Weekly Vulnerabilities Reports > September 24 to 30, 2012
Overview
68 new vulnerabilities reported during this period, including 13 critical vulnerabilities and 22 high severity vulnerabilities. This weekly summary report vulnerabilities in 69 products from 35 vendors including Cisco, IBM, HP, Redhat, and Trevor Mckay. Vulnerabilities are notably categorized as "Resource Management Errors", "Cross-site Scripting", "Permissions, Privileges, and Access Controls", "Improper Input Validation", and "SQL Injection".
- 67 reported vulnerabilities are remotely exploitables.
- 22 reported vulnerabilities are related to weaknesses in OWASP Top Ten.
- 62 reported vulnerabilities are exploitable by an anonymous user.
- Cisco has the most reported vulnerabilities, with 10 reported vulnerabilities.
- HP has the most reported critical vulnerabilities, with 5 reported vulnerabilities.
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
EXPLOITABLE
EXPLOITABLE
AVAILABLE
ANONYMOUSLY
WEB APPLICATION
Vulnerability Details
The following table list reported vulnerabilities for the period covered by this report:
13 Critical Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2012-09-28 | CVE-2012-5197 | Condor Project | Unspecified vulnerability in Condor Project Condor Multiple unspecified vulnerabilities in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 have unknown impact and attack vectors related to "error checking of system calls." | 10.0 |
2012-09-28 | CVE-2012-5196 | Condor Project | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Condor Project Condor Multiple buffer overflows in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 have unknown impact and attack vectors. | 10.0 |
2012-09-28 | CVE-2012-0417 | Novell | Numeric Errors vulnerability in Novell Groupwise Integer overflow in GroupWise Internet Agent (GWIA) in Novell GroupWise 8.0 before Support Pack 3 and 2012 before Support Pack 1 allows remote attackers to execute arbitrary code via unspecified vectors. | 10.0 |
2012-09-25 | CVE-2012-3298 | IBM | Denial-Of-Service vulnerability in IBM Websphere Commerce 7.0 Unspecified vulnerability in the REST services framework in IBM WebSphere Commerce 7.0 Feature Pack 4 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via unspecified vectors. | 10.0 |
2012-09-25 | CVE-2012-3263 | HP | Unspecified vulnerability in HP Sitescope 11.10/11.11/11.12 Unspecified vulnerability in a SOAP feature in HP SiteScope 11.10 through 11.12 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1465. | 10.0 |
2012-09-25 | CVE-2012-3262 | HP | Unspecified vulnerability in HP Sitescope 11.10/11.11/11.12 Unspecified vulnerability in a SOAP feature in HP SiteScope 11.10 through 11.12 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1464. | 10.0 |
2012-09-25 | CVE-2012-3261 | HP | Unspecified vulnerability in HP Sitescope 11.10/11.11/11.12 Unspecified vulnerability in a SOAP feature in HP SiteScope 11.10 through 11.12 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1463. | 10.0 |
2012-09-25 | CVE-2012-3260 | HP | Unspecified vulnerability in HP Sitescope 11.10/11.11/11.12 Unspecified vulnerability in a SOAP feature in HP SiteScope 11.10 through 11.12 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1462. | 10.0 |
2012-09-25 | CVE-2012-3259 | HP | Unspecified vulnerability in HP Sitescope 11.10/11.11/11.12 Unspecified vulnerability in a SOAP feature in HP SiteScope 11.10 through 11.12 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1461. | 10.0 |
2012-09-28 | CVE-2012-0418 | Novell Microsoft | Remote Code Execution vulnerability in Novell Groupwise Client Unspecified vulnerability in the client in Novell GroupWise 8.0 before Support Pack 3 and 2012 before Support Pack 1 on Windows allows user-assisted remote attackers to execute arbitrary code via a crafted file. | 9.3 |
2012-09-24 | CVE-2012-4655 | Cisco | Improper Input Validation vulnerability in Cisco Secure Desktop The WebLaunch feature in Cisco Secure Desktop before 3.6.6020 does not properly validate binaries that are received by the downloader process, which allows remote attackers to execute arbitrary code via vectors involving (1) ActiveX or (2) Java components, aka Bug IDs CSCtz76128 and CSCtz78204. | 9.3 |
2012-09-25 | CVE-2012-3334 | IBM | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in IBM Informix Dynamic Server Stack-based buffer overflow in IBM Informix Dynamic Server (IDS) 11.50 before 11.50.xC9W2 and 11.70 before 11.70.xC5 allows remote authenticated users to execute arbitrary code via crafted arguments in a SET COLLATION statement. | 9.0 |
2012-09-25 | CVE-2012-3324 | IBM Microsoft | Path Traversal vulnerability in IBM DB2 and DB2 Connect Directory traversal vulnerability in the UTL_FILE module in IBM DB2 and DB2 Connect 10.1 before FP1 on Windows allows remote authenticated users to modify, delete, or read arbitrary files via a pathname in the file field. | 9.0 |
22 High Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2012-09-24 | CVE-2012-5054 | Adobe | Integer Overflow or Wraparound vulnerability in Adobe Flash Player Integer overflow in the copyRawDataTo method in the Matrix3D class in Adobe Flash Player before 11.4.402.265 allows remote attackers to execute arbitrary code via malformed arguments. | 8.8 |
2012-09-25 | CVE-2012-2287 | EMC Microsoft | Improper Authentication vulnerability in EMC products The authentication functionality in EMC RSA Authentication Agent 7.1 and RSA Authentication Client 3.5 on Windows XP and Windows Server 2003, when an unspecified configuration exists, allows remote authenticated users to bypass an intended token-authentication step, and establish a login session to a remote host, by leveraging Windows credentials for that host. | 8.5 |
2012-09-28 | CVE-2012-5049 | Optimalog | Improper Input Validation vulnerability in Optimalog Optima PLC APIFTP Server in Optimalog Optima PLC 1.5.2 and earlier allows remote attackers to cause a denial of service (infinite loop) via a malformed packet. | 7.8 |
2012-09-28 | CVE-2012-5048 | Optimalog | Resource Management Errors vulnerability in Optimalog Optima PLC APIFTP Server in Optimalog Optima PLC 1.5.2 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted packet. | 7.8 |
2012-09-27 | CVE-2012-4623 | Cisco | Improper Input Validation vulnerability in Cisco IOS and IOS XE The DHCPv6 server in Cisco IOS 12.2 through 12.4 and 15.0 through 15.2 and IOS XE 2.1.x through 2.6.x, 3.1.xS before 3.1.4S, 3.1.xSG and 3.2.xSG before 3.2.5SG, 3.2.xS, 3.2.xXO, 3.3.xS, and 3.3.xSG before 3.3.1SG allows remote attackers to cause a denial of service (device reload) via a malformed DHCPv6 packet, aka Bug ID CSCto57723. | 7.8 |
2012-09-27 | CVE-2012-4621 | Cisco | Resource Management Errors vulnerability in Cisco IOS The Device Sensor feature in Cisco IOS 15.0 through 15.2 allows remote attackers to cause a denial of service (device reload) via a DHCP packet, aka Bug ID CSCty96049. | 7.8 |
2012-09-27 | CVE-2012-4620 | Cisco | Resource Management Errors vulnerability in Cisco 10008 Router and IOS Cisco IOS 12.2 and 15.0 through 15.2 on Cisco 10000 series routers, when a tunnel interface exists, allows remote attackers to cause a denial of service (interface queue wedge) via tunneled (1) GRE/IP, (2) IPIP, or (3) IPv6 in IPv4 packets, aka Bug ID CSCts66808. | 7.8 |
2012-09-27 | CVE-2012-4619 | Cisco | Resource Management Errors vulnerability in Cisco IOS The NAT implementation in Cisco IOS 12.2, 12.4, and 15.0 through 15.2 allows remote attackers to cause a denial of service (device reload) via transit IP packets, aka Bug ID CSCtr46123. | 7.8 |
2012-09-27 | CVE-2012-4618 | Cisco | Resource Management Errors vulnerability in Cisco IOS The SIP ALG feature in the NAT implementation in Cisco IOS 12.2, 12.4, and 15.0 through 15.2 allows remote attackers to cause a denial of service (device reload) via transit IP packets, aka Bug ID CSCtn76183. | 7.8 |
2012-09-27 | CVE-2012-3949 | Cisco | Improper Input Validation vulnerability in Cisco Ios, IOS XE and Unified Communications Manager The SIP implementation in Cisco Unified Communications Manager (CUCM) 6.x and 7.x before 7.1(5b)su5, 8.x before 8.5(1)su4, and 8.6 before 8.6(2a)su1; Cisco IOS 12.2 through 12.4 and 15.0 through 15.2; and Cisco IOS XE 3.3.xSG before 3.3.1SG, 3.4.xS, and 3.5.xS allows remote attackers to cause a denial of service (service crash or device reload) via a crafted SIP message containing an SDP session description, aka Bug IDs CSCtw66721, CSCtj33003, and CSCtw84664. | 7.8 |
2012-09-25 | CVE-2012-4014 | Mcafee | Denial of Service vulnerability in McAfee Email Anti-virus Unspecified vulnerability in McAfee Email Anti-virus (formerly WebShield SMTP) allows remote attackers to cause a denial of service via unknown vectors. | 7.8 |
2012-09-25 | CVE-2012-3011 | Fultek | Path Traversal vulnerability in Fultek Wintr Scada 2.0.0/2.5 Directory traversal vulnerability in the web server in Fultek WinTr Scada 4.0.5 and earlier allows remote attackers to read arbitrary files via a crafted request. | 7.8 |
2012-09-28 | CVE-2012-2684 | Trevor Mckay Redhat | SQL Injection vulnerability in multiple products Multiple SQL injection vulnerabilities in the get_sample_filters_by_signature function in Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, allow remote attackers to execute arbitrary SQL commands via the (1) agent or (2) object id. | 7.5 |
2012-09-28 | CVE-2012-2998 | Trend Micro | SQL Injection vulnerability in Trend Micro Control Manager SQL injection vulnerability in the ad hoc query module in Trend Micro Control Manager (TMCM) before 5.5.0.1823 and 6.0 before 6.0.0.1449 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | 7.5 |
2012-09-26 | CVE-2012-1116 | Joomla | SQL Injection vulnerability in Joomla Joomla! SQL injection vulnerability in Joomla! 1.7.x and 2.5.x before 2.5.2 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | 7.5 |
2012-09-25 | CVE-2012-0973 | Osclass | SQL Injection vulnerability in Osclass Multiple SQL injection vulnerabilities in OSClass before 2.3.5 allow remote attackers to execute arbitrary SQL commands via the sCategory parameter to index.php, which is not properly handled by the (1) osc_search_category_id function in oc-includes/osclass/helpers/hSearch.php and (2) findBySlug function oc-includes/osclass/model/Category.php. | 7.5 |
2012-09-25 | CVE-2012-5159 | Phpmyadmin | Code Injection vulnerability in PHPmyadmin 3.5.2.2 phpMyAdmin 3.5.2.2, as distributed by the cdnetworks-kr-1 mirror during an unspecified time frame in 2012, contains an externally introduced modification (Trojan Horse) in server_sync.php, which allows remote attackers to execute arbitrary PHP code via an eval injection attack. | 7.5 |
2012-09-25 | CVE-2012-0209 | Horde | Code Injection vulnerability in Horde Groupware and Horde Horde 3.3.12, Horde Groupware 1.2.10, and Horde Groupware Webmail Edition 1.2.10, as distributed by FTP between November 2011 and February 2012, contains an externally introduced modification (Trojan Horse) in templates/javascript/open_calendar.js, which allows remote attackers to execute arbitrary PHP code. | 7.5 |
2012-09-25 | CVE-2012-3264 | HP | Unspecified vulnerability in HP Sitescope 11.10/11.11/11.12 Unspecified vulnerability in a SOAP feature in HP SiteScope 11.10 through 11.12 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1472. | 7.5 |
2012-09-27 | CVE-2012-4622 | Cisco | Resource Management Errors vulnerability in Cisco IOS XE 3.2.00.Xo.15.0(2)Xo Cisco IOS XE 03.02.00.XO.15.0(2)XO on Catalyst 4500E series switches, when a Supervisor Engine 7L-E card is installed, allows remote attackers to cause a denial of service (card reload) via malformed packets that trigger uncorrected ECC error messages, aka Bug ID CSCty88456. | 7.1 |
2012-09-27 | CVE-2012-4617 | Cisco | Improper Input Validation vulnerability in Cisco Ios, IOS XE and IOS XR The BGP implementation in Cisco IOS 15.2, IOS XE 3.5.xS before 3.5.2S, and IOS XR 4.1.0 through 4.2.2 allows remote attackers to cause a denial of service (multiple connection resets) by leveraging a peer relationship and sending a malformed attribute, aka Bug IDs CSCtt35379, CSCty58300, CSCtz63248, and CSCtz62914. | 7.1 |
2012-09-27 | CVE-2012-3950 | Cisco | Resource Management Errors vulnerability in Cisco IOS The Intrusion Prevention System (IPS) feature in Cisco IOS 12.3 through 12.4 and 15.0 through 15.2, in certain configurations of enabled categories and missing signatures, allows remote attackers to cause a denial of service (device reload) via DNS packets, aka Bug ID CSCtw55976. | 7.1 |
31 Medium Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2012-09-28 | CVE-2012-4448 | Wordpress | Cross-Site Request Forgery (CSRF) vulnerability in Wordpress 3.4.2 Cross-site request forgery (CSRF) vulnerability in wp-admin/index.php in WordPress 3.4.2 allows remote attackers to hijack the authentication of administrators for requests that modify an RSS URL via a dashboard_incoming_links edit action. | 6.8 |
2012-09-28 | CVE-2012-0956 | Ubiquity Slideshow Team | Permissions, Privileges, and Access Controls vulnerability in Ubiquity Slideshow Team Ubiquity-Slideshow-Ubuntu ubiquity-slideshow-ubuntu before 58.2, during installation, allows remote man-in-the-middle attackers to execute arbitrary web script or HTML and read arbitrary files via a crafted attribute in the <a> tag of a Twitter feed. | 6.8 |
2012-09-28 | CVE-2012-4051 | Jamf | Cross-Site Request Forgery (CSRF) vulnerability in Jamf Casper Suite Multiple cross-site request forgery (CSRF) vulnerabilities in editAccount.html in the JAMF Software Server (JSS) interface in JAMF Casper Suite before 8.61 allow remote attackers to hijack the authentication of administrators for requests that (1) create user accounts or (2) change passwords via a Save action. | 6.8 |
2012-09-25 | CVE-2012-3306 | IBM | Credentials Management vulnerability in IBM Websphere Application Server IBM WebSphere Application Server (WAS) 6.1 before 6.1.0.45, 7.0 before 7.0.0.25, 8.0 before 8.0.0.5, and 8.5 before 8.5.0.1, when multi-domain support is configured, does not purge password data from the authentication cache, which has unspecified impact and remote attack vectors. | 6.8 |
2012-09-25 | CVE-2012-3304 | IBM | Unspecified vulnerability in IBM Websphere Application Server The Administrative Console in IBM WebSphere Application Server (WAS) 6.1 before 6.1.0.45, 7.0 before 7.0.0.25, 8.0 before 8.0.0.5, and 8.5 before 8.5.0.1 allows remote attackers to hijack sessions via unspecified vectors. | 6.8 |
2012-09-26 | CVE-2012-5162 | Osclass | SQL Injection vulnerability in Osclass Multiple SQL injection vulnerabilities in oc-admin/ajax/ajax.php in OSClass before 2.3.5 allow remote attackers to execute arbitrary SQL commands via the id parameter in a (1) edit_category_post or (2) enable_category action to index.php. | 6.5 |
2012-09-26 | CVE-2012-1617 | Juan Ramon | Path Traversal vulnerability in Juan Ramon Osclass Directory traversal vulnerability in combine.php in OSClass before 2.3.6 allows remote attackers to read and write arbitrary files via a .. | 6.4 |
2012-09-25 | CVE-2012-3305 | IBM | Path Traversal vulnerability in IBM Websphere Application Server Directory traversal vulnerability in IBM WebSphere Application Server (WAS) 6.1 before 6.1.0.47, 7.0 before 7.0.0.25, 8.0 before 8.0.0.5, and 8.5 before 8.5.0.1 allows remote attackers to overwrite arbitrary files via a crafted application file. | 6.4 |
2012-09-28 | CVE-2012-2681 | Trevor Mckay Redhat | Cryptographic Issues vulnerability in multiple products Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, uses predictable random numbers to generate session keys, which makes it easier for remote attackers to guess the session key. | 5.8 |
2012-09-28 | CVE-2012-1833 | Springsource | Permissions, Privileges, and Access Controls vulnerability in Springsource Grails VMware SpringSource Grails before 1.3.8, and 2.x before 2.0.2, does not properly restrict data binding, which might allow remote attackers to bypass intended access restrictions and modify arbitrary object properties via a crafted request parameter to an application. | 5.0 |
2012-09-28 | CVE-2012-2680 | Trevor Mckay Redhat | Permissions, Privileges, and Access Controls vulnerability in multiple products Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, does not properly restrict access to resources, which allows remote attackers to obtain sensitive information via unspecified vectors related to (1) "web pages," (2) "export functionality," and (3) "image viewing." | 5.0 |
2012-09-28 | CVE-2012-2145 | Apache | Resource Management Errors vulnerability in Apache Qpid Apache Qpid 0.17 and earlier does not properly restrict incoming client connections, which allows remote attackers to cause a denial of service (file descriptor consumption) via a large number of incomplete connections. | 5.0 |
2012-09-28 | CVE-2012-0419 | Novell | Path Traversal vulnerability in Novell Groupwise Directory traversal vulnerability in the agent HTTP interfaces in Novell GroupWise 8.0 before Support Pack 3 and 2012 before Support Pack 1 allows remote attackers to read arbitrary files via directory traversal sequences in a request. | 5.0 |
2012-09-25 | CVE-2012-2199 | IBM Oracle | Resource Management Errors vulnerability in IBM Websphere MQ The server message channel agent in the queue manager in the server in IBM WebSphere MQ 7.0.1 before 7.0.1.9, 7.1, and 7.5 on Solaris allows remote attackers to cause a denial of service (invalid address alignment exception and daemon crash) via vectors involving a multiplexed channel. | 5.0 |
2012-09-25 | CVE-2012-2187 | IBM | Cryptographic Issues vulnerability in IBM Remote Supervisor Adapter II Firmware IBM Remote Supervisor Adapter II firmware for System x3650, x3850 M2, and x3950 M2 1.13 and earlier generates weak RSA keys, which makes it easier for attackers to defeat cryptographic protection mechanisms via unspecified vectors. | 5.0 |
2012-09-28 | CVE-2012-3459 | Trevor Mckay Redhat | Permissions, Privileges, and Access Controls vulnerability in multiple products Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, allows remote authenticated users to modify Condor attributes and possibly gain privileges via crafted additional parameters in an HTTP POST request, which triggers a job attribute change request to Condor. | 4.9 |
2012-09-28 | CVE-2012-4912 | Novell | Cross-Site Scripting vulnerability in Novell Groupwise Cross-site scripting (XSS) vulnerability in the WebAccess component in Novell GroupWise 8.0 before Support Pack 3 and 2012 before Support Pack 1 allows remote attackers to inject arbitrary web script or HTML via a crafted signature in an HTML e-mail message. | 4.3 |
2012-09-28 | CVE-2012-4017 | Google JB | Code Injection vulnerability in Jb+ Jigbrowser+ 1.0.5/1.5.0/1.5.5 The jigbrowser+ application before 1.5.0 for Android does not properly implement the WebView class, which allows remote attackers to obtain sensitive information via a crafted application. | 4.3 |
2012-09-28 | CVE-2012-4016 | Google Justsystems | Permissions, Privileges, and Access Controls vulnerability in Justsystems Atok The ATOK application before 1.0.4 for Android allows remote attackers to read the learning information file, and obtain sensitive input-string information, via a crafted application. | 4.3 |
2012-09-26 | CVE-2012-5164 | Fork CMS | Cross-Site Scripting vulnerability in Fork-Cms Fork CMS Multiple cross-site scripting (XSS) vulnerabilities in Fork CMS before 3.2.7 allow remote attackers to inject arbitrary web script or HTML via the term parameter to (1) autocomplete.php, (2) search/ajax/autosuggest.php, (3) livesuggest.php, or (4) save.php in frontend/modules/search/ajax. | 4.3 |
2012-09-26 | CVE-2012-5163 | Osclass | Cross-Site Scripting vulnerability in Osclass Cross-site scripting (XSS) vulnerability in oc-admin/ajax/ajax.php in OSClass before 2.3.5 allows remote attackers to inject arbitrary web script or HTML via the id parameter in an enable_category action to index.php. | 4.3 |
2012-09-26 | CVE-2012-1188 | Fork CMS | Cross-Site Scripting vulnerability in Fork-Cms Fork CMS Multiple cross-site scripting (XSS) vulnerabilities in Fork CMS before 3.2.7 allow remote attackers to inject arbitrary web script or HTML via the (1) type or (2) querystring parameters to private/en/error or (3) name parameter to private/en/locale/index. | 4.3 |
2012-09-26 | CVE-2012-1117 | Joomla | Cross-Site Scripting vulnerability in Joomla Joomla! 2.5.0/2.5.1 Cross-site scripting (XSS) vulnerability in Joomla! 2.5.0 and 2.5.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | 4.3 |
2012-09-25 | CVE-2012-1646 | Drupal | Cross-Site Scripting vulnerability in Drupal FAQ Multiple cross-site scripting (XSS) vulnerabilities in the FAQ module 6.x-1.x before 6.x-1.13 and 7.x-1.x-rc1 for Drupal allow remote authenticated users to inject arbitrary web script or HTML via the (1) title parameter in faq.admin.inc or (2) detailed_question parameter in faq.module. | 4.3 |
2012-09-25 | CVE-2012-1293 | Ulli Horlacher | Cross-Site Scripting vulnerability in Ulli Horlacher FEX Multiple cross-site scripting (XSS) vulnerabilities in fup in Frams' Fast File EXchange (F*EX, aka fex) before 20111129-2 allow remote attackers to inject arbitrary web script or HTML via the (1) to or (2) from parameters. | 4.3 |
2012-09-25 | CVE-2012-1103 | Notmuchmail GNU | Improper Input Validation vulnerability in Notmuchmail Notmuch emacs/notmuch-mua.el in Notmuch before 0.11.1, when using the Emacs interface, allows user-assisted remote attackers to read arbitrary files via crafted MML tags, which are not properly quoted in an email reply cna cause the files to be attached to the message. | 4.3 |
2012-09-25 | CVE-2012-0974 | Juan Ramon | Cross-Site Scripting vulnerability in Juan Ramon Osclass Multiple cross-site scripting (XSS) vulnerabilities in the getParam function in oc-includes/osclass/core/Params.php in OSClass before 2.3.5 allow remote attackers to inject arbitrary web script or HTML via the (1) sCity, (2) sPattern, (3) sPriceMax, and (4) sPriceMin parameters in a search action to index.php. | 4.3 |
2012-09-25 | CVE-2012-0869 | Ulli Horlacher | Cross-Site Scripting vulnerability in Ulli Horlacher FEX Cross-site scripting (XSS) vulnerability in fup in Frams' Fast File EXchange (F*EX, aka fex) before 20120215 allows remote attackers to inject arbitrary web script or HTML via the id parameter. | 4.3 |
2012-09-25 | CVE-2012-4015 | Mylittletools Microsoft | Cross-Site Scripting vulnerability in Mylittletools Mylittleadmin Cross-site scripting (XSS) vulnerability in the management screen in myLittleTools myLittleAdmin for SQL Server 2000 allows remote attackers to inject arbitrary web script or HTML via vectors that trigger a crafted database entry. | 4.3 |
2012-09-25 | CVE-2012-3037 | Siemens | Improper Certificate Validation vulnerability in Siemens products The Siemens SIMATIC S7-1200 2.x PLC does not properly protect the private key of the SIMATIC CONTROLLER Certification Authority certificate, which allows remote attackers to spoof the S7-1200 web server by using this key to create a forged certificate. | 4.3 |
2012-09-28 | CVE-2012-2685 | Trevor Mckay Redhat | Resource Management Errors vulnerability in multiple products Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, allows remote authenticated users to cause a denial of service (memory consumption) via a large size in an image request. | 4.0 |
2 Low Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2012-09-25 | CVE-2012-3311 | IBM | Permissions, Privileges, and Access Controls vulnerability in IBM Websphere Application Server IBM WebSphere Application Server (WAS) 6.1 before 6.1.0.45, 7.0 before 7.0.0.25, 8.0 before 8.0.0.5, and 8.5 before 8.5.0.1 on z/OS, in certain configurations involving Federated Repositories for IIOP connections and Optimized Local Adapters, does not perform CBIND checks, which allows local users to bypass intended access restrictions, and read or modify application data, via unspecified vectors. | 3.3 |
2012-09-25 | CVE-2012-3300 | IBM | Resource Management Errors vulnerability in IBM Websphere Commerce IBM WebSphere Commerce 7.0 before 7.0.0.6, when persistent sessions and personalization IDs are enabled, allows remote attackers to cause a denial of service (resource consumption) via unspecified vectors. | 2.6 |