29T13:48:58.684Z
cve-2022-45931 (NVD) N/A A SQL injection issue was discovered in AAA in OpenDaylight (ODL) before 0.16.5. The aaa-idm-store-h2/src/main/java/org/opendaylight/aaa/datastore/h2/UserStore.java deleteUser function is affected when the API interface /auth/v1/users/ is used. n/a
n/a
2022-11-27T00:00:00.000Z 2025-04-29T13:48:42.598Z
cve-2025-45949 (NVD) N/A A critical vulnerability was found in PHPGurukul User Registration & Login and User Management System V3.3 in the /loginsystem/change-password.php file of the user panel - Change Password component. Improper handling of session data allows a Session Hijacking attack, exploitable remotely and leading to account takeover. n/a
n/a
2025-04-28T00:00:00.000Z 2025-04-29T13:47:06.220Z
cve-2022-38390 (NVD) CVSS-v3.1: 5.4 Multiple IBM Business Automation Workflow versions are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 233978. IBM
Business Automation Workflow
2022-11-17T16:48:11.088Z 2025-04-29T13:46:49.770Z
cve-2022-45932 (NVD) N/A A SQL injection issue was discovered in AAA in OpenDaylight (ODL) before 0.16.5. The aaa-idm-store-h2/src/main/java/org/opendaylight/aaa/datastore/h2/RoleStore.java deleteRole function is affected when the API interface /auth/v1/roles/ is used. n/a
n/a
2022-11-27T00:00:00.000Z 2025-04-29T13:46:19.489Z
cve-2025-45953 (NVD) N/A A vulnerability was found in PHPGurukul Hostel Management System 2.1 in the /hostel/change-password.php file of the user panel - Change Password component. Improper handling of session data allows a Session Hijacking attack, exploitable remotely n/a
n/a
2025-04-28T00:00:00.000Z 2025-04-29T13:45:31.706Z
cve-2022-45933 (NVD) N/A KubeView through 0.1.31 allows attackers to obtain control of a Kubernetes cluster because api/scrape/kube-system does not require authentication, and retrieves certificate files that can be used for authentication as kube-admin. NOTE: the vendor's position is that KubeView was a "fun side project and a learning exercise," and not "very secure." n/a
n/a
2022-11-27T00:00:00.000Z 2025-04-29T13:44:59.776Z
cve-2022-36785 (NVD) CVSS-v3.1: 7.5 D-Link – G integrated Access Device4 Information Disclosure & Authorization Bypass. D-Link
G integrated Access Device4
2022-11-17T22:27:55.842Z 2025-04-29T13:43:47.629Z
cve-2025-46327 (NVD) Go Snowflake Driver has race condition when checking access to Easy Logging configuration file snowflakedb
gosnowflake
2025-04-28T22:33:05.249Z 2025-04-29T13:43:12.167Z
cve-2025-46326 (NVD) Snowflake Connector for .NET has race condition when checking access to Easy Logging configuration file snowflakedb
snowflake-connector-net
2025-04-28T22:33:01.627Z 2025-04-29T13:42:11.360Z
cve-2025-46328 (NVD) NodeJS Driver for Snowflake has race condition when checking access to Easy Logging configuration file snowflakedb
snowflake-connector-nodejs
2025-04-28T22:33:09.632Z 2025-04-29T13:41:29.830Z
cve-2022-45934 (NVD) N/A An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets. n/a
n/a
2022-11-27T00:00:00.000Z 2025-04-29T13:41:05.963Z
cve-2025-24251 (NVD) N/A The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.4, tvOS 18.4, macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, watchOS 11.4, visionOS 2.4. An attacker on the local network may cause an unexpected app termination. Apple
Apple
Apple
Apple
Apple
Apple
Apple
Apple
watchOS
tvOS
iOS and iPadOS
iPadOS
macOS
visionOS
macOS
macOS
2025-04-29T02:05:16.985Z 2025-04-29T13:40:36.246Z
cve-2025-46330 (NVD) Snowflake Connector for C/C++ retries malformed requests snowflakedb
libsnowflakeclient
2025-04-29T04:34:37.061Z 2025-04-29T13:40:22.200Z
cve-2022-24187 (NVD) N/A The user_id and device_id on the Ourphoto App version 1.4.1 /device/* end-points both suffer from insecure direct object reference vulnerabilities. Other end-users user_id and device_id values can be enumerated by incrementing or decrementing id numbers. The impact of this vulnerability allows an attacker to discover sensitive information such as end-user email addresses, and their unique frame_token value of all other Ourphoto App end-users. n/a
n/a
2022-11-28T00:00:00.000Z 2025-04-29T13:39:33.899Z
cve-2025-24206 (NVD) N/A An authentication issue was addressed with improved state management. This issue is fixed in macOS Sequoia 15.4, tvOS 18.4, macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, visionOS 2.4. An attacker on the local network may be able to bypass authentication policy. Apple
Apple
Apple
Apple
Apple
Apple
Apple
tvOS
iOS and iPadOS
iPadOS
macOS
visionOS
macOS
macOS
2025-04-29T02:05:17.827Z 2025-04-29T13:38:41.705Z
cve-2025-46338 (NVD) Audiobookshelf Vulnerable to Cross-Site-Scripting Reflected via POST Request in /api/upload advplyr
audiobookshelf
2025-04-29T04:34:44.713Z 2025-04-29T13:37:57.632Z
cve-2022-24188 (NVD) N/A The /device/signin end-point for the Ourphoto App version 1.4.1 discloses clear-text password information for functionality within the picture frame devices. The deviceVideoCallPassword and mqttPassword are returned in clear-text. The lack of sessions management and presence of insecure direct object references allows to return password information for other end-users devices. Many of the picture frame devices offer video calling, and it is likely this information can be used to abuse that functionality. n/a
n/a
2022-11-28T00:00:00.000Z 2025-04-29T13:37:33.862Z
cve-2025-24271 (NVD) N/A An access issue was addressed with improved access restrictions. This issue is fixed in macOS Sequoia 15.4, tvOS 18.4, macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, visionOS 2.4. An unauthenticated user on the same network as a signed-in Mac could send it AirPlay commands without pairing. Apple
Apple
Apple
Apple
Apple
Apple
Apple
tvOS
iOS and iPadOS
iPadOS
macOS
visionOS
macOS
macOS
2025-04-29T02:05:18.729Z 2025-04-29T13:36:41.754Z
cve-2022-31608 (NVD) NVIDIA GPU Display Driver for Linux contains a vulnerability in an optional D-Bus configuration file, where a local user with basic capabilities can impact protected D-Bus endpoints, which may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. NVIDIA
GeForce, Workstation, Compute
2022-11-18T00:00:00.000Z 2025-04-29T13:36:30.099Z
cve-2022-24189 (NVD) N/A The user_token authorization header on the Ourphoto App version 1.4.1 /apiv1/* end-points is not implemented properly. Removing the value causes all requests to succeed, bypassing authorization and session management. The impact of this vulnerability allows an attacker POST api calls with other users unique identifiers and enumerate information of all other end-users. n/a
n/a
2022-11-28T00:00:00.000Z 2025-04-29T13:36:14.016Z
cve-2022-24190 (NVD) N/A The /device/acceptBind end-point for Ourphoto App version 1.4.1 does not require authentication or authorization. The user_token header is not implemented or present on this end-point. An attacker can send a request to bind their account to any users picture frame, then send a POST request to accept their own bind request, without the end-users approval or interaction. n/a
n/a
2022-11-28T00:00:00.000Z 2025-04-29T13:35:11.846Z
cve-2025-46343 (NVD) n8n Vulnerable to Stored XSS through Attachments View Endpoint n8n-io
n8n
2025-04-29T04:35:16.684Z 2025-04-29T13:35:04.707Z
cve-2025-24270 (NVD) N/A This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sequoia 15.4, tvOS 18.4, macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, visionOS 2.4. An attacker on the local network may be able to leak sensitive user information. Apple
Apple
Apple
Apple
Apple
Apple
Apple
tvOS
iOS and iPadOS
iPadOS
macOS
visionOS
macOS
macOS
2025-04-29T02:05:19.521Z 2025-04-29T13:34:24.598Z
cve-2025-46329 (NVD) Snowflake Connector for C/C++ inserts client-side encryption key in DEBUG logs snowflakedb
libsnowflakeclient
2025-04-29T04:35:49.431Z 2025-04-29T13:34:10.233Z
cve-2022-44401 (NVD) N/A Online Tours & Travels Management System v1.0 contains an arbitrary file upload vulnerability via /tour/admin/file.php. n/a
n/a
2022-11-28T00:00:00.000Z 2025-04-29T13:33:55.092Z
cve-2024-12273 (NVD) N/A Calculated Fields Form < 5.2.62 - Admin+ Stored XSS Unknown
Calculated Fields Form
2025-04-29T06:00:02.228Z 2025-04-29T13:33:09.280Z
cve-2025-24179 (NVD) N/A A null pointer dereference was addressed with improved input validation. This issue is fixed in iOS 18.3 and iPadOS 18.3, visionOS 2.3, macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sonoma 14.7.5, macOS Sequoia 15.3, tvOS 18.3. An attacker on the local network may be able to cause a denial-of-service. Apple
Apple
Apple
Apple
Apple
Apple
Apple
visionOS
tvOS
macOS
iPadOS
macOS
iOS and iPadOS
macOS
2025-04-29T02:05:20.403Z 2025-04-29T13:32:55.092Z
Vulnerabilities are sorted by update time (recent to old).
ID CVSS Base Score Description Vendor Product Publish Date Update Date
cve-2025-4058 (NVD) Projectworlds Online Examination System Bloodgroop_process.php sql injection Projectworlds
Online Examination System
2025-04-29T11:31:03.566Z 2025-04-29T13:20:17.241Z
cve-2025-45947 (NVD) N/A An issue in phpgurukul Online Banquet Booking System V1.2 allows an attacker to execute arbitrary code via the /obbs/change-password.php file of the My Account - Change Password component n/a
n/a
2025-04-28T00:00:00.000Z 2025-04-29T13:48:58.684Z
cve-2025-3301 (NVD) CVSS-v4.0: 1 DPA Countermeasures Unavailable for Certain Cryptographic Operations on Series 2 Devices silabs.com
Series 2 SoCs and associated modules
2025-04-29T13:47:42.717Z 2025-04-29T14:02:03.494Z
cve-2025-31197 (NVD) N/A The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.4, tvOS 18.4, macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, visionOS 2.4. An attacker on the local network may cause an unexpected app termination. Apple
Apple
Apple
Apple
Apple
Apple
Apple
tvOS
iOS and iPadOS
iPadOS
macOS
visionOS
macOS
macOS
2025-04-29T02:05:21.266Z 2025-04-29T13:31:08.073Z
cve-2025-30194 (NVD) CVSS-v3.1: 7.5 Denial of service via crafted DoH exchange PowerDNS
DNSdist
2025-04-29T11:25:47.141Z 2025-04-29T13:25:09.226Z
cve-2025-2817 (NVD) N/A Mozilla Firefox's update mechanism allowed a medium-integrity user process to interfere with the SYSTEM-level updater by manipulating the file-locking behavior. By injecting code into the user-privileged process, an attacker could bypass intended access controls, allowing SYSTEM-level file operations on paths controlled by a non-privileged user and enabling privilege escalation. This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Firefox ESR < 115.23, Thunderbird < 138, and Thunderbird ESR < 128.10. Mozilla
Mozilla
Mozilla
Mozilla
Mozilla
Firefox
Firefox ESR
Firefox ESR
Thunderbird
Thunderbird ESR
2025-04-29T13:13:33.783Z 2025-04-29T14:22:00.891Z
cve-2025-24271 (NVD) N/A An access issue was addressed with improved access restrictions. This issue is fixed in macOS Sequoia 15.4, tvOS 18.4, macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, visionOS 2.4. An unauthenticated user on the same network as a signed-in Mac could send it AirPlay commands without pairing. Apple
Apple
Apple
Apple
Apple
Apple
Apple
tvOS
iOS and iPadOS
iPadOS
macOS
visionOS
macOS
macOS
2025-04-29T02:05:18.729Z 2025-04-29T13:36:41.754Z
cve-2025-24270 (NVD) N/A This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sequoia 15.4, tvOS 18.4, macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, visionOS 2.4. An attacker on the local network may be able to leak sensitive user information. Apple
Apple
Apple
Apple
Apple
Apple
Apple
tvOS
iOS and iPadOS
iPadOS
macOS
visionOS
macOS
macOS
2025-04-29T02:05:19.521Z 2025-04-29T13:34:24.598Z
cve-2025-24252 (NVD) N/A A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Sequoia 15.4, tvOS 18.4, macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, visionOS 2.4. An attacker on the local network may be able to corrupt process memory. Apple
Apple
Apple
Apple
Apple
Apple
Apple
tvOS
iOS and iPadOS
iPadOS
macOS
visionOS
macOS
macOS
2025-04-29T02:05:22.184Z 2025-04-29T13:26:46.327Z
cve-2025-24251 (NVD) N/A The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.4, tvOS 18.4, macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, watchOS 11.4, visionOS 2.4. An attacker on the local network may cause an unexpected app termination. Apple
Apple
Apple
Apple
Apple
Apple
Apple
Apple
watchOS
tvOS
iOS and iPadOS
iPadOS
macOS
visionOS
macOS
macOS
2025-04-29T02:05:16.985Z 2025-04-29T13:40:36.246Z
cve-2025-24206 (NVD) N/A An authentication issue was addressed with improved state management. This issue is fixed in macOS Sequoia 15.4, tvOS 18.4, macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sonoma 14.7.5, iOS 18.4 and iPadOS 18.4, visionOS 2.4. An attacker on the local network may be able to bypass authentication policy. Apple
Apple
Apple
Apple
Apple
Apple
Apple
tvOS
iOS and iPadOS
iPadOS
macOS
visionOS
macOS
macOS
2025-04-29T02:05:17.827Z 2025-04-29T13:38:41.705Z
cve-2025-24179 (NVD) N/A A null pointer dereference was addressed with improved input validation. This issue is fixed in iOS 18.3 and iPadOS 18.3, visionOS 2.3, macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sonoma 14.7.5, macOS Sequoia 15.3, tvOS 18.3. An attacker on the local network may be able to cause a denial-of-service. Apple
Apple
Apple
Apple
Apple
Apple
Apple
visionOS
tvOS
macOS
iPadOS
macOS
iOS and iPadOS
macOS
2025-04-29T02:05:20.403Z 2025-04-29T13:32:55.092Z
cve-2025-1194 (NVD) Regular Expression Denial of Service (ReDoS) in huggingface/transformers huggingface
huggingface/transformers
2025-04-29T11:30:38.810Z 2025-04-29T13:21:13.446Z
cve-2024-12273 (NVD) N/A Calculated Fields Form < 5.2.62 - Admin+ Stored XSS Unknown
Calculated Fields Form
2025-04-29T06:00:02.228Z 2025-04-29T13:33:09.280Z
cve-2022-45934 (NVD) N/A An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets. n/a
n/a
2022-11-27T00:00:00.000Z 2025-04-29T13:41:05.963Z
cve-2022-45933 (NVD) N/A KubeView through 0.1.31 allows attackers to obtain control of a Kubernetes cluster because api/scrape/kube-system does not require authentication, and retrieves certificate files that can be used for authentication as kube-admin. NOTE: the vendor's position is that KubeView was a "fun side project and a learning exercise," and not "very secure." n/a
n/a
2022-11-27T00:00:00.000Z 2025-04-29T13:44:59.776Z
cve-2022-45932 (NVD) N/A A SQL injection issue was discovered in AAA in OpenDaylight (ODL) before 0.16.5. The aaa-idm-store-h2/src/main/java/org/opendaylight/aaa/datastore/h2/RoleStore.java deleteRole function is affected when the API interface /auth/v1/roles/ is used. n/a
n/a
2022-11-27T00:00:00.000Z 2025-04-29T13:46:19.489Z
cve-2022-45931 (NVD) N/A A SQL injection issue was discovered in AAA in OpenDaylight (ODL) before 0.16.5. The aaa-idm-store-h2/src/main/java/org/opendaylight/aaa/datastore/h2/UserStore.java deleteUser function is affected when the API interface /auth/v1/users/ is used. n/a
n/a
2022-11-27T00:00:00.000Z 2025-04-29T13:48:42.598Z
cve-2022-45930 (NVD) N/A A SQL injection issue was discovered in AAA in OpenDaylight (ODL) before 0.16.5. The aaa-idm-store-h2/src/main/java/org/opendaylight/aaa/datastore/h2/DomainStore.java deleteDomain function is affected for the /auth/v1/domains/ API interface. n/a
n/a
2022-11-27T00:00:00.000Z 2025-04-29T13:54:22.132Z
cve-2022-45914 (NVD) N/A The ESL (Electronic Shelf Label) protocol, as implemented by (for example) the OV80e934802 RF transceiver on the ETAG-2130-V4.3 20190629 board, does not use authentication, which allows attackers to change label values via 433 MHz RF signals, as demonstrated by disrupting the organization of a hospital storage unit, or changing retail pricing. n/a
n/a
2022-11-27T00:00:00.000Z 2025-04-29T13:55:26.106Z
cve-2022-45885 (NVD) N/A An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_frontend.c has a race condition that can cause a use-after-free when a device is disconnected. n/a
n/a
2022-11-25T00:00:00.000Z 2025-04-29T14:01:12.549Z
cve-2022-45476 (NVD) N/A Tiny File Manager version 2.4.8 executes the code of files uploaded by users of the application, instead of just returning them for download. This is possible because the application is vulnerable to insecure file upload. n/a
Tiny File Manager
2022-11-25T00:00:00.000Z 2025-04-29T14:05:00.400Z
cve-2022-45475 (NVD) N/A Tiny File Manager version 2.4.8 allows an unauthenticated remote attacker to access the application's internal files. This is possible because the application is vulnerable to broken access control. n/a
Tiny File Manager
2022-11-25T00:00:00.000Z 2025-04-29T14:07:53.180Z
cve-2022-45470 (NVD) N/A Apache Hama allows XSS and information disclosure Apache Software Foundation
Apache Hama
2022-11-21T00:00:00.000Z 2025-04-29T13:56:28.845Z
cve-2022-45461 (NVD) The Java Admin Console in Veritas NetBackup through 10.1 and related Veritas products on Linux and UNIX allows authenticated non-root users (that have been explicitly added to the auth.conf file) to execute arbitrary commands as root. n/a
n/a
2022-11-17T00:00:00.000Z 2025-04-29T13:54:22.295Z
cve-2022-45225 (NVD) N/A Book Store Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability in /bsms_ci/index.php/book. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the book_title parameter. n/a
n/a
2022-11-25T00:00:00.000Z 2025-04-29T14:10:18.572Z
cve-2022-45017 (NVD) N/A A cross-site scripting (XSS) vulnerability in the Overview Page settings module of WBCE CMS v1.5.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Post Loop field. n/a
n/a
2022-11-21T00:00:00.000Z 2025-04-29T13:59:07.792Z
cve-2022-45016 (NVD) N/A A cross-site scripting (XSS) vulnerability in the Search Settings module of WBCE CMS v1.5.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Footer field. n/a
n/a
2022-11-21T00:00:00.000Z 2025-04-29T14:00:48.432Z
cve-2022-44401 (NVD) N/A Online Tours & Travels Management System v1.0 contains an arbitrary file upload vulnerability via /tour/admin/file.php. n/a
n/a
2022-11-28T00:00:00.000Z 2025-04-29T13:33:55.092Z
cve-2022-44183 (NVD) N/A Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via function formSetWifiGuestBasic. n/a
n/a
2022-11-21T00:00:00.000Z 2025-04-29T14:02:16.399Z
Vulnerabilities are sorted by update time (recent to old).
ID Description Publish Date Update Date
pysec-2025-16 LNbits is a Lightning wallet and accounts system. A Server-Side Request Forgery (SSRF) vulnerabil... 2025-04-06T20:15:15+00:00 2025-04-09T17:27:25.872691+00:00
pysec-2025-15 Flask-AppBuilder is an application development framework. Prior to 4.5.3, Flask-AppBuilder allows... 2025-03-03T16:15:41+00:00 2025-04-09T17:27:25.227116+00:00
pysec-2025-14 An issue was discovered in Django 5.1 before 5.1.8 and 5.0 before 5.0.14. The NFKC normalization ... 2025-04-02T13:15:44+00:00 2025-04-09T17:27:25.169049+00:00
pysec-2025-13 An issue was discovered in Django 5.1 before 5.1.7, 5.0 before 5.0.13, and 4.2 before 4.2.20. The... 2025-03-06T19:15:27+00:00 2025-04-09T17:27:25.095679+00:00
pysec-2022-43178 An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the cleo PyPI pac... 2022-11-09T20:15:10+00:00 2025-04-09T17:27:24.793038+00:00
pysec-2022-43177 Azure CLI is the command-line interface for Microsoft Azure. In versions previous to 2.40.0, Azur... 2022-10-25T17:15:56+00:00 2025-04-09T17:27:24.642962+00:00
pysec-2024-244 A path traversal vulnerability exists in mlflow/mlflow version 2.11.0, identified as a bypass for... 2024-05-16T09:15:14+00:00 2025-04-08T10:23:25.092581+00:00
pysec-2024-243 mlflow/mlflow is vulnerable to Local File Inclusion (LFI) due to improper parsing of URIs, allowi... 2024-04-16T00:15:12+00:00 2025-04-08T10:23:25.044416+00:00
pysec-2024-242 A Local File Inclusion (LFI) vulnerability was identified in mlflow/mlflow, specifically in versi... 2024-06-06T19:15:55+00:00 2025-04-08T10:23:24.995743+00:00
pysec-2024-241 Insufficient sanitization in MLflow leads to XSS when running a recipe that uses an untrusted dat... 2024-02-23T22:15:55+00:00 2025-04-08T10:23:24.946136+00:00
pysec-2024-240 Insufficient sanitization in MLflow leads to XSS when running an untrusted recipe. This issue le... 2024-02-23T22:15:55+00:00 2025-04-08T10:23:24.900947+00:00
pysec-2024-239 A vulnerability in mlflow/mlflow version 8.2.1 allows for remote code execution due to improper n... 2024-06-06T19:15:51+00:00 2025-04-08T10:23:24.852109+00:00
pysec-2025-12 CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Ana... 2025-01-21T15:15:13+00:00 2025-04-08T10:23:23.899726+00:00
pysec-2024-238 CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Ana... 2024-11-06T15:15:11+00:00 2025-04-08T10:23:23.857960+00:00
pysec-2025-11 A vulnerability in the `KnowledgeBaseWebReader` class of the run-llama/llama_index repository, ve... 2025-03-20T10:15:31+00:00 2025-04-01T23:22:47.294256+00:00
pysec-2025-10 A vulnerability in the `download_model` function of the onnx/onnx framework, before and including... 2025-03-20T10:15:37+00:00 2025-03-26T19:21:38.843396+00:00
pysec-2025-9 A remote code execution vulnerability exists in invoke-ai/invokeai versions 5.3.1 through 5.4.2 v... 2025-03-20T10:15:26+00:00 2025-03-20T11:21:37.872971+00:00
pysec-2025-8 The `pygments-style-solarized` project was removed from PyPI by its owner on 2021-08-26. The GitH... 2025-03-17T16:35:37+00:00
pysec-2024-237 OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versions up un... 2024-05-14T16:17:12+00:00 2025-03-05T17:22:29.121263+00:00
pysec-2024-236 Jupyter Server Proxy allows users to run arbitrary external processes alongside their notebook se... 2024-06-11T22:15:09+00:00 2025-02-26T23:22:41.524251+00:00
pysec-2025-7 Published in 2021, the imblog package is a Python library that scrapes data from a blog page to a... 2025-02-26T21:19:19+00:00
pysec-2025-6 Published in 2021, the colabrun package is a Python library that exfiltrates user cookies to a ha... 2025-02-26T20:59:48+00:00
pysec-2025-5 Published in 2020, the autodzee package is a Python library that bypasses Deezer API restrictions... 2025-02-26T20:57:11+00:00
pysec-2025-3 Published in 2019, the autodzee package is a Python library that bypasses Deezer API restrictions... 2025-02-26T20:54:20+00:00
pysec-2025-4 Published in 2019, the automslc package is a Python library that bypasses Deezer API restrictions... 2025-02-26T19:26:49+00:00
pysec-2024-235 With the following crawler configuration: ```python from bs4 import BeautifulSoup as Soup url =... 2024-02-26T16:27:49+00:00 2025-02-26T02:48:56.937312+00:00
pysec-2023-194 langchain_experimental 0.0.14 allows an attacker to bypass the CVE-2023-36258 fix and execute arb... 2023-10-09T20:15:00Z 2025-02-23T07:46:11Z
pysec-2024-234 Jupyter Server Proxy allows users to run arbitrary external processes alongside their Jupyter not... 2024-03-20T20:15:08+00:00 2025-02-21T18:23:35.992501+00:00
pysec-2023-163 An issue in LanChain-ai Langchain v.0.0.245 allows a remote attacker to execute arbitrary code vi... 2023-09-01T16:15:00Z 2025-02-20T09:11:38.521949Z
pysec-2024-233 python-jose through 3.3.0 allows attackers to cause a denial of service (resource consumption) du... 2024-04-26T00:15:09+00:00 2025-02-18T19:20:15.511369+00:00
Vulnerabilities are sorted by update time (recent to old).
ID Description
gsd-2024-33881 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33880 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33879 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33878 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33877 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33876 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33875 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33874 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33873 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33872 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33871 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33870 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33869 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33868 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33867 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33866 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33865 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33864 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33863 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33862 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33861 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33860 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33859 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33858 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33857 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33856 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33855 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33854 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33853 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33852 The format of the source doesn't require a description, click on the link for more details
Vulnerabilities are sorted by update time (recent to old).
ID Description Publish Date Update Date
mal-2024-8899 Malicious code in acronym-decoder-chrome-angular (npm) 2024-09-18T18:26:14Z 2024-09-18T18:26:14Z
mal-2024-8898 Malicious code in grv-teleport (npm) 2024-09-18T16:20:54Z 2024-09-18T16:20:54Z
mal-2024-8897 Malicious code in onfido-web-sdk-angular (npm) 2024-09-18T07:40:41Z 2024-09-18T07:40:41Z
mal-2024-8896 Malicious code in huehue (npm) 2024-09-18T05:03:18Z 2024-09-18T05:03:18Z
mal-2024-8892 Malicious code in insidepocpackage (npm) 2024-09-18T00:11:50Z 2024-09-18T00:11:50Z
mal-2024-8888 Malicious code in bby-node-logger (npm) 2024-09-17T20:13:24Z 2024-09-17T22:05:30Z
mal-2024-8886 Malicious code in 0g-da-contract (npm) 2024-09-17T10:10:47Z 2024-09-17T10:10:47Z
mal-2024-8883 Malicious code in cobainsendiri1 (npm) 2024-09-17T07:31:06Z 2024-09-17T07:31:06Z
mal-2024-8884 Malicious code in wallet-balance-notifier (npm) 2024-09-17T07:21:00Z 2024-09-17T07:21:00Z
mal-2024-8894 Malicious code in stripe-testfb-v3 (npm) 2024-09-17T00:59:18Z 2024-09-17T00:59:32Z
mal-2024-8890 Malicious code in ably-sales-demo-frontend (npm) 2024-09-17T00:54:53Z 2024-09-17T00:54:53Z
mal-2024-8889 Malicious code in ably-engineering (npm) 2024-09-17T00:54:53Z 2024-09-17T00:54:53Z
mal-2024-8893 Malicious code in latam-xp-analytics-plugin-bloomreach (npm) 2024-09-17T00:53:18Z 2024-09-17T00:53:18Z
mal-2024-8891 Malicious code in eslint-plugin-xp-i18n (npm) 2024-09-17T00:53:18Z 2024-09-17T00:53:18Z
mal-2024-8724 Malicious code in afe-base-component (npm) 2024-09-04T02:51:39Z 2024-09-17T00:26:06Z
mal-2024-8882 Malicious code in redmond (npm) 2024-09-16T14:37:29Z 2024-09-16T14:55:07Z
mal-2024-8879 Malicious code in halifax (npm) 2024-09-16T14:37:29Z 2024-09-16T14:55:07Z
mal-2024-8877 Malicious code in afe-host-client (npm) 2024-09-16T14:37:29Z 2024-09-16T14:53:46Z
mal-2024-8878 Malicious code in awsspeedtest (npm) 2024-09-16T14:37:29Z 2024-09-16T14:52:41Z
mal-2024-8881 Malicious code in noblox.js-types (npm) 2024-09-16T14:37:29Z 2024-09-16T14:52:40Z
mal-2024-8880 Malicious code in noblox.js-middleware (npm) 2024-09-16T14:37:29Z 2024-09-16T14:52:40Z
mal-2024-8876 Malicious code in testing_coll (npm) 2024-09-16T12:56:14Z 2024-09-16T12:56:14Z
mal-2024-8872 Malicious code in quickread (npm) 2024-09-11T23:23:14Z 2024-09-11T23:23:15Z
mal-2024-8871 Malicious code in quickcolor (npm) 2024-09-11T23:23:14Z 2024-09-11T23:23:15Z
mal-2024-8868 Malicious code in passports-js (npm) 2024-09-11T23:10:15Z 2024-09-11T23:10:15Z
mal-2024-8862 Malicious code in bcrypts-js (npm) 2024-09-11T23:10:15Z 2024-09-11T23:10:15Z
mal-2024-8873 Malicious code in sketch-crowdin (npm) 2024-09-11T23:05:31Z 2024-09-11T23:05:32Z
mal-2024-8870 Malicious code in publish-test-result-screenshot (npm) 2024-09-11T23:05:31Z 2024-09-11T23:05:32Z
mal-2024-8866 Malicious code in leaktopus-frontend (npm) 2024-09-11T23:05:31Z 2024-09-11T23:05:32Z
mal-2024-8865 Malicious code in fma-connect-javascript (npm) 2024-09-11T23:05:31Z 2024-09-11T23:05:32Z
Vulnerabilities are sorted by update time (recent to old).
ID Description Publish Date Update Date
wid-sec-w-2024-1432 GNU Emacs: Schwachstelle ermöglicht Codeausführung 2024-06-23T22:00:00.000+00:00 2024-09-19T22:00:00.000+00:00
wid-sec-w-2024-1339 Microsoft Azure: Mehrere Schwachstellen ermöglichen Privilegieneskalation 2024-06-11T22:00:00.000+00:00 2024-09-19T22:00:00.000+00:00
wid-sec-w-2024-1197 Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und unspezifische Angriffe 2024-05-21T22:00:00.000+00:00 2024-09-19T22:00:00.000+00:00
wid-sec-w-2024-1188 Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service 2024-05-20T22:00:00.000+00:00 2024-09-19T22:00:00.000+00:00
wid-sec-w-2024-1108 Linux Kernel: Mehrere Schwachstellen 2024-05-13T22:00:00.000+00:00 2024-09-19T22:00:00.000+00:00
wid-sec-w-2024-1008 Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service 2024-05-01T22:00:00.000+00:00 2024-09-19T22:00:00.000+00:00
wid-sec-w-2024-0984 Linux Kernel: Mehrere Schwachstellen 2024-04-28T22:00:00.000+00:00 2024-09-19T22:00:00.000+00:00
wid-sec-w-2024-0964 Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff 2024-04-24T22:00:00.000+00:00 2024-09-19T22:00:00.000+00:00
wid-sec-w-2024-0952 Ruby: Schwachstelle ermöglicht Offenlegung von Informationen 2024-04-23T22:00:00.000+00:00 2024-09-19T22:00:00.000+00:00
wid-sec-w-2024-0920 Linux Kernel: Mehrere Schwachstellen 2024-04-17T22:00:00.000+00:00 2024-09-19T22:00:00.000+00:00
wid-sec-w-2024-0913 Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service 2024-04-16T22:00:00.000+00:00 2024-09-19T22:00:00.000+00:00
wid-sec-w-2024-0904 Kubernetes: Schwachstelle ermöglicht Offenlegung von Informationen 2024-04-16T22:00:00.000+00:00 2024-09-19T22:00:00.000+00:00
wid-sec-w-2024-0832 QEMU: Schwachstelle ermöglicht Codeausführung und DoS 2024-04-09T22:00:00.000+00:00 2024-09-19T22:00:00.000+00:00
wid-sec-w-2024-0789 HTTP/2: Mehrere Schwachstellen ermöglichen Denial of Service 2024-04-03T22:00:00.000+00:00 2024-09-19T22:00:00.000+00:00
wid-sec-w-2024-0736 IBM WebSphere Application Server: Schwachstelle ermöglicht Denial of Service 2024-03-27T23:00:00.000+00:00 2024-09-19T22:00:00.000+00:00
wid-sec-w-2024-0716 IBM WebSphere Application Server: Schwachstelle ermöglicht Cross-Site Scripting 2024-03-26T23:00:00.000+00:00 2024-09-19T22:00:00.000+00:00
wid-sec-w-2024-0708 GNU Emacs: Mehrere Schwachstellen 2024-03-25T23:00:00.000+00:00 2024-09-19T22:00:00.000+00:00
wid-sec-w-2024-0682 Ruby: Mehrere Schwachstellen 2024-03-20T23:00:00.000+00:00 2024-09-19T22:00:00.000+00:00
wid-sec-w-2024-0527 Linux Kernel: Mehrere Schwachstellen 2024-02-29T23:00:00.000+00:00 2024-09-19T22:00:00.000+00:00
wid-sec-w-2024-0518 Golang Go: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff 2024-02-29T23:00:00.000+00:00 2024-09-19T22:00:00.000+00:00
wid-sec-w-2024-0412 QEMU: Mehrere Schwachstellen ermöglichen nicht spezifizierte Angriffe 2024-02-18T23:00:00.000+00:00 2024-09-19T22:00:00.000+00:00
wid-sec-w-2024-0195 Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service 2024-01-24T23:00:00.000+00:00 2024-09-19T22:00:00.000+00:00
wid-sec-w-2024-0126 EDK2 NetworkPkg IP stack implementation: Mehrere Schwachstellen 2024-01-16T23:00:00.000+00:00 2024-09-19T22:00:00.000+00:00
wid-sec-w-2023-3201 Linux Kernel: Mehrere Schwachstellen 2023-12-21T23:00:00.000+00:00 2024-09-19T22:00:00.000+00:00
wid-sec-w-2023-2618 http/2 Implementierungen: Schwachstelle ermöglicht Denial of Service 2023-10-10T22:00:00.000+00:00 2024-09-19T22:00:00.000+00:00
wid-sec-w-2023-1868 Apache Kafka: Schwachstelle ermöglicht Denial of Service 2023-07-23T22:00:00.000+00:00 2024-09-19T22:00:00.000+00:00
wid-sec-w-2023-1544 Kubernetes: Schwachstelle ermöglicht Manipulation von Dateien 2022-01-06T23:00:00.000+00:00 2024-09-19T22:00:00.000+00:00
wid-sec-w-2023-1480 FasterXML Jackson: Schwachstelle ermöglicht Denial of Service 2023-06-14T22:00:00.000+00:00 2024-09-19T22:00:00.000+00:00
wid-sec-w-2023-1469 Kubernetes: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen 2023-06-14T22:00:00.000+00:00 2024-09-19T22:00:00.000+00:00
wid-sec-w-2023-0692 GNU Emacs: Schwachstelle ermöglicht Codeausführung 2023-03-19T23:00:00.000+00:00 2024-09-19T22:00:00.000+00:00
Vulnerabilities are sorted by update time (recent to old).
ID Description Publish Date Update Date
ssa-293562 SSA-293562: Denial of Service Vulnerabilities in PROFINET DCP Implementation of Industrial Products 2017-05-08T00:00:00Z 2024-09-10T00:00:00Z
ssa-280603 SSA-280603: Denial of Service Vulnerability in SINUMERIK ONE and SINUMERIK MC 2023-12-12T00:00:00Z 2024-09-10T00:00:00Z
ssa-103653 SSA-103653: Denial-of-Service Vulnerability in Automation License Manager 2024-09-10T00:00:00Z 2024-09-10T00:00:00Z
ssa-097786 SSA-097786: Insertion of Sensitive Information into Log File Vulnerability in SINUMERIK systems 2024-09-10T00:00:00Z 2024-09-10T00:00:00Z
ssa-088132 SSA-088132: Denial of Service Vulnerability in the OPC UA Server Implementations of Several Industrial Products 2024-07-09T00:00:00Z 2024-09-10T00:00:00Z
ssa-039007 SSA-039007: Heap-based Buffer Overflow Vulnerability in User Management Component (UMC) 2024-09-10T00:00:00Z 2024-09-10T00:00:00Z
ssa-981975 SSA-981975: Information Disclosure Vulnerability in Intel-CPUs (CVE-2022-40982) Impacting SIMATIC IPCs 2023-09-12T00:00:00Z 2024-08-13T00:00:00Z
ssa-857368 SSA-857368: Multiple Vulnerabilities in Omnivise T3000 2024-08-02T00:00:00Z 2024-08-13T00:00:00Z
ssa-856475 SSA-856475: X_T File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go 2024-08-13T00:00:00Z 2024-08-13T00:00:00Z
ssa-822518 SSA-822518: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW Before V11.0.1 on RUGGEDCOM APE1808 Devices 2024-04-09T00:00:00Z 2024-08-13T00:00:00Z
ssa-813746 SSA-813746: BadAlloc Vulnerabilities in SCALANCE X-200, X-200IRT, and X-300 Switch Families 2023-04-11T00:00:00Z 2024-08-13T00:00:00Z
ssa-784301 SSA-784301: Multiple Vulnerabilities in SINEC NMS Before V3.0 2024-08-13T00:00:00Z 2024-08-13T00:00:00Z
ssa-771940 SSA-771940: X_T File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go 2024-06-11T00:00:00Z 2024-08-13T00:00:00Z
ssa-750499 SSA-750499: Weak Encryption Vulnerability in SIPROTEC 5 Devices 2024-07-09T00:00:00Z 2024-08-13T00:00:00Z
ssa-722010 SSA-722010: Datalogics File Parsing Vulnerability in Teamcenter Visualization and JT2Go 2024-07-09T00:00:00Z 2024-08-13T00:00:00Z
ssa-720392 SSA-720392: Multiple Vulnerabilities in Third-Party Components in Location Intelligence Before V4.4 2024-08-13T00:00:00Z 2024-08-13T00:00:00Z
ssa-716317 SSA-716317: Multiple Vulnerability in SINEC Traffic Analyzer Before V2.0 2024-08-13T00:00:00Z 2024-08-13T00:00:00Z
ssa-686975 SSA-686975: IPU 2022.3 Vulnerabilities in Siemens Industrial Products using Intel CPUs 2023-02-14T00:00:00Z 2024-08-13T00:00:00Z
ssa-659443 SSA-659443: Local Code Execution Vulnerabilities in COMOS Before V10.5 2024-08-13T00:00:00Z 2024-08-13T00:00:00Z
ssa-640968 SSA-640968: Untrusted Search Path Vulnerability in TIA Project-Server formerly known as TIA Multiuser Server 2023-02-14T00:00:00Z 2024-08-13T00:00:00Z
ssa-625850 SSA-625850: Multiple WIBU Systems CodeMeter Vulnerabilities Affecting the Desigo CC Product Family and SENTRON powermanager 2023-11-14T00:00:00Z 2024-08-13T00:00:00Z
ssa-417547 SSA-417547: Multiple Vulnerabilities in INTRALOG WMS Before V4 2024-08-13T00:00:00Z 2024-08-13T00:00:00Z
ssa-407785 SSA-407785: Multiple X_T File Parsing Vulnerabilities in Parasolid and Teamcenter Visualization 2023-08-08T00:00:00Z 2024-08-13T00:00:00Z
ssa-398330 SSA-398330: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1 2023-12-12T00:00:00Z 2024-08-13T00:00:00Z
ssa-364175 SSA-364175: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices 2024-07-09T00:00:00Z 2024-08-13T00:00:00Z
ssa-357412 SSA-357412: PRT File Parsing Vulnerability in NX Before V2406.3000 2024-08-13T00:00:00Z 2024-08-13T00:00:00Z
ssa-180704 SSA-180704: Multiple Vulnerabilities in SCALANCE M-800 Family Before V8.0 2023-12-12T00:00:00Z 2024-08-13T00:00:00Z
ssa-116924 SSA-116924: Path Traversal Vulnerability in TIA Portal 2023-04-11T00:00:00Z 2024-08-13T00:00:00Z
ssa-087301 SSA-087301: Multiple Vulnerabilities in SCALANCE M-800 Family Before V8.1 2024-08-13T00:00:00Z 2024-08-13T00:00:00Z
ssa-068047 SSA-068047: Multiple Vulnerabilities in SCALANCE M-800 Family Before V7.2.2 2023-12-12T00:00:00Z 2024-08-13T00:00:00Z
Vulnerabilities are sorted by update time (recent to old).
ID Description Publish Date Update Date
rhsa-2023_6269 Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.12.1 2023-11-15T03:12:52+00:00 2025-03-29T04:26:50+00:00
rhsa-2023_7515 Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 9.0.0 security update 2023-11-27T16:08:33+00:00 2025-03-29T04:26:49+00:00
rhsa-2023_7474 Red Hat Security Advisory: OpenShift Container Platform 4.13.24 security and extras update 2023-11-29T00:33:54+00:00 2025-03-29T04:26:45+00:00
rhsa-2023_6784 Red Hat Security Advisory: Node Health Check Operator 0.6.1 security update 2023-11-08T01:27:34+00:00 2025-03-29T04:26:45+00:00
rhsa-2023_7315 Red Hat Security Advisory: OpenShift Container Platform 4.14.3 bug fix and security update 2023-11-21T11:26:31+00:00 2025-03-29T04:26:42+00:00
rhsa-2023_6837 Red Hat Security Advisory: OpenShift Container Platform 4.14.2 bug fix and security update 2023-11-15T04:22:30+00:00 2025-03-29T04:26:40+00:00
rhsa-2023_6272 Red Hat Security Advisory: OpenShift Container Platform 4.11.53 bug fix and security update 2023-11-08T10:41:09+00:00 2025-03-29T04:26:38+00:00
rhsa-2023_7323 Red Hat Security Advisory: OpenShift Container Platform 4.13.23 bug fix and security update 2023-11-21T11:27:12+00:00 2025-03-29T04:26:36+00:00
rhsa-2023_6786 Red Hat Security Advisory: Fence Agents Remediation Operator 0.2.1 security update 2023-11-08T01:46:23+00:00 2025-03-29T04:26:36+00:00
rhsa-2023_6893 Red Hat Security Advisory: OpenShift Container Platform 4.12.44 security and extras update 2023-11-21T12:20:30+00:00 2025-03-29T04:26:33+00:00
rhsa-2023_6276 Red Hat Security Advisory: OpenShift Container Platform 4.12.42 bug fix and security update 2023-11-08T10:40:48+00:00 2025-03-29T04:26:30+00:00
rhsa-2023_7322 Red Hat Security Advisory: OpenShift Container Platform 4.13.23 security and extras update 2023-11-21T11:27:54+00:00 2025-03-29T04:26:27+00:00
rhsa-2023_6785 Red Hat Security Advisory: Machine Deletion Remediation Operator 0.2.1 security update 2023-11-08T01:37:29+00:00 2025-03-29T04:26:27+00:00
rhsa-2023_7288 Red Hat Security Advisory: Red Hat Product OCP Tools 4.14 Openshift Jenkins security update 2023-11-16T05:58:26+00:00 2025-03-29T04:26:25+00:00
rhsa-2023_6271 Red Hat Security Advisory: OpenShift Container Platform 4.11.53 security and extras update 2023-11-08T09:43:47+00:00 2025-03-29T04:26:21+00:00
rhsa-2023_7345 Red Hat Security Advisory: Red Hat OpenShift GitOps v1.9.3 security update 2023-11-20T08:34:18+00:00 2025-03-29T04:26:18+00:00
rhsa-2023_6779 Red Hat Security Advisory: Red Hat OpenShift Pipelines Operator security update 2023-11-08T00:57:26+00:00 2025-03-29T04:26:18+00:00
rhsa-2023_6845 Red Hat Security Advisory: OpenShift Container Platform 4.13.22 security and extras update 2023-11-15T00:43:04+00:00 2025-03-29T04:26:16+00:00
rhsa-2023_6256 Red Hat Security Advisory: OpenShift Container Platform 4.13.21 security and extras update 2023-11-08T08:40:09+00:00 2025-03-29T04:26:16+00:00
rhsa-2023_6818 Red Hat Security Advisory: Satellite 6.14 security and bug fix update 2023-11-08T14:26:58+00:00 2025-03-29T04:26:13+00:00
rhsa-2023_6257 Red Hat Security Advisory: OpenShift Container Platform 4.13.21 bug fix and security update 2023-11-08T08:43:21+00:00 2025-03-29T04:26:13+00:00
rhsa-2023_7344 Red Hat Security Advisory: openshift-gitops-kam security update 2023-11-20T07:53:42+00:00 2025-03-29T04:26:10+00:00
rhsa-2023_6783 Red Hat Security Advisory: Node Health Check Operator 0.4.1 2023-11-08T01:18:25+00:00 2025-03-29T04:26:09+00:00
rhsa-2023_6248 Red Hat Security Advisory: OpenShift Virtualization 4.12.8 Images security update 2023-11-01T14:42:20+00:00 2025-03-29T04:26:07+00:00
rhsa-2023_6846 Red Hat Security Advisory: OpenShift Container Platform 4.13.22 bug fix and security update 2023-11-15T01:45:54+00:00 2025-03-29T04:26:06+00:00
rhsa-2023_6154 Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.2.0 2023-11-01T00:30:41+00:00 2025-03-29T04:26:05+00:00
rhsa-2023_6275 Red Hat Security Advisory: OpenShift Container Platform 4.12.42 security and extras update 2023-11-08T10:25:29+00:00 2025-03-29T04:26:04+00:00
rhsa-2023_6832 Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.14.0 security, enhancement & bug fix update 2023-11-08T18:49:17+00:00 2025-03-29T04:26:03+00:00
rhsa-2023_7342 Red Hat Security Advisory: OpenShift Container Platform 4.11 low-latency extras update 2023-11-16T20:48:36+00:00 2025-03-29T04:26:01+00:00
rhsa-2023_6782 Red Hat Security Advisory: openshift-gitops-kam security update 2023-11-08T01:10:45+00:00 2025-03-29T04:26:01+00:00
Vulnerabilities are sorted by update time (recent to old).
ID Description Publish Date Update Date
cisco-sa-spa-http-vulns-rjzmx2xz Cisco Small Business SPA300 Series and SPA500 Series IP Phones Web UI Vulnerabilities 2024-08-07T16:00:00+00:00 2024-08-07T16:00:00+00:00
cisco-sa-ise-xss-v2bm9jcy Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities 2024-08-07T16:00:00+00:00 2024-08-07T16:00:00+00:00
cisco-sa-iosxr-ipxe-sigbypass-pymfyqgb Cisco IOS XR Software iPXE Boot Signature Bypass Vulnerability 2023-09-13T16:00:00+00:00 2024-08-07T15:55:33+00:00
cisco-sa-webex-app-zjnm8x8j Cisco Webex App Vulnerabilities 2024-07-17T16:00:00+00:00 2024-07-17T16:00:00+00:00
cisco-sa-swa-priv-esc-7uhpzscc Cisco Secure Web Appliance Privilege Escalation Vulnerability 2024-07-17T16:00:00+00:00 2024-07-17T16:00:00+00:00
cisco-sa-sb-rv34x-rce-7pqfu2e Cisco RV340 and RV345 Dual WAN Gigabit VPN Routers Authenticated Remote Code Execution Vulnerability 2024-07-17T16:00:00+00:00 2024-07-17T16:00:00+00:00
cisco-sa-ise-file-upload-krw2txa9 Cisco Identity Services Engine Arbitrary File Upload Vulnerability 2024-07-17T16:00:00+00:00 2024-07-17T16:00:00+00:00
cisco-sa-inode-static-key-vuvceynn Cisco Intelligent Node Software Static Key Vulnerability 2024-07-17T16:00:00+00:00 2024-07-17T16:00:00+00:00
cisco-sa-expressway-redirect-kjsfuxgj Cisco Expressway Series Open Redirect Vulnerability 2024-07-17T16:00:00+00:00 2024-07-17T16:00:00+00:00
cisco-sa-esa-priv-esc-ssti-xno2eogz Cisco Secure Email Gateway Server-Side Template Injection Vulnerability 2024-07-17T16:00:00+00:00 2024-07-17T16:00:00+00:00
cisco-sa-esa-afw-bgg2usjh Cisco Secure Email Gateway Arbitrary File Write Vulnerability 2024-07-17T16:00:00+00:00 2024-07-17T16:00:00+00:00
cisco-sa-xr-secure-boot-qud5g8ap Cisco IOS XR Software Secure Boot Bypass Vulnerability 2024-07-10T16:00:00+00:00 2024-07-10T16:00:00+00:00
cisco-sa-cimc-cmd-inj-blupcb Cisco Integrated Management Controller Web-Based Management Interface Command Injection Vulnerability 2024-04-17T16:00:00+00:00 2024-06-28T15:22:37+00:00
cisco-sa-cimc-cmd-inj-mux4c5aj Cisco Integrated Management Controller CLI Command Injection Vulnerability 2024-04-17T16:00:00+00:00 2024-06-28T15:22:08+00:00
cisco-sa-finesse-ssrf-rfi-um7wt8ew Cisco Finesse Web-Based Management Interface Vulnerabilities 2024-06-05T16:00:00+00:00 2024-06-14T21:44:14+00:00
cisco-sa-esa-sma-wsa-xss-bgg5whod Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance Cross-Site Scripting Vulnerabilities 2024-05-15T16:00:00+00:00 2024-06-12T15:37:50+00:00
cisco-sa-esa-http-split-glrnnows Cisco Secure Email Gateway HTTP Response Splitting Vulnerability 2024-05-15T16:00:00+00:00 2024-06-12T15:14:33+00:00
cisco-sa-webex-june-2024 Cisco Webex Meetings Meeting Information and Metadata Issue June 2024 2024-06-04T21:00:00+00:00 2024-06-11T19:41:36+00:00
cisco-sa-opendns-pulse-dos-dd8l3szq Cisco OpenDNS Pulsing DNS Denial of Service Attack 2024-05-20T16:00:00+00:00 2024-05-23T16:28:32+00:00
cisco-sa-fmc-sqli-wffdnnos Cisco Firepower Management Center Software SQL Injection Vulnerability 2024-05-22T16:00:00+00:00 2024-05-22T17:39:28+00:00
cisco-sa-asaftd-ssl-dos-uu7mv5p6 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software for Firepower 2100 Series Appliances SSL/TLS Denial of Service Vulnerability 2023-06-07T16:00:00+00:00 2024-05-22T16:37:00+00:00
cisco-sa-snort3-ips-bypass-ue69kbmd Multiple Cisco Products Snort 3 HTTP Intrusion Prevention System Rule Bypass Vulnerability 2024-05-22T16:00:00+00:00 2024-05-22T16:00:00+00:00
cisco-sa-ftd-archive-bypass-z4wqjwcn Cisco Firepower Threat Defense Software Encrypted Archive File Policy Bypass Vulnerability 2024-05-22T16:00:00+00:00 2024-05-22T16:00:00+00:00
cisco-sa-fmc-object-bypass-fth8tdjq Cisco Firepower Management Center Software Object Group Access Control List Bypass Vulnerability 2024-05-22T16:00:00+00:00 2024-05-22T16:00:00+00:00
cisco-sa-asaftd-saml-bypass-kknvxykw Cisco Adaptive Security Appliance and Firepower Threat Defense Software Authorization Bypass Vulnerability 2024-05-22T16:00:00+00:00 2024-05-22T16:00:00+00:00
cisco-sa-asaftd-ogsnsg-aclbyp-3xb8q6jx Cisco Adaptive Security Appliance and Firepower Threat Defense Software Inactive-to-Active ACL Bypass Vulnerability 2024-05-22T16:00:00+00:00 2024-05-22T16:00:00+00:00
cisco-sa-asaftd-dos-njvawoeq Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software DNS Inspection Denial of Service Vulnerability 2022-04-27T16:00:00+00:00 2024-05-22T15:57:10+00:00
cisco-sa-cucm-apidos-pgsdcdnf Multiple Cisco Unified Communications Products Unauthenticated API High CPU Utilization Denial of Service Vulnerability 2023-10-04T16:00:00+00:00 2024-05-17T15:07:50+00:00
cisco-sa-secure-nam-priv-esc-szu2vypz Cisco Secure Client for Windows with Network Access Manager Module Privilege Escalation Vulnerability 2024-05-15T16:00:00+00:00 2024-05-15T16:00:00+00:00
cisco-sa-nso-rwpesc-qrqgnh3f Cisco Crosswork Network Services Orchestrator Vulnerabilities 2024-05-15T16:00:00+00:00 2024-05-15T16:00:00+00:00
Vulnerabilities are sorted by update time (recent to old).
ID Description Publish Date Update Date
sca-2022-0001 Vulnerability in SICK FieldEcho 2022-02-17T16:00:00.000Z 2022-02-17T16:00:00.000Z
sca-2021-0003 SICK Security Advisory for Apache Log4j (CVE-2021-44228) 2021-12-14T17:00:00.000Z 2021-12-17T12:00:00.000Z
sca-2021-0004 Vulnerabilities in SICK SOPAS ET 2021-12-16T08:00:00.000Z 2021-12-17T08:00:00.000Z
sca-2021-0002 MEAC affected by Windows SMBv1 vulnerability 2021-08-04T10:00:00.000Z 2021-08-04T10:00:00.000Z
sca-2021-0001 Inadequate SSH configuration in SICK Visionary-S CX 2021-06-25T10:00:00.000Z 2021-06-25T10:00:00.000Z
sca-2020-0005 Package Analytics affected by Windows TCP/IP vulnerability 2020-10-29T11:00:00.000Z 2020-10-29T11:00:00.000Z
sca-2020-0004 Vulnerability in Platform Mechanism AutoIP 2020-08-31T10:00:00.000Z 2020-08-31T10:00:00.000Z
sca-2020-0003 MEAC affected by Windows SMBv3 vulnerability 2020-08-07T10:00:00.000Z 2020-08-07T10:00:00.000Z
sca-2020-0002 Vulnerabilities in SICK Package Analytics 2020-08-07T10:00:00.000Z 2020-07-28T10:00:00.000Z
sca-2020-0001 Security Information Regarding "Profile Programming" 2020-05-31T10:00:00.000Z 2020-05-31T10:00:00.000Z
sca-2019-0002 Vulnerability in SICK FX0-GENT00000 and SICK FX0-GPNT00000 2019-09-20T10:00:00.000Z 2019-09-20T10:00:00.000Z
sca-2019-0001 MSC800 affected by hard-coded credentials vulnerability 2019-06-21T10:00:00.000Z 2019-06-21T10:00:00.000Z
Vulnerabilities are sorted by update time (recent to old).
ID Description
var-200702-0378 Stack-based buffer overflow in the DCE/RPC preprocessor in Snort before 2.6.1.3, and 2.7 before beta 2; and Sourcefire Intrusion Sensor; allows remote attackers to execute arbitrary code via crafted SMB traffic. Snort IDS and Sourcefire Intrusion Sensor are prone to a stack-based buffer-overflow vulnerability because the network intrusion detection (NID) systems fail to handle specially crafted 'DCE' and 'RPC' network packets. An attacker can exploit this issue to execute malicious code in the context of the user running the affected application. Failed attempts will likely cause these applications to crash. The software provides functions such as packet sniffing, packet analysis, and packet inspection. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA07-050A Sourcefire Snort DCE/RPC Preprocessor Buffer Overflow Original release date: February 19, 2007 Last revised: -- Source: US-CERT Systems Affected * Snort 2.6.1, 2.6.1.1, and 2.6.1.2 * Snort 2.7.0 beta 1 * Sourcefire Intrusion Sensors version 4.1.x, 4.5.x, and 4.6x with SEUs prior to SEU 64 * Sourcefire Intrusion Sensors for Crossbeam version 4.1.x, 4.5.x, and 4.6x with SEUs prior to SEU 64 Other products that use Snort or Snort components may be affected. I. The DCE/RPC preprocessor reassembles fragmented SMB and DCE/RPC traffic before passing data to the Snort rules. The vulnerable code does not properly reassemble certain types of SMB and DCE/RPC packets. An attacker could exploit this vulnerability by sending a specially crafted TCP packet to a host or network monitored by Snort. The DCE/RPC preprocessor is enabled by default, and it is not necessary for an attacker to complete a TCP handshake. US-CERT is tracking this vulnerability as VU#196240. This vulnerability has been assigned CVE number CVE-2006-5276. Further information is available in advisories from Sourcefire and ISS. II. III. Solution Upgrade Snort 2.6.1.3 is available from the Snort download site. Sourcefire customers should visit the Sourcefire Support Login site. Disable the DCE/RPC Preprocessor To disable the DCE/RPC preprocessor, comment out the line that loads the preprocessor in the Snort configuration file (typically /etc/snort.conf on UNIX and Linux systems): [/etc/snort.conf] ... #preprocessor dcerpc... Restart Snort for the change to take effect. Disabling the preprocessor will prevent Snort from reassembling fragmented SMB and DCE/RPC packets. This may allow attacks to evade the IDS. IV. References * US-CERT Vulnerability Note VU#196240 - <http://www.kb.cert.org/vuls/id/196240> * Sourcefire Advisory 2007-02-19 - <http://www.snort.org/docs/advisory-2007-02-19.html> * Sourcefire Support Login - <https://support.sourcefire.com/> * Sourcefire Snort Release Notes for 2.6.1.3 - <http://www.snort.org/docs/release_notes/release_notes_2613.txt> * Snort downloads - <http://www.snort.org/dl/> * DCE/RPC Preprocessor - <http://www.snort.org/docs/snort_htmanuals/htmanual_261/node104.html> * IBM Internet Security Systems Protection Advisory - <http://iss.net/threats/257.html> * CVE-2006-5276 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-5276> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA07-050A.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA07-050A Feedback VU#196240" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2007 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History February 19, 2007: Initial Release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBRdop4+xOF3G+ig+rAQKdtAgAhQY66LRfVlNkH30Q5RI0gIo5Vhu14yDP qulLEyzjDhC7gDHWBGQYdE9eCy9Yf3P4BfKJS0766he/7CFn+BaDs7ohnXaynHQq +kMYNBMBg2RbrGKfOGRLHc0P6X1tSP3w45IppjOv9Yo5SUVDCa7beZWURCIKZyp6 OuYXtnpiGNctHgeU56US0sfuKj8qP7KOd9pCDRDQRhJ3UUd9wDpXee66HBxchh+w RSIQiMxisOX9mMYBW3z4DM/lb7PxXoa2Q7DwjM1NIOe/0tAObCOvF4uYhOLCVyNg +EbcN9123V0PW95FITlHXvJU6K8srnnK+Fhpfyi4vg5bYeEF2WiUrg== =T7v8 -----END PGP SIGNATURE----- . February 19, 2007 Summary: Sourcefire has learned of a remotely exploitable vulnerability in the Snort DCE/RPC preprocessor. Sourcefire has prepared updates for Snort open-source software to address this issue. Mitigating Factors: Users who have disabled the DCE/RPC preprocessor are not vulnerable. Recommended Actions: * Open-source Snort 2.6.1.x users are advised to upgrade to Snort 2.6.1.3 (or later) immediately. * Open-source Snort 2.7 beta users are advised to mitigate this issue by disabling the DCE/RPC preprocessor. This issue will be resolved in Snort 2.7 beta 2. Workarounds: Snort users who cannot upgrade immediately are advised to disable the DCE/RPC preprocessor by removing the DCE/RPC preprocessor directives from snort.conf and restarting Snort. However, be advised that disabling the DCE/RPC preprocessor reduces detection capabilities for attacks in DCE/RPC traffic. After upgrading, customers should reenable the DCE/RPC preprocessor. Detecting Attacks Against This Vulnerability: Sourcefire will be releasing a rule pack that provides detection for attacks against this vulnerability. Has Sourcefire received any reports that this vulnerability has been exploited? - No. Sourcefire has not received any reports that this vulnerability has been exploited. Acknowledgments: Sourcefire would like to thank Neel Mehta from IBM X-Force for reporting this issue and working with us to resolve it. ------------------------------------------------------------------------- Take Surveys. Earn Cash. Influence the Future of IT Join SourceForge.net's Techsay panel and you'll get the chance to share your opinions on IT & business topics through brief surveys-and earn cash http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV _______________________________________________ Snort-announce mailing list Snort-announce@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/snort-announce . Resolution ========== All Snort users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-analyzer/snort-2.6.1.3" References ========== [ 1 ] CVE-2006-5276 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5276 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200703-01.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org. License ======= Copyright 2007 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5
var-202305-0219 D-Link DAP-1360 webproc WEB_DisplayPage Directory Traversal Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of D-Link DAP-1360 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of requests to the /cgi-bin/webproc endpoint. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of root. Was ZDI-CAN-18415
var-202305-0218 D-Link DAP-1360 webproc WEB_DisplayPage Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1360 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of requests to the /cgi-bin/webproc endpoint. When parsing the getpage and errorpage parameters, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-18419. D-Link DAP-1360 is a router from D-Link, a Chinese company
var-202305-0217 D-Link DAP-1360 Hardcoded Credentials Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-1360 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of login requests to the web-based user interface. The firmware contains hard-coded default credentials. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-18455. D-Link DAP-1360 is a router from D-Link, a Chinese company
var-202305-0216 D-Link DAP-1360 Multiple Parameters Stack-Based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1360 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the /cgi-bin/webproc endpoint. When parsing the errorpage and nextpage parameters, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-18746. D-Link DAP-1360 is a router from D-Link, a Chinese company
var-202305-0177 D-Link DAP-1360 webproc Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1360 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling requests to the /cgi-bin/webproc endpoint. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-18417. D-Link DAP-1360 is a router from D-Link, a Chinese company
var-202305-0176 D-Link DAP-1360 webproc var:sys_Token Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1360 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling requests to the /cgi-bin/webproc endpoint. When parsing the var:sys_Token parameter, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-18418. D-Link DAP-1360 is a router from D-Link, a Chinese company
var-202305-0166 D-Link DAP-1360 webproc var:menu Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1360 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling requests to the /cgi-bin/webproc endpoint. When parsing the var:menu parameter, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-18414. D-Link DAP-1360 is a router from D-Link, a Chinese company
var-202305-0154 D-Link DAP-1360 webproc var:page Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1360 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of requests to the /cgi-bin/webproc endpoint. When parsing the var:page parameter, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-18422. D-Link DAP-1360 is a router from D-Link, a Chinese company
var-202305-0153 D-Link DAP-1360 webupg UPGCGI_CheckAuth Numeric Truncation Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1360 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of requests to the /cgi-bin/webupg endpoint. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-18423. D-Link DAP-1360 is a router from D-Link, a Chinese company
var-202305-0071 D-Link DAP-1360 webproc Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1360 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of requests to the /cgi-bin/webproc endpoint. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-18416. D-Link DAP-1360 is a router from D-Link, a Chinese company
var-202305-0070 D-Link DAP-1360 webproc COMM_MakeCustomMsg Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1360 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of requests to the /cgi-bin/webproc endpoint. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-18454. D-Link DAP-1360 is a router from D-Link, a Chinese company
var-202303-1296 TP-Link Archer AX21 tmpServer Command 0x422 Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Archer AX21 routers. Authentication is required to exploit this vulnerability. The specific flaw exists within the handling of command 0x422 provided to the tmpServer service. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-19905
var-201908-0863 Rockwell Automation Arena Simulation Software versions 16.00.00 and earlier contain a USE AFTER FREE CWE-416. A maliciously crafted Arena file opened by an unsuspecting user may result in the application crashing or the execution of arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of DOE project files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. 9502-Ax) 16.00.00 and earlier versions have resource management error vulnerabilities. 9502-Ax) version 16.00.00 and earlier
var-201105-0156 Multiple buffer overflows in the ISSymbol ActiveX control in ISSymbol.ocx 61.6.0.0 and 301.1009.2904.0 in the ISSymbol virtual machine, as distributed in Advantech Studio 6.1 SP6 61.6.01.05, InduSoft Web Studio before 7.0+SP1, and InduSoft Thin Client 7.0, allow remote attackers to execute arbitrary code via a long (1) InternationalOrder, (2) InternationalSeparator, or (3) LogFileName property value; or (4) a long bstrFileName argument to the OpenScreen method. Overly long to method bstrFileName argument. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Indusoft Thin Client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within ISSymbol.ocx ActiveX component. When an overly large string is passed as the 'InternationalOrder' parameter, a heap overflow occurs. This vulnerability can be leveraged to execute code under the context of the user running the browser. InduSoft Web Studio is a powerful and complete graphics control software that includes the various functional modules required to develop Human Machine Interface (HMI), Management Control, Data Acquisition System (SCADA) and embedded control. The Advantech Studio ISSymbol ActiveX control handles boundary errors in the \"InternationalSeparator\" property. The Advantech Studio ISSymbol ActiveX control is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Failed exploit attempts will likely result in denial-of-service conditions. Advantech Studio 6.1 SP6 Build 61.6.01.05 is vulnerable; other versions may also be affected. There are multiple buffer overflow vulnerabilities in InduSoft ISSymbol ActiveX control 6.1 SP6 Build 61.6.01.05 (ISSymbol.ocx 61.6.0.0) and other versions. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ZDI-12-168 : InduSoft Thin Client ISSymbol InternationalSeparator Remote Code Execution Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-12-168 August 29, 2012 - -- CVE ID: CVE-2011-0340 - -- CVSS: 7.5, AV:N/AC:L/Au:N/C:P/I:P/A:P - -- Affected Vendors: Indusoft - -- Affected Products: Indusoft WebStudio - -- TippingPoint(TM) IPS Customer Protection: TippingPoint IPS customers have been protected against this vulnerability by Digital Vaccine protection filter ID 12446. - -- Vendor Response: Indusoft has issued an update to correct this vulnerability. More details can be found at: http://www.indusoft.com/hotfixes/hotfixes.php - -- Disclosure Timeline: 2011-12-19 - Vulnerability reported to vendor 2012-08-29 - Coordinated public release of advisory - -- Credit: This vulnerability was discovered by: * Alexander Gavrun - -- About the Zero Day Initiative (ZDI): Established by TippingPoint, The Zero Day Initiative (ZDI) represents a best-of-breed model for rewarding security researchers for responsibly disclosing discovered vulnerabilities. Researchers interested in getting paid for their security research through the ZDI can find more information and sign-up at: http://www.zerodayinitiative.com The ZDI is unique in how the acquired vulnerability information is used. TippingPoint does not re-sell the vulnerability details or any exploit code. Instead, upon notifying the affected product vendor, TippingPoint provides its customers with zero day protection through its intrusion prevention technology. Explicit details regarding the specifics of the vulnerability are not exposed to any parties until an official vendor patch is publicly available. Furthermore, with the altruistic aim of helping to secure a broader user base, TippingPoint provides this vulnerability information confidentially to security vendors (including competitors) who have a vulnerability protection or mitigation product. Our vulnerability disclosure policy is available online at: http://www.zerodayinitiative.com/advisories/disclosure_policy/ Follow the ZDI on Twitter: http://twitter.com/thezdi -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 10.2.0 (Build 1950) Charset: utf-8 wsBVAwUBUD4cZ1VtgMGTo1scAQJoagf/ZpDTiahOQlERNABRglBe8krgQHhSHddX qVTQjFEyoOL8df5cA/I3JLJxEYRzcT0k8FSdoHUAMDWA8Oxv1BB62r7fgHC1BFjp jbH6u0mL+eYd95jqwfYaruakhABiCRR73nCxYvYGb1Bvx6piBDneD9E+Nx+qycF5 HKb5Fr0wwT+sWssIsnAHx5jDUamdRyQfOR1MAzb6GfKWDsRqwr/T5hWvRLqbZ3Cj VXwmd+MIIAQZIMJ8swKgBvbSeV4tcePun1NhqJYAJtySYR6a6oF112Gk+kXlNXDi EvynyGSXvzLMKEd+vmzSBbVeftCxNQJ8Ce4Vg+LYMGk0YHfoupt3gQ== =Fw26 -----END PGP SIGNATURE-----
var-201112-0097 Stack-based buffer overflow in the CmpWebServer component in 3S CoDeSys 3.4 SP4 Patch 2 and earlier, as used on the ABB AC500 PLC and possibly other products, allows remote attackers to execute arbitrary code via a long URI to TCP port 8080. CoDeSys is a powerful PLC software programming tool that supports IEC61131-3 standard IL, ST, FBD, LD, CFC, SFC six PLC programming languages. The GatewayService has an integer overflow. The GatewayService uses the 32-bit value offset at the header 0x0c to specify the size of the received data. The program receives this value, increasing the number of 0x34 and allocating the amount of memory can cause an integer overflow. CmpWebServer is a component of the 3SRTESrv3 and CoDeSysControlService services for handling 8080 port connections. The function 0040f480 copies the input URI to a limited stack buffer, which can trigger a buffer overflow. 3S CoDeSys handles the Content-Length value in an HTTP POST request to trigger a null pointer reference. CoDeSys is prone to a stack-based buffer-overflow and an integer-overflow vulnerability. Failed attacks may cause a denial-of-service condition
var-201904-0181 Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple stack-based buffer overflow vulnerabilities, caused by a lack of proper validation of the length of user-supplied data, may allow remote code execution. Advantech WebAccess/SCADA Contains a buffer error vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability.The specific flaw exists within bwmakdir.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A buffer overflow vulnerability exists in Advantech WebAccess/SCADA. This vulnerability stems from the fact that when the network system or product performs operations on the memory, the data boundary is not correctly verified, resulting in execution to other associated memory locations. erroneous read and write operations
var-200202-0006 Vulnerabilities in a large number of SNMP implementations allow remote attackers to cause a denial of service or gain privileges via SNMPv1 trap handling, as demonstrated by the PROTOS c06-SNMPv1 test suite. NOTE: It is highly likely that this candidate will be SPLIT into multiple candidates, one or more for each vendor. This and other SNMP-related candidates will be updated when more accurate information is available. Multiple vendor SNMPv1 Trap handling implementations contain vulnerabilities that may allow unauthorized privileged access, denial-of-service conditions, or unstable behavior . If your site uses SNMP in any capacity, the CERT/CC encourages you to read the information provided below. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ SNMP Protocol is status and performance information MIB (Management Information Base) Protocol used to exchange Management side SNMP Managers such as managed routers, switches and printers SNMP Communicates with management network devices called agents. Because of its wide acceptance in the market, SNMP Has become the standard for SNMP protocol version1 Is SNMPv1 Is the most widely implemented. this SNMPv1 Sent from the agent to the manager in the implementation of SNMP Trap message and sent from the manager to the agent SNMP Decrypt the request message / There are problems in interpreting. If this problem is used by an attacker, the following actions may be executed. Many other programs that you implement may also be affected because of a protocol problem. On the target host SNMP If the service is running, an attacker could execute arbitrary code ・ If a buffer overflow attack is feasible and a very long trap message SNMP If the host on which the service is running receives, the application may go into a denial of service state The effects described above vary from application to application. For details, refer to each product.Please refer to the “Overview” for the impact of this vulnerability. Windows 95 is prone to a denial-of-service vulnerability. MPE/iX is an Internet-ready operating system for the HP e3000 class servers. It is possible to crash the service by transmitting to it a maliciously constructed SNMPv1 request PDU. It was previously known as UCD-SNMP. They typically notify the manager that some event has occured or otherwise provide information about the status of the agent. Multiple vulnerabilities have been discovered in a number of SNMP implementations. The vulnerabilities are known to exist in the process of decoding and interpreting SNMP trap messages. Among the possible consequences are denial of service and allowing attackers to compromise target systems. These depend on the individual vulnerabilities in each affected product. HP has confirmed that large traps will cause OpenView Network Node Manager to crash. This may be due to an exploitable buffer overflow condition
var-201402-0248 Integer underflow in Adobe Flash Player before 11.7.700.261 and 11.8.x through 12.0.x before 12.0.0.44 on Windows and Mac OS X, and before 11.2.202.336 on Linux, allows remote attackers to execute arbitrary code via unspecified vectors. Adobe Flash Player is prone to a remote code-execution vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions. The product enables viewing of applications, content and video across screens and browsers. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: flash-plugin security update Advisory ID: RHSA-2014:0137-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0137.html Issue date: 2014-02-05 Updated on: 2014-02-04 CVE Names: CVE-2014-0497 ===================================================================== 1. Summary: An updated Adobe Flash Player package that fixes one security issue is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. This vulnerability is detailed in the Adobe Security bulletin APSB14-04, listed in the References section. Specially-crafted SWF content could cause flash-plugin to crash or, potentially, execute arbitrary code when a victim loads a page containing the malicious SWF content. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 5): i386: flash-plugin-11.2.202.336-1.el5.i386.rpm x86_64: flash-plugin-11.2.202.336-1.el5.i386.rpm Red Hat Enterprise Linux Server Supplementary (v. 5): i386: flash-plugin-11.2.202.336-1.el5.i386.rpm x86_64: flash-plugin-11.2.202.336-1.el5.i386.rpm Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: flash-plugin-11.2.202.336-1.el6.i686.rpm x86_64: flash-plugin-11.2.202.336-1.el6.i686.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: flash-plugin-11.2.202.336-1.el6.i686.rpm x86_64: flash-plugin-11.2.202.336-1.el6.i686.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: flash-plugin-11.2.202.336-1.el6.i686.rpm x86_64: flash-plugin-11.2.202.336-1.el6.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-0497.html https://access.redhat.com/security/updates/classification/#critical http://helpx.adobe.com/security/products/flash-player/apsb14-04.html 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFS8fK3XlSAg2UNWIIRAn3HAJ9Dl9yTq8uwL1jZXpBhxpTOeSlNXACfcWWO 2pb3HgPGlwSq5PcZSe2neeg= =KItO -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201402-06 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Adobe Flash Player: Multiple vulnerabilities Date: February 06, 2014 Bugs: #491148, #493894, #498170, #500313 ID: 201402-06 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in Adobe Flash Player, the worst of which could result in execution of arbitrary code. Background ========== The Adobe Flash Player is a renderer for the SWF file format, which is commonly used to provide interactive websites. Please review the CVE identifiers referenced below for details. Impact ====== A remote attacker could entice a user to open a specially crafted SWF file using Adobe Flash Player, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition. Workaround ========== There is no known workaround at this time. Resolution ========== All Adobe Flash Player users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-plugins/adobe-flash-11.2.202.336" References ========== [ 1 ] CVE-2013-5329 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5329 [ 2 ] CVE-2013-5330 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5330 [ 3 ] CVE-2013-5331 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5331 [ 4 ] CVE-2013-5332 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5332 [ 5 ] CVE-2014-0491 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0491 [ 6 ] CVE-2014-0492 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0492 [ 7 ] CVE-2014-0497 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0497 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201402-06.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5
var-201407-0233 Multiple stack-based buffer overflows in Advantech WebAccess before 7.2 allow remote attackers to execute arbitrary code via a long string in the (1) ProjectName, (2) SetParameter, (3) NodeName, (4) CCDParameter, (5) SetColor, (6) AlarmImage, (7) GetParameter, (8) GetColor, (9) ServerResponse, (10) SetBaud, or (11) IPAddress parameter to an ActiveX control in (a) webvact.ocx, (b) dvs.ocx, or (c) webdact.ocx. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the webdact.ocx ActiveX Control. The control does not check the length of an attacker-supplied NodeName string before copying it into a fixed length buffer on the stack. This could allow an attacker to execute arbitrary code in the context of the browser process. Advantech WebAccess HMI/SCADA is an HMI/SCADA software. Advantech WebAccess webvact.ocx, dvs.ocx and webdact.ocx ActiveX controls fail to properly handle long-length named ProjectName, SetParameter, NodeName, CCDParameter, SetColor, AlarmImage, GetParameter, GetColor, ServerResponse, SetBaud and IPAddress parameters, and attackers can build malicious A WEB page that entice a user to access, can crash an application or execute arbitrary code. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment. There are multiple stack-based buffer overflow vulnerabilities in Advantech WebAccess 7.1 and earlier versions
var-201805-1144 In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, several SQL injection vulnerabilities have been identified, which may allow an attacker to disclose sensitive information from the host. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Advantech WebAccess Node. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.The specific flaw exists within the handling of the GetAlarms function in BWMobileService.dll. When parsing the ProjectName parameter, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose sensitive information under the context of the database. Advantech WebAccess and others are products of Advantech. Advantech WebAccess is a browser-based HMI/SCADA software. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. WebAccess Dashboard is one of the dashboard components; WebAccess Scada Node is one of the monitoring node components. WebAccess/NMS is a suite of web browsers for the Network Management System (NMS). SQL injection vulnerabilities exist in several Advantech products. Advantech WebAccess is prone to the following security vulnerabilities: 1. Multiple SQL-injection vulnerabilities 2. An information-disclosure vulnerability 3. A file-upload vulnerability 4. Multiple directory-traversal vulnerabilities 5. Multiple stack-based buffer-overflow vulnerabilities 6. A heap-based buffer-overflow vulnerability 7. Multiple arbitrary code-execution vulnerabilities 8. A denial-of-service vulnerability 9. A security-bypass vulnerability 10. A privilege-escalation vulnerability An attacker can exploit these issues to execute arbitrary code in the context of the application, or modify data, or exploit latent vulnerabilities in the underlying database, delete arbitrary files, gain elevated privileges, perform certain unauthorized actions, upload arbitrary files to the affected application gain unauthorized access and obtain sensitive information. Failed attacks will cause denial of service conditions. Advantech WebAccess, etc. Advantech WebAccess is a set of HMI/SCADA software based on browser architecture. The following versions are affected: Advantech WebAccess 8.2_20170817 and earlier, 8.3.0 and earlier; WebAccess Dashboard 2.0.15 and earlier; WebAccess Scada Node 8.3.1 and earlier; WebAccess/NMS 2.0.3 and earlier
var-201805-1143 In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, several stack-based buffer overflow vulnerabilities have been identified, which may allow an attacker to execute arbitrary code. plural Advantech WebAccess The product contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess Node. Authentication is not required to exploit this vulnerability.The specific flaw exists within notify2.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code under the context of Administrator. Advantech WebAccess and others are products of Advantech. Advantech WebAccess is a browser-based HMI/SCADA software. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. WebAccess Dashboard is one of the dashboard components; WebAccess Scada Node is one of the monitoring node components. WebAccess/NMS is a suite of web browsers for the Network Management System (NMS). A stack buffer overflow vulnerability exists in several Advantech products. Advantech WebAccess is prone to the following security vulnerabilities: 1. Multiple SQL-injection vulnerabilities 2. An information-disclosure vulnerability 3. A file-upload vulnerability 4. Multiple directory-traversal vulnerabilities 5. Multiple stack-based buffer-overflow vulnerabilities 6. A heap-based buffer-overflow vulnerability 7. Multiple arbitrary code-execution vulnerabilities 8. A denial-of-service vulnerability 9. A security-bypass vulnerability 10. A privilege-escalation vulnerability An attacker can exploit these issues to execute arbitrary code in the context of the application, or modify data, or exploit latent vulnerabilities in the underlying database, delete arbitrary files, gain elevated privileges, perform certain unauthorized actions, upload arbitrary files to the affected application gain unauthorized access and obtain sensitive information. Failed attacks will cause denial of service conditions. Advantech WebAccess, etc. Advantech WebAccess is a set of HMI/SCADA software based on browser architecture. The following versions are affected: Advantech WebAccess 8.2_20170817 and earlier, 8.3.0 and earlier; WebAccess Dashboard 2.0.15 and earlier; WebAccess Scada Node 8.3.1 and earlier; WebAccess/NMS 2.0.3 and earlier
var-202004-0077 There are multiple ways an unauthenticated attacker could perform SQL injection on WebAccess/NMS (versions prior to 3.0.2) to gain access to sensitive information. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech WebAccess/NMS. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of calls to the getDeviceName method of the DBUtil class. When parsing the syslogs parameter of the emsSyslogs endpoint, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose files in the context of SYSTEM
var-202005-0008 Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple heap-based buffer overflow vulnerabilities exist caused by a lack of proper validation of the length of user-supplied data, which may allow remote code execution. Advantech WebAccess Node Is vulnerable to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech WebAccess/SCADA. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of IOCTL 0x00005226 in DATACORE.exe. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess is a browser-based SCADA software package for monitoring, data acquisition, and visualization. It is used to automate complex industrial processes when remote operation is required. The vulnerability is due to the fact that the program does not correctly verify the length of the data submitted by the user
var-202407-0233 Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process. Delta Electronics, INC. of cncsoft-g2 Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics CNCSoft-G2
var-200107-0035 slapd in OpenLDAP 1.x before 1.2.12, and 2.x before 2.0.8, allows remote attackers to cause a denial of service (crash) via an invalid Basic Encoding Rules (BER) length field. Multiple versions of OpenLDAP contain vulnerabilities that may allow denial-of-service attacks. These vulnerabilities were revealed using the PROTOS LDAPv3 test suite and are documented in CERT Advisory CA-2001-18. If your site uses this product, the CERT/CC encourages you to follow the advice provided below. Vulnerabilities exist in slapd in OpenLDAP 1.x versions prior to 1.2.12 and 2.x versions prior to 2.0.8
var-200512-0611 Multiple heap-based buffer overflows in QuickTime.qts in Apple QuickTime Player 7.0.3 and iTunes 6.0.1 (3) and earlier allow remote attackers to cause a denial of service (crash) and execute arbitrary code via a .mov file with (1) a Movie Resource atom with a large size value, or (2) an stsd atom with a modified Sample Description Table size value, and possibly other vectors involving media files. NOTE: item 1 was originally identified by CVE-2005-4127 for a pre-patch announcement, and item 2 was originally identified by CVE-2005-4128 for a pre-patch announcement. Apple's QuickTime is a player for files and streaming media in a variety of different formats. A flaw in QuickTime's handling of Targa (TGA) image format files could allow a remote attacker to execute arbitrary code on a vulnerable system. Apple From QuickTime Version that fixes multiple vulnerabilities in 7.0.4 Has been released.Arbitrary code may be executed by a remote third party, DoS You can be attacked. For more information, see the information provided by the vendor. These issues arise when the application handles specially crafted QTIF, TGA, TIFF, and GIF image formats. Successful exploits of these issues may allow remote attackers to trigger a denial-of-service condition or to gain unauthorized access. This issue affects both Mac OS X and Microsoft Windows releases of the software. This issue may be triggered when the application processes a malformed movie (.MOV) file. Successful exploitation will result in execution of arbitrary code in the context of the currently logged in user. This issue affects Apple QuickTime 7.0.3 and iTunes 6.0.1. Earlier versions may also be affected. Multiple buffer overflow vulnerabilities exist in QuickTime.qts. This specific flaw exists within the QuickTime.qts file which many applications access QuickTime's functionality through. By specially crafting atoms within a movie file, a direct heap overwrite is triggered, and reliable code execution is then possible. Technical Details: Technical Description: The code in QuickTime.qts responsible for the size of the Sample Description Table entries from the 'stsd' atom in a QuickTime-format movie on the heap. According to developer.apple.com, the format of the Sample Description Atom is as follows: Field Description ---------------------------------------------------------------- Size 32-bit int Data Format 4 char code Reserved 6 bytes that must be 0 Data Reference Index 16-bit int Hint Track Version 16-bit unsigned int Last compatible hint track version 16-bit unsigned int Max Packet Size 32-bit int Additional Data Table Variable By setting the size of the Sample Description Table to a size of 00 15 - 00 D0 will cause a heap-based overflow. By supplying the "Last compatible hint track version" field with the value of 00 05 - 00 09, an insufficiently-sized heap block will be allocated, resulting in a classic complete heap memory overwrite during the RtlAllocateHeap() function and the attacker can control memory with data taken from the filename of the .MOV file. This vulnerability can be successfully exploited via an embedded media player in an HTML page, email, or HTML link. References QuickTime: QuickTime File Format http://developer.apple.com/documentation/QuickTime/QTFF/index.html Protection: Retina Network Security Scanner has been updated to identify this vulnerability. Vendor Status: Apple has released a patch for this vulnerability. The patch is available via the Updates section of the affected applications. This vulnerability has been assigned the CVE identifier CVE-2005-4092. Credit: Discovery: Karl Lynn Greetings: 0x41414141 Copyright (c) 1998-2006 eEye Digital Security Permission is hereby granted for the redistribution of this alert electronically. It is not to be edited in any way without express consent of eEye. If you wish to reprint the whole or any part of this alert in any other medium excluding electronic medium, please email alert@eEye.com for permission. Disclaimer The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are no warranties, implied or express, with regard to this information. In no event shall the author be liable for any direct or indirect damages whatsoever arising out of or in connection with the use or spread of this information. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA06-011A Apple QuickTime Vulnerabilities Original release date: January 11, 2006 Last revised: January 11, 2006 Source: US-CERT Systems Affected Apple QuickTime on systems running * Apple Mac OS X * Microsoft Windows XP * Microsoft Windows 2000 Overview Apple has released QuickTime 7.0.4 to correct multiple vulnerabilities. The impacts of these vulnerabilities include execution of arbitrary code and denial of service. I. (CAN-2005-3713) II. Impact The impacts of these vulnerabilities vary. For information about specific impacts, please see the Vulnerability Notes. III. Solution Upgrade Upgrade to QuickTime 7.0.4. Appendix A. References * US-CERT Vulnerability Note VU#629845 - <http://www.kb.cert.org/vuls/id/629845> * US-CERT Vulnerability Note VU#921193 - <http://www.kb.cert.org/vuls/id/921193> * US-CERT Vulnerability Note VU#115729 - <http://www.kb.cert.org/vuls/id/115729> * US-CERT Vulnerability Note VU#150753 - <http://www.kb.cert.org/vuls/id/150753> * US-CERT Vulnerability Note VU#913449 - <http://www.kb.cert.org/vuls/id/913449> * CVE-2005-2340 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2340> * CVE-2005-4092 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4092> * CVE-2005-3707 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3707> * CVE-2005-3710 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3710> * CVE-2005-3713 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3713> * Security Content for QuickTime 7.0.4 - <http://docs.info.apple.com/article.html?artnum=303101> * QuickTime 7.0.4 - <http://www.apple.com/support/downloads/quicktime704.html> * About the Mac OS X 10.4.4 Update (Delta) - <http://docs.info.apple.com/article.html?artnum=302810> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA06-011A.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA06-011A Feedback VU#913449" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2006 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History January 11, 2006: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBQ8V8iX0pj593lg50AQJ85wf+OuHVseQVzZ0uI8h8TnmtAJmjzV6tp3Cj 34jwpSLlvo5S8svIHChcX/BYOwKVL/uQZswsjk/mbEu+TrPcVKPd7VPCetxIXVey AdC5hsAH1Wm0MnvY1LgvONo8IQ9RlT6Rj6fY7k7QhPUWsYxj/rDCWDAY9kgsHXc/ HpXWL/Cy5va35z8aYHrLVlxmofKrOWtX0PVa6lSKV8lIsY+TDihA5tYIb5wRDVxL osieJ+MHSXGchXpjX2c0o6Ja6vhJNR61LEwelk9FMLT1JRTkp+wz9/AoVUSyZ/hy 0WBP0M8cwl8koWgijNcLXA18YX8QtDftAVRwpwHKMrbNCYdrWblYVw== =5Kiq -----END PGP SIGNATURE-----
var-200512-0297 Integer overflow in Apple Quicktime before 7.0.4 allows remote attackers to execute arbitrary code via a TIFF image file with modified image height and width (ImageWidth) tags. Apple's QuickTime is a player for files and streaming media in a variety of different formats. Apple From QuickTime Version that fixes multiple vulnerabilities in 7.0.4 Has been released.Arbitrary code may be executed by a remote third party, DoS You can be attacked. For more information, see the information provided by the vendor. QuickTime is prone to a remote integer-overflow vulnerability. This issue presents itself when the application processes a specially crafted TIFF file. A successful attack can result in a remote compromise. Versions prior to QuickTime 7.0.4 are vulnerable. Fortinet Security Advisory: FSA-2006-03 Apple QuickTime Player ImageWidth Denial of Service Vulnerability Advisory Date : January 12, 2006 Reported Date : November 28, 2005 Vendor : Apple computers Affected Products : Apple QuickTime Player v7.0.3 Severity : Medium Reference : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3710 http://docs.info.apple.com/article.html?artnum=303101 http://www.securityfocus.com/bid/16202/info Description : Fortinet Security Research Team (FSRT) has discovered a Denial of Service Vulnerability in the Apple QuickTime Player. This is due to application failure to sanitize the parameter ImageWidth value while parsing TIFF image files. Impact : Denial of Service Solution : Apple Computers has released a security update for this vulnerability, which is available for downloading from Apples's web site under security update. Fortinet Protection: Fortinet is protecting network from this vulnerability with latest IPS update. Acknowledgment : Dejun Meng of Fortinet Security Research team found this vulnerability. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA06-011A Apple QuickTime Vulnerabilities Original release date: January 11, 2006 Last revised: January 11, 2006 Source: US-CERT Systems Affected Apple QuickTime on systems running * Apple Mac OS X * Microsoft Windows XP * Microsoft Windows 2000 Overview Apple has released QuickTime 7.0.4 to correct multiple vulnerabilities. The impacts of these vulnerabilities include execution of arbitrary code and denial of service. I. Description Apple QuickTime 7.0.4 resolves a number of image and media file handling vulnerabilities. (CAN-2005-3713) II. Impact The impacts of these vulnerabilities vary. For information about specific impacts, please see the Vulnerability Notes. Potential consequences include remote execution of arbitrary code or commands and denial of service. III. Solution Upgrade Upgrade to QuickTime 7.0.4. Appendix A. References * US-CERT Vulnerability Note VU#629845 - <http://www.kb.cert.org/vuls/id/629845> * US-CERT Vulnerability Note VU#921193 - <http://www.kb.cert.org/vuls/id/921193> * US-CERT Vulnerability Note VU#115729 - <http://www.kb.cert.org/vuls/id/115729> * US-CERT Vulnerability Note VU#150753 - <http://www.kb.cert.org/vuls/id/150753> * US-CERT Vulnerability Note VU#913449 - <http://www.kb.cert.org/vuls/id/913449> * CVE-2005-2340 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2340> * CVE-2005-4092 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4092> * CVE-2005-3707 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3707> * CVE-2005-3710 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3710> * CVE-2005-3713 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3713> * Security Content for QuickTime 7.0.4 - <http://docs.info.apple.com/article.html?artnum=303101> * QuickTime 7.0.4 - <http://www.apple.com/support/downloads/quicktime704.html> * About the Mac OS X 10.4.4 Update (Delta) - <http://docs.info.apple.com/article.html?artnum=302810> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA06-011A.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA06-011A Feedback VU#913449" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2006 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History January 11, 2006: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBQ8V8iX0pj593lg50AQJ85wf+OuHVseQVzZ0uI8h8TnmtAJmjzV6tp3Cj 34jwpSLlvo5S8svIHChcX/BYOwKVL/uQZswsjk/mbEu+TrPcVKPd7VPCetxIXVey AdC5hsAH1Wm0MnvY1LgvONo8IQ9RlT6Rj6fY7k7QhPUWsYxj/rDCWDAY9kgsHXc/ HpXWL/Cy5va35z8aYHrLVlxmofKrOWtX0PVa6lSKV8lIsY+TDihA5tYIb5wRDVxL osieJ+MHSXGchXpjX2c0o6Ja6vhJNR61LEwelk9FMLT1JRTkp+wz9/AoVUSyZ/hy 0WBP0M8cwl8koWgijNcLXA18YX8QtDftAVRwpwHKMrbNCYdrWblYVw== =5Kiq -----END PGP SIGNATURE-----
var-200512-0294 Buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to execute arbitrary code via crafted TGA image files. Apple's QuickTime is a player for files and streaming media in a variety of different formats. For more information, see the information provided by the vendor. QuickTime is prone to a remote buffer-overflow vulnerability. This issue presents itself when the application processes a specially crafted TGA image file. A successful attack can result in a remote compromise. Versions prior to QuickTime 7.0.4 are vulnerable. Fortinet Security Advisory: FSA-2006-04 Apple QuickTime Player Improper Memory Access Vulnerability Advisory Date : January 12, 2006 Reported Date : November 28, 2005 Vendor : Apple computers Affected Products : Apple QuickTime Player v7.0.3 Severity : High Reference : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3707 http://docs.info.apple.com/article.html?artnum=303101 http://www.securityfocus.com/bid/16202/info Description : Fortinet Security Research Team (FSRT) has discovered a Improper Memory Access Vulnerability in the Apple QuickTime Player. Impact : Execute arbitrary code Solution : Apple Computers has released a security update for this vulnerability, which is available for downloading from Apples's web site under security update. Fortinet Protection: Fortinet is protecting network from this vulnerability with latest IPS update. Acknowledgment : Dejun Meng of Fortinet Security Research team found this vulnerability. Disclaimer : Although Fortinet has attempted to provide accurate information in these materials, Fortinet assumes no legal responsibility for the accuracy or completeness of the information. Please note that Fortinet's product information does not constitute or contain any guarantee, warranty or legally binding representation, unless expressly identified as such in a duly signed writing. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA06-011A Apple QuickTime Vulnerabilities Original release date: January 11, 2006 Last revised: January 11, 2006 Source: US-CERT Systems Affected Apple QuickTime on systems running * Apple Mac OS X * Microsoft Windows XP * Microsoft Windows 2000 Overview Apple has released QuickTime 7.0.4 to correct multiple vulnerabilities. The impacts of these vulnerabilities include execution of arbitrary code and denial of service. I. Description Apple QuickTime 7.0.4 resolves a number of image and media file handling vulnerabilities. (CAN-2005-3713) II. Impact The impacts of these vulnerabilities vary. For information about specific impacts, please see the Vulnerability Notes. Potential consequences include remote execution of arbitrary code or commands and denial of service. III. Solution Upgrade Upgrade to QuickTime 7.0.4. Appendix A. References * US-CERT Vulnerability Note VU#629845 - <http://www.kb.cert.org/vuls/id/629845> * US-CERT Vulnerability Note VU#921193 - <http://www.kb.cert.org/vuls/id/921193> * US-CERT Vulnerability Note VU#115729 - <http://www.kb.cert.org/vuls/id/115729> * US-CERT Vulnerability Note VU#150753 - <http://www.kb.cert.org/vuls/id/150753> * US-CERT Vulnerability Note VU#913449 - <http://www.kb.cert.org/vuls/id/913449> * CVE-2005-2340 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2340> * CVE-2005-4092 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4092> * CVE-2005-3707 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3707> * CVE-2005-3710 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3710> * CVE-2005-3713 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3713> * Security Content for QuickTime 7.0.4 - <http://docs.info.apple.com/article.html?artnum=303101> * QuickTime 7.0.4 - <http://www.apple.com/support/downloads/quicktime704.html> * About the Mac OS X 10.4.4 Update (Delta) - <http://docs.info.apple.com/article.html?artnum=302810> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA06-011A.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA06-011A Feedback VU#913449" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2006 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History January 11, 2006: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBQ8V8iX0pj593lg50AQJ85wf+OuHVseQVzZ0uI8h8TnmtAJmjzV6tp3Cj 34jwpSLlvo5S8svIHChcX/BYOwKVL/uQZswsjk/mbEu+TrPcVKPd7VPCetxIXVey AdC5hsAH1Wm0MnvY1LgvONo8IQ9RlT6Rj6fY7k7QhPUWsYxj/rDCWDAY9kgsHXc/ HpXWL/Cy5va35z8aYHrLVlxmofKrOWtX0PVa6lSKV8lIsY+TDihA5tYIb5wRDVxL osieJ+MHSXGchXpjX2c0o6Ja6vhJNR61LEwelk9FMLT1JRTkp+wz9/AoVUSyZ/hy 0WBP0M8cwl8koWgijNcLXA18YX8QtDftAVRwpwHKMrbNCYdrWblYVw== =5Kiq -----END PGP SIGNATURE-----
var-200512-0643 Heap-based buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to execute arbitrary code via a crafted (1) QuickTime Image File (QTIF), (2) PICT, or (3) JPEG format image with a long data field. Apple's QuickTime is a player for files and streaming media in a variety of different formats. QuickTime is prone to a remote heap-based overflow vulnerability. This issue presents itself when the application processes a specially crafted QTIF (QuickTime Image) file. A successful attack can result in a remote compromise. Apple QuickTime is prone to a buffer-overflow vulnerability because the application fails to do proper bounds checking on user-supplied data before copying it to finite-sized process buffers. Unsuccessful exploit attempts will most likely crash the application. This issue affects QuickTime 6.5.2 and 7.0.3; other versions may also be vulnerable. QuickTime 7.0.4 may also be vulnerable, but this has not been confirmed. This issue may have previously been discussed in BID 16202 (Apple QuickTime Multiple Code Execution Vulnerabilities). Quicktime will copy to the stack byte by byte when processing the data field of the qtif format file, but it does not perform the correct check, so it will cause a stack overflow in memory. The original function pointer value is 0x44332211. Just overflow it to 0x08332211 and make sure it doesn't crash before overflowing 0x44 to 0x08, and the code will execute. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA06-011A Apple QuickTime Vulnerabilities Original release date: January 11, 2006 Last revised: January 11, 2006 Source: US-CERT Systems Affected Apple QuickTime on systems running * Apple Mac OS X * Microsoft Windows XP * Microsoft Windows 2000 Overview Apple has released QuickTime 7.0.4 to correct multiple vulnerabilities. The impacts of these vulnerabilities include execution of arbitrary code and denial of service. I. (CAN-2005-3713) II. Impact The impacts of these vulnerabilities vary. For information about specific impacts, please see the Vulnerability Notes. Potential consequences include remote execution of arbitrary code or commands and denial of service. III. Solution Upgrade Upgrade to QuickTime 7.0.4. Appendix A. References * US-CERT Vulnerability Note VU#629845 - <http://www.kb.cert.org/vuls/id/629845> * US-CERT Vulnerability Note VU#921193 - <http://www.kb.cert.org/vuls/id/921193> * US-CERT Vulnerability Note VU#115729 - <http://www.kb.cert.org/vuls/id/115729> * US-CERT Vulnerability Note VU#150753 - <http://www.kb.cert.org/vuls/id/150753> * US-CERT Vulnerability Note VU#913449 - <http://www.kb.cert.org/vuls/id/913449> * CVE-2005-2340 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2340> * CVE-2005-4092 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4092> * CVE-2005-3707 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3707> * CVE-2005-3710 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3710> * CVE-2005-3713 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3713> * Security Content for QuickTime 7.0.4 - <http://docs.info.apple.com/article.html?artnum=303101> * QuickTime 7.0.4 - <http://www.apple.com/support/downloads/quicktime704.html> * About the Mac OS X 10.4.4 Update (Delta) - <http://docs.info.apple.com/article.html?artnum=302810> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA06-011A.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA06-011A Feedback VU#913449" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2006 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History January 11, 2006: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBQ8V8iX0pj593lg50AQJ85wf+OuHVseQVzZ0uI8h8TnmtAJmjzV6tp3Cj 34jwpSLlvo5S8svIHChcX/BYOwKVL/uQZswsjk/mbEu+TrPcVKPd7VPCetxIXVey AdC5hsAH1Wm0MnvY1LgvONo8IQ9RlT6Rj6fY7k7QhPUWsYxj/rDCWDAY9kgsHXc/ HpXWL/Cy5va35z8aYHrLVlxmofKrOWtX0PVa6lSKV8lIsY+TDihA5tYIb5wRDVxL osieJ+MHSXGchXpjX2c0o6Ja6vhJNR61LEwelk9FMLT1JRTkp+wz9/AoVUSyZ/hy 0WBP0M8cwl8koWgijNcLXA18YX8QtDftAVRwpwHKMrbNCYdrWblYVw== =5Kiq -----END PGP SIGNATURE-----
Vulnerabilities are sorted by update time (recent to old).
ID Description Publish Date Update Date
jvndb-2024-000114 Multiple vulnerabilities in baserCMS 2024-10-25T15:07+09:00 2025-02-18T15:35+09:00
jvndb-2025-001548 Out-of-bounds read vulnerability in Cente middleware 2025-02-17T18:22+09:00 2025-02-17T18:22+09:00
jvndb-2025-000012 Multiple vulnerabilities in The LuxCal Web Calendar 2025-02-17T13:43+09:00 2025-02-17T13:43+09:00
jvndb-2025-000013 acmailer CGI and acmailer DB vulnerable to OS command injection 2025-02-14T16:39+09:00 2025-02-14T16:39+09:00
jvndb-2025-000002 Multiple vulnerabilities in NEC Aterm series (NV25-003) 2025-02-14T15:48+09:00 2025-02-14T15:48+09:00
jvndb-2023-002797 Multiple vulnerabilities in ELECOM and LOGITEC network devices 2023-08-15T11:54+09:00 2025-02-13T15:21+09:00
jvndb-2024-001061 ELECOM wireless LAN routers vulnerable to OS command injection 2024-01-24T17:16+09:00 2025-02-13T14:31+09:00
jvndb-2025-000011 Multiple vulnerabilities in FileMegane 2025-02-13T13:39+09:00 2025-02-13T13:39+09:00
jvndb-2025-000010 acmailer vulnerable to cross-site scripting 2025-02-12T15:05+09:00 2025-02-12T15:05+09:00
jvndb-2024-000078 Multiple vulnerabilities in ELECOM wireless LAN routers 2024-07-30T15:34+09:00 2025-02-12T14:34+09:00
jvndb-2025-001017 Multiple vulnerabilities in STEALTHONE D220/D340/D440 2025-02-06T18:27+09:00 2025-02-06T18:27+09:00
jvndb-2025-001016 OMRON NJ/NX series vulnerable to path traversal 2025-02-06T18:27+09:00 2025-02-06T18:27+09:00
jvndb-2025-001018 Improper restriction of XML external entity reference (XXE) vulnerability in OMRON NB-Designer 2025-02-06T18:26+09:00 2025-02-06T18:26+09:00
jvndb-2025-000008 Multiple vulnerabilities in Defense Platform Home Edition 2025-02-05T14:06+09:00 2025-02-05T14:06+09:00
jvndb-2025-000009 WordPress Plugin "Activity Log WinterLock" vulnerable to cross-site request forgery 2025-02-04T13:58+09:00 2025-02-04T13:58+09:00
jvndb-2025-001244 Clickjacking Vulnerability in JP1/ServerConductor/Deployment Manager 2025-01-30T18:19+09:00 2025-01-30T18:19+09:00
jvndb-2025-000007 SXF Common Library vulnerable to improper input data handling 2025-01-29T14:57+09:00 2025-01-29T14:57+09:00
jvndb-2025-001238 Multiple out-of-bounds write vulnerabilities in Canon Office/Small Office Multifunction Printers and Laser Printers 2025-01-29T13:41+09:00 2025-01-29T13:41+09:00
jvndb-2025-000006 WordPress Plugin "Simple Image Sizes" vulnerable to cross-site scripting 2025-01-28T13:44+09:00 2025-01-28T13:44+09:00
jvndb-2025-000005 EXIF Viewer Classic vulnerable to cross-site scripting 2025-01-27T14:25+09:00 2025-01-27T14:25+09:00
jvndb-2025-000003 FortiWeb vulnerable to SQL injection 2025-01-21T15:59+09:00 2025-01-21T15:59+09:00
jvndb-2025-001027 Linux Ratfor vulnerable to stack-based buffer overflow 2025-01-16T13:27+09:00 2025-01-16T13:27+09:00
jvndb-2025-000001 PLANEX COMMUNICATIONS MZK-DP300N vulnerable to cross-site scripting 2025-01-08T17:08+09:00 2025-01-08T17:08+09:00
jvndb-2024-015471 Trend Micro Deep Security 20.0 Agent (for Windows) vulnerable to uncontrolled search path element 2024-12-25T11:28+09:00 2024-12-25T11:28+09:00
jvndb-2024-015393 Multiple security updates for Trend Micro Apex One and Apex One as a Service (December 2024) 2024-12-23T12:52+09:00 2024-12-23T12:52+09:00
jvndb-2024-000125 Multiple vulnerabilities in I-O DATA routers UD-LT1 and UD-LT1/EX 2024-12-04T15:22+09:00 2024-12-18T15:20+09:00
jvndb-2024-014918 Authentication Bypass Vulnerability in Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center Analyzer 2024-12-17T15:23+09:00 2024-12-17T15:23+09:00
jvndb-2024-000128 Multiple vulnerabilities in SHARP routers 2024-12-17T07:54+09:00 2024-12-17T07:54+09:00
jvndb-2024-000127 "Shonen Jump+" App for Android fails to restrict custom URL schemes properly 2024-12-16T15:07+09:00 2024-12-16T15:07+09:00
jvndb-2024-014825 WordPress Plugin "My WP Customize Admin/Frontend" vulnerable to cross-site scripting 2024-12-16T13:57+09:00 2024-12-16T13:57+09:00