Vulnerabilities

DATE CVE VULNERABILITY TITLE RISK
2014-04-16 CVE-2014-0414 Remote Security vulnerability in Oracle Fusion Middleware 10.1.3.5
Unspecified vulnerability in the Oracle Containers for J2EE component in Oracle Fusion Middleware 10.1.3.5 allows remote attackers to affect confidentiality via vectors related to HTTP Request Handling.
network
low complexity
oracle
5.0
2014-04-16 CVE-2014-0413 Remote Security vulnerability in Oracle Fusion Middleware 10.1.3.5
Unspecified vulnerability in the Oracle Containers for J2EE component in Oracle Fusion Middleware 10.1.3.5 allows remote attackers to affect integrity via vectors related to HTTP Request Handling, a different vulnerability than CVE-2014-0426.
network
oracle
4.3
2014-04-16 CVE-2014-0384 Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via vectors related to XML.
network
low complexity
oracle mariadb redhat
4.0
2014-04-16 CVE-2013-4768 Improper Input Validation vulnerability in Eucalyptus
The web services APIs in Eucalyptus 2.0 through 3.4.1 allow remote attackers to cause a denial of service via vectors related to the "network connection clean up code" and (1) Cloud Controller (CLC), (2) Walrus, (3) Storage Controller (SC), and (4) VMware Broker (VB).
network
low complexity
eucalyptus CWE-20
5.0
2014-04-15 CVE-2014-2858 Path Traversal vulnerability in Gopivotal Grails and Grails-Resources
Directory traversal vulnerability in the Resources plugin 1.0.0 before 1.2.6 for Pivotal Grails 2.0.0 through 2.3.6 allows remote attackers to obtain sensitive information via unspecified vectors related to a "configured block." NOTE: this issue was SPLIT from CVE-2014-0053 per ADT2 due to different vulnerability types.
network
low complexity
gopivotal CWE-22
5.0
2014-04-15 CVE-2014-2857 Permissions, Privileges, and Access Controls vulnerability in Gopivotal Grails and Grails-Resources
The default configuration of the Resources plugin 1.0.0 before 1.2.6 for Pivotal Grails 2.0.0 through 2.3.6 does not properly restrict access to files in the META-INF directory, which allows remote attackers to obtain sensitive information via a direct request.
network
low complexity
gopivotal CWE-264
5.0
2014-04-15 CVE-2014-0053 Permissions, Privileges, and Access Controls vulnerability in Gopivotal Grails and Grails-Resources
The default configuration of the Resources plugin 1.0.0 before 1.2.6 for Pivotal Grails 2.0.0 before 2.3.6 does not properly restrict access to files in the WEB-INF directory, which allows remote attackers to obtain sensitive information via a direct request.
network
low complexity
gopivotal CWE-264
5.0
2014-04-15 CVE-2011-3628 Unspecified vulnerability in Canonical Libpam-Modules and Ubuntu Linux
Untrusted search path vulnerability in pam_motd (aka the MOTD module) in libpam-modules before 1.1.3-2ubuntu2.1 on Ubuntu 11.10, before 1.1.2-2ubuntu8.4 on Ubuntu 11.04, before 1.1.1-4ubuntu2.4 on Ubuntu 10.10, before 1.1.1-2ubuntu5.4 on Ubuntu 10.04 LTS, and before 0.99.7.1-5ubuntu6.5 on Ubuntu 8.04 LTS, when using certain configurations such as "session optional pam_motd.so", allows local users to gain privileges by modifying the PATH environment variable to reference a malicious command, as demonstrated via uname.
local
canonical
6.9
2014-04-15 CVE-2010-2236 Improper Input Validation vulnerability in Redhat Network Proxy, Satellite and Spacewalk-Java
The monitoring probe display in spacewalk-java before 2.1.148-1 and Red Hat Network (RHN) Satellite 4.0.0 through 4.2.0 and 5.1.0 through 5.3.0, and Proxy 5.3.0, allows remote authenticated users with permissions to administer monitoring probes to execute arbitrary code via unspecified vectors, related to backticks.
network
redhat CWE-20
6.0
2014-04-15 CVE-2008-3277 Path Traversal vulnerability in Openfabrics Ibutils 1.211.2/1.5.72
Untrusted search path vulnerability in a certain Red Hat build script for the ibmssh executable in ibutils packages before ibutils-1.5.7-2.el6 in Red Hat Enterprise Linux (RHEL) 6 and ibutils-1.2-11.2.el5 in Red Hat Enterprise Linux (RHEL) 5 allows local users to gain privileges via a Trojan Horse program in refix/lib/, related to an incorrect RPATH setting in the ELF header.
4.4