Vulnerabilities > Configuration

DATE CVE VULNERABILITY TITLE RISK
2011-05-13 CVE-2011-1406 Configuration vulnerability in Mahara
Mahara before 1.3.6 does not properly handle an https URL in the wwwroot configuration setting, which makes it easier for user-assisted remote attackers to obtain credentials by sniffing the network at a time when an http URL is used for a login.
network
mahara CWE-16
4.3
2011-05-10 CVE-2011-2077 Configuration vulnerability in Inventivetec Mediacast
The default configuration of the New Atlanta BlueDragon administrative interface in MediaCAST 8 and earlier enables external TCP connections to port 10000, instead of connections only from 127.0.0.1, which makes it easier for remote attackers to have an unspecified impact via a TCP session.
network
low complexity
inventivetec CWE-16
7.5
2011-04-29 CVE-2011-1499 Configuration vulnerability in multiple products
acl.c in Tinyproxy before 1.8.3, when an Allow configuration setting specifies a CIDR block, permits TCP connections from all IP addresses, which makes it easier for remote attackers to hide the origin of web traffic by leveraging the open HTTP proxy server.
network
high complexity
banu debian CWE-16
2.6
2011-04-10 CVE-2011-1681 Configuration vulnerability in VMWare Open-Vm-Tools
vmware-hgfsmounter in VMware Open Virtual Machine Tools (aka open-vm-tools) 8.4.2-261024 and earlier attempts to append to the /etc/mtab file without first checking whether resource limits would interfere, which allows local users to trigger corruption of this file via a process with a small RLIMIT_FSIZE value, a related issue to CVE-2011-1089.
local
vmware CWE-16
3.3
2011-04-10 CVE-2011-1089 Configuration vulnerability in GNU Glibc
The addmntent function in the GNU C Library (aka glibc or libc6) 2.13 and earlier does not report an error status for failed attempts to write to the /etc/mtab file, which makes it easier for local users to trigger corruption of this file, as demonstrated by writes from a process with a small RLIMIT_FSIZE value, a different vulnerability than CVE-2010-0296.
local
gnu CWE-16
3.3
2011-03-23 CVE-2011-0189 Configuration vulnerability in Apple mac OS X, mac OS X Server and Terminal
The default configuration of Terminal in Apple Mac OS X 10.6 before 10.6.7 uses SSH protocol version 1 within the New Remote Connection dialog, which might make it easier for man-in-the-middle attackers to spoof SSH servers by leveraging protocol vulnerabilities.
network
low complexity
apple CWE-16
5.0
2011-01-25 CVE-2011-0639 Configuration vulnerability in Apple mac OS X
Apple Mac OS X does not properly warn the user before enabling additional Human Interface Device (HID) functionality over USB, which allows user-assisted attackers to execute arbitrary programs via crafted USB data, as demonstrated by keyboard and mouse data sent by malware on a smartphone that the user connected to the computer.
local
apple CWE-16
6.9
2011-01-25 CVE-2011-0638 Configuration vulnerability in Microsoft Windows
Microsoft Windows does not properly warn the user before enabling additional Human Interface Device (HID) functionality over USB, which allows user-assisted attackers to execute arbitrary programs via crafted USB data, as demonstrated by keyboard and mouse data sent by malware on a smartphone that the user connected to the computer.
6.9
2011-01-18 CVE-2009-5051 Configuration vulnerability in Hastymail Hastymail2
Hastymail2 before RC 8 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
network
low complexity
hastymail CWE-16
5.0
2011-01-10 CVE-2011-0400 Configuration vulnerability in Matomo
Cookie.php in Piwik before 1.1 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
network
low complexity
matomo CWE-16
5.0