Weekly Vulnerabilities Reports > March 11 to 17, 2013
Overview
114 new vulnerabilities reported during this period, including 21 critical vulnerabilities and 24 high severity vulnerabilities. This weekly summary report vulnerabilities in 97 products from 36 vendors including Microsoft, Linux, Redhat, Apple, and Apache. Vulnerabilities are notably categorized as "Information Exposure", "Resource Management Errors", "Permissions, Privileges, and Access Controls", "Improper Restriction of Operations within the Bounds of a Memory Buffer", and "Numeric Errors".
- 82 reported vulnerabilities are remotely exploitables.
- 4 reported vulnerabilities have public exploit available.
- 13 reported vulnerabilities are related to weaknesses in OWASP Top Ten.
- 106 reported vulnerabilities are exploitable by an anonymous user.
- Microsoft has the most reported vulnerabilities, with 32 reported vulnerabilities.
- Microsoft has the most reported critical vulnerabilities, with 17 reported vulnerabilities.
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
EXPLOITABLE
EXPLOITABLE
AVAILABLE
ANONYMOUSLY
WEB APPLICATION
Vulnerability Details
The following table list reported vulnerabilities for the period covered by this report:
21 Critical Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2013-03-14 | CVE-2013-1049 | Debian | Buffer Errors vulnerability in Debian Cfingerd 1.4.33 Buffer overflow in the RFC1413 (ident) client in cfingerd 1.4.3-3 allows remote IDENT servers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted response. | 10.0 |
2013-03-13 | CVE-2013-1375 | Adobe Apple Microsoft Linux | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Adobe products Heap-based buffer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK & Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors. | 10.0 |
2013-03-13 | CVE-2013-1371 | Adobe Apple Microsoft Linux | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Adobe products Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK & Compiler before 3.6.0.6090 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. | 10.0 |
2013-03-13 | CVE-2013-0650 | Adobe Apple Microsoft Linux | Resource Management Errors vulnerability in Adobe products Use-after-free vulnerability in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK & Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors. | 10.0 |
2013-03-13 | CVE-2013-0646 | Adobe Apple Microsoft Linux | Numeric Errors vulnerability in Adobe products Integer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK & Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors. | 10.0 |
2013-03-13 | CVE-2013-2558 | Microsoft | Denial of Service vulnerability in Microsoft Windows 8 Unspecified vulnerability in Microsoft Windows 8 allows remote attackers to cause a denial of service (reboot) or possibly have unknown other impact via a crafted TrueType Font (TTF) file, as demonstrated by the 120612-69701-01.dmp error report. | 10.0 |
2013-03-11 | CVE-2012-4702 | 360Systems | Credentials Management vulnerability in 360Systems Image Server 2000, Image Server Maxx and Maxx 360 Systems Maxx, Image Server Maxx, and Image Server 2000 have a hardcoded password for the root account, which makes it easier for remote attackers to execute arbitrary code, or modify video content or scheduling, via an SSH session. | 10.0 |
2013-03-11 | CVE-2013-2555 | Adobe Opensuse Suse Redhat | Integer Overflow or Wraparound vulnerability in multiple products Integer overflow in Adobe Flash Player before 10.3.183.75 and 11.x before 11.7.700.169 on Windows and Mac OS X, before 10.3.183.75 and 11.x before 11.2.202.280 on Linux, before 11.1.111.50 on Android 2.x and 3.x, and before 11.1.115.54 on Android 4.x; Adobe AIR before 3.7.0.1530; and Adobe AIR SDK & Compiler before 3.7.0.1530 allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013. | 10.0 |
2013-03-13 | CVE-2013-1288 | Microsoft | Resource Management Errors vulnerability in Microsoft Internet Explorer 8 Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CTreeNode Use After Free Vulnerability." | 9.3 |
2013-03-13 | CVE-2013-0094 | Microsoft | Resource Management Errors vulnerability in Microsoft Internet Explorer Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer removeChild Use After Free Vulnerability." | 9.3 |
2013-03-13 | CVE-2013-0093 | Microsoft | Resource Management Errors vulnerability in Microsoft Internet Explorer Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer onBeforeCopy Use After Free Vulnerability." | 9.3 |
2013-03-13 | CVE-2013-0092 | Microsoft | Resource Management Errors vulnerability in Microsoft Internet Explorer Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer GetMarkupPtr Use After Free Vulnerability." | 9.3 |
2013-03-13 | CVE-2013-0091 | Microsoft | Resource Management Errors vulnerability in Microsoft Internet Explorer 8 Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CElement Use After Free Vulnerability." | 9.3 |
2013-03-13 | CVE-2013-0090 | Microsoft | Resource Management Errors vulnerability in Microsoft Internet Explorer Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CCaret Use After Free Vulnerability." | 9.3 |
2013-03-13 | CVE-2013-0089 | Microsoft | Resource Management Errors vulnerability in Microsoft Internet Explorer Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CMarkupBehaviorContext Use After Free Vulnerability." | 9.3 |
2013-03-13 | CVE-2013-0088 | Microsoft | Resource Management Errors vulnerability in Microsoft Internet Explorer Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer saveHistory Use After Free Vulnerability." | 9.3 |
2013-03-13 | CVE-2013-0087 | Microsoft | Resource Management Errors vulnerability in Microsoft Internet Explorer Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer OnResize Use After Free Vulnerability." | 9.3 |
2013-03-13 | CVE-2013-0079 | Microsoft | Remote Code Execution vulnerability in Microsoft Office Filter Pack, Visio and Visio Viewer Microsoft Visio Viewer 2010 SP1 allows remote attackers to execute arbitrary code via a crafted Visio file that triggers incorrect memory allocation, aka "Visio Viewer Tree Object Type Confusion Vulnerability." | 9.3 |
2013-03-13 | CVE-2013-0074 | Microsoft | Unspecified vulnerability in Microsoft Silverlight Microsoft Silverlight 5, and 5 Developer Runtime, before 5.1.20125.0 does not properly validate pointers during HTML object rendering, which allows remote attackers to execute arbitrary code via a crafted Silverlight application, aka "Silverlight Double Dereference Vulnerability." | 9.3 |
2013-03-11 | CVE-2013-2551 | Microsoft | USE After Free vulnerability in Microsoft Internet Explorer Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-1309. | 9.3 |
2013-03-11 | CVE-2013-0787 | Mozilla | Resource Management Errors vulnerability in Mozilla products Use-after-free vulnerability in the nsEditor::IsPreformatted function in editor/libeditor/base/nsEditor.cpp in Mozilla Firefox before 19.0.2, Firefox ESR 17.x before 17.0.4, Thunderbird before 17.0.4, Thunderbird ESR 17.x before 17.0.4, and SeaMonkey before 2.16.1 allows remote attackers to execute arbitrary code via vectors involving an execCommand call. | 9.3 |
24 High Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2013-03-11 | CVE-2012-1999 | HP | Unspecified vulnerability in HP Systems Insight Manager Unspecified vulnerability in HP Systems Insight Manager (SIM) before 7.0 allows remote authenticated users to obtain sensitive information or modify data via unknown vectors. | 8.5 |
2013-03-15 | CVE-2013-2560 | Foscam | Path Traversal vulnerability in Foscam Fi8919W Directory traversal vulnerability in the web interface on Foscam devices with firmware before 11.37.2.49 allows remote attackers to read arbitrary files via a .. | 7.8 |
2013-03-13 | CVE-2013-0085 | Microsoft | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Microsoft Sharepoint Foundation and Sharepoint Server Buffer overflow in Microsoft SharePoint Server 2010 SP1 and SharePoint Foundation 2010 SP1 allows remote attackers to cause a denial of service (W3WP process crash and site outage) via a crafted URL, aka "Buffer Overflow Vulnerability." | 7.8 |
2013-03-12 | CVE-2013-2292 | Bitcoin | Resource Management Errors vulnerability in Bitcoin Bitcoin-Qt, Bitcoin Core and Bitcoind bitcoind and Bitcoin-Qt 0.8.0 and earlier allow remote attackers to cause a denial of service (electricity consumption) by mining a block to create a nonstandard Bitcoin transaction containing multiple OP_CHECKSIG script opcodes. | 7.8 |
2013-03-12 | CVE-2012-4684 | Bitcoin | Resource Management Errors vulnerability in Bitcoin products The alert functionality in bitcoind and Bitcoin-Qt before 0.7.0 supports different character representations of the same signature data, but relies on a hash of this signature, which allows remote attackers to cause a denial of service (resource consumption) via a valid modified signature for a circulating alert. | 7.8 |
2013-03-11 | CVE-2013-1627 | Advantech Indusoft | Path Traversal vulnerability in multiple products Absolute path traversal vulnerability in NTWebServer.exe in Indusoft Studio 7.0 and earlier and Advantech Studio 7.0 and earlier allows remote attackers to read arbitrary files via a full pathname in an argument to the sub_401A90 CreateFileW function. | 7.8 |
2013-03-14 | CVE-2013-1468 | Piwigo | Cross-Site Request Forgery (CSRF) vulnerability in Piwigo Cross-site request forgery (CSRF) vulnerability in the LocalFiles Editor plugin in Piwigo before 2.4.7 allows remote attackers to hijack the authentication of administrators for requests that create arbitrary PHP files via unspecified vectors. | 7.6 |
2013-03-14 | CVE-2013-1667 | Perl | Resource Management Errors vulnerability in Perl The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key. | 7.5 |
2013-03-13 | CVE-2013-0084 | Microsoft | Path Traversal vulnerability in Microsoft Sharepoint Foundation and Sharepoint Server Directory traversal vulnerability in Microsoft SharePoint Server 2010 SP1 and SharePoint Foundation 2010 SP1 allows remote attackers to bypass intended read restrictions for content, and hijack user accounts, via a crafted URL, aka "SharePoint Directory Traversal Vulnerability." | 7.5 |
2013-03-13 | CVE-2013-0080 | Microsoft | Permissions, Privileges, and Access Controls vulnerability in Microsoft Sharepoint Foundation and Sharepoint Server Microsoft SharePoint Server 2010 SP1 and SharePoint Foundation 2010 SP1 allow remote attackers to bypass intended read restrictions for content, and hijack user accounts, via a crafted URL, aka "Callback Function Vulnerability." | 7.5 |
2013-03-12 | CVE-2012-5629 | Redhat | Permissions, Privileges, and Access Controls vulnerability in Redhat products The default configuration of the (1) LdapLoginModule and (2) LdapExtLoginModule modules in JBoss Enterprise Application Platform (EAP) 4.3.0 CP10, 5.2.0, and 6.0.1, and Enterprise Web Platform (EWP) 5.2.0 allow remote attackers to bypass authentication via an empty password. | 7.5 |
2013-03-11 | CVE-2013-1081 | Novell | Path Traversal vulnerability in Novell Zenworks Mobile Management 2.6.1/2.7.0 Directory traversal vulnerability in MDM.php in Novell ZENworks Mobile Management (ZMM) 2.6.1 and 2.7.0 allows remote attackers to include and execute arbitrary local files via the language parameter. | 7.5 |
2013-03-11 | CVE-2012-1997 | HP | Unspecified vulnerability in HP Systems Insight Manager Unspecified vulnerability in HP Systems Insight Manager (SIM) before 7.0 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via unknown vectors, a different vulnerability than CVE-2012-1998. | 7.5 |
2013-03-11 | CVE-2013-2557 | Microsoft | Buffer Errors vulnerability in Microsoft Internet Explorer 9 The sandbox protection mechanism in Microsoft Internet Explorer 9 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, as demonstrated against Adobe Flash Player by VUPEN during a Pwn2Own competition at CanSecWest 2013. | 7.5 |
2013-03-11 | CVE-2013-2556 | Microsoft | ASLR Security Bypass vulnerability in Microsoft Windows 7, Windows Server 2008 and Windows Vista Unspecified vulnerability in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 through SP1 allows attackers to bypass the ASLR protection mechanism via unknown vectors, as demonstrated against Adobe Flash Player by VUPEN during a Pwn2Own competition at CanSecWest 2013, aka "ASLR Security Feature Bypass Vulnerability." | 7.5 |
2013-03-11 | CVE-2013-2554 | Microsoft | Security Bypass vulnerability in Microsoft Windows 7 Unspecified vulnerability in Microsoft Windows 7 allows attackers to bypass the ASLR and DEP protection mechanisms via unknown vectors, as demonstrated against Firefox by VUPEN during a Pwn2Own competition at CanSecWest 2013, a different vulnerability than CVE-2013-0787. | 7.5 |
2013-03-11 | CVE-2013-2552 | Microsoft | Remote Code Execution vulnerability in Microsoft Internet Explorer 10 Unspecified vulnerability in Microsoft Internet Explorer 10 on Windows 8 allows remote attackers to bypass the sandbox protection mechanism by leveraging access to a Medium integrity process, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013. | 7.5 |
2013-03-11 | CVE-2013-2550 | Adobe | Use After Free Remote Code Execution vulnerability in Adobe Acrobat Reader 11.0.02 Unspecified vulnerability in Adobe Reader 11.0.02 allows attackers to bypass the sandbox protection mechanism via unknown vectors, as demonstrated by George Hotz during a Pwn2Own competition at CanSecWest 2013. | 7.5 |
2013-03-11 | CVE-2013-2549 | Adobe | Code Injection vulnerability in Adobe Acrobat Reader 11.0.02 Unspecified vulnerability in Adobe Reader 11.0.02 allows remote attackers to execute arbitrary code via vectors related to a "break into the sandbox," as demonstrated by George Hotz during a Pwn2Own competition at CanSecWest 2013. | 7.5 |
2013-03-11 | CVE-2013-0912 | Code Injection vulnerability in Google Chrome WebKit in Google Chrome before 25.0.1364.160 allows remote attackers to execute arbitrary code via vectors that leverage "type confusion." | 7.5 | |
2013-03-13 | CVE-2013-1287 | Microsoft | Permissions, Privileges, and Access Controls vulnerability in Microsoft products The USB kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012 do not properly handle objects in memory, which allows physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Windows USB Descriptor Vulnerability," a different vulnerability than CVE-2013-1285 and CVE-2013-1286. | 7.2 |
2013-03-13 | CVE-2013-1286 | Microsoft | Permissions, Privileges, and Access Controls vulnerability in Microsoft products The USB kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012 do not properly handle objects in memory, which allows physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Windows USB Descriptor Vulnerability," a different vulnerability than CVE-2013-1285 and CVE-2013-1287. | 7.2 |
2013-03-13 | CVE-2013-1285 | Microsoft | Permissions, Privileges, and Access Controls vulnerability in Microsoft products The USB kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012 do not properly handle objects in memory, which allows physically proximate attackers to execute arbitrary code by connecting a crafted USB device, aka "Windows USB Descriptor Vulnerability," a different vulnerability than CVE-2013-1286 and CVE-2013-1287. | 7.2 |
2013-03-11 | CVE-2013-2553 | Microsoft | Local Privilege Escalation vulnerability in Microsoft Windows 7 Unspecified vulnerability in the kernel in Microsoft Windows 7 allows local users to gain privileges via unknown vectors, as demonstrated by Nils and Jon of MWR Labs during a Pwn2Own competition at CanSecWest 2013, a different vulnerability than CVE-2013-0912. | 7.2 |
46 Medium Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2013-03-14 | CVE-2013-1423 | Fusionforge | Link Following vulnerability in Fusionforge 5.0/5.1/5.2 (1) contrib/gforge-3.0-cronjobs.patch, (2) cronjobs/homedirs.php, (3) deb-specific/fileforge.pl, (4) deb-specific/group_dump_update.pl, (5) deb-specific/ssh_dump_update.pl, (6) deb-specific/user_dump_update.pl, (7) plugins/scmbzr/common/BzrPlugin.class.php, (8) plugins/scmcvs/common/CVSPlugin.class.php, (9) plugins/scmcvs/cronjobs/cvs.php, (10) plugins/scmcvs/cronjobs/ssh_create.php, (11) plugins/scmgit/common/GitPlugin.class.php, (12) plugins/scmsvn/common/SVNPlugin.class.php, (13) plugins/wiki/cronjobs/create_groups.php, (14) utils/cvs1/cvscreate.sh, and (15) utils/include.pl in FusionForge 5.0, 5.1, and 5.2 allows local users to change arbitrary file permissions, obtain sensitive information, and have other unspecified impacts via a (1) symlink or (2) hard link attack on certain files. | 6.9 |
2013-03-12 | CVE-2012-5660 | Redhat | Permissions, Privileges, and Access Controls vulnerability in Redhat Automatic BUG Reporting Tool abrt-action-install-debuginfo in Automatic Bug Reporting Tool (ABRT) 2.0.9 and earlier allows local users to set world-writable permissions for arbitrary files and possibly gain privileges via a symlink attack on "the directories used to store information about crashes." | 6.9 |
2013-03-15 | CVE-2013-2492 | Firebirdsql Microsoft | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Firebirdsql Firebird Stack-based buffer overflow in Firebird 2.1.3 through 2.1.5 before 18514, and 2.5.1 through 2.5.3 before 26623, on Windows allows remote attackers to execute arbitrary code via a crafted packet to TCP port 3050, related to a missing size check during extraction of a group number from CNCT information. | 6.8 |
2013-03-15 | CVE-2013-0976 | Apple | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Apple mac OS X IOAcceleratorFamily in Apple Mac OS X before 10.8.3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted graphics image. | 6.8 |
2013-03-15 | CVE-2013-0973 | Apple | Remote Code Execution vulnerability in Apple Mac OS X Software Update in Apple Mac OS X through 10.7.5 does not prevent plugin loading within the marketing-text WebView, which allows man-in-the-middle attackers to execute plugin code by modifying the client-server data stream. | 6.8 |
2013-03-15 | CVE-2013-0971 | Apple | Resource Management Errors vulnerability in Apple mac OS X and mac OS X Server Use-after-free vulnerability in PDFKit in Apple Mac OS X before 10.8.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted ink annotations in a PDF document. | 6.8 |
2013-03-15 | CVE-2013-0961 | Apple | Memory Corruption vulnerability in WebKit WebKit in Apple Safari before 6.0.3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2013-0960. | 6.8 |
2013-03-15 | CVE-2013-0960 | Apple | Memory Corruption vulnerability in WebKit WebKit in Apple Safari before 6.0.3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2013-0961. | 6.8 |
2013-03-14 | CVE-2012-4446 | Apache | Improper Authentication vulnerability in Apache Qpid The default configuration for Apache Qpid 0.20 and earlier, when the federation_tag attribute is enabled, accepts AMQP connections without checking the source user ID, which allows remote attackers to bypass authentication and have other unspecified impact via an AMQP request. | 6.8 |
2013-03-11 | CVE-2012-1998 | HP | Unspecified vulnerability in HP Systems Insight Manager Unspecified vulnerability in HP Systems Insight Manager (SIM) before 7.0 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via unknown vectors, a different vulnerability than CVE-2012-1997. | 6.8 |
2013-03-14 | CVE-2013-1794 | Openafs | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Openafs Buffer overflow in certain client utilities in OpenAFS before 1.6.2 allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a long fileserver ACL entry. | 6.5 |
2013-03-15 | CVE-2013-2373 | Tibco | Permissions, Privileges, and Access Controls vulnerability in Tibco Spotfire web Player The Engine in TIBCO Spotfire Web Player 3.3.x before 3.3.3, 4.0.x before 4.0.3, 4.5.x before 4.5.1, and 5.0.x before 5.0.1 does not properly implement access control, which allows remote attackers to obtain sensitive information or modify data via unspecified vectors. | 6.4 |
2013-03-15 | CVE-2013-0966 | Apple | Authentication Bypass vulnerability in Apple Mac OS X The Apple mod_hfs_apple module for the Apache HTTP Server in Apple Mac OS X before 10.8.3 does not properly handle ignorable Unicode characters, which allows remote attackers to bypass intended directory authentication requirements via a crafted pathname in a URI. | 6.4 |
2013-03-11 | CVE-2012-4703 | Emerson | Resource Management Errors vulnerability in Emerson products The Emerson DeltaV SE3006 through 11.3.1, DeltaV VE3005 through 10.3.1 and 11.x through 11.3.1, and DeltaV VE3006 through 10.3.1 and 11.x through 11.3.1 allow remote attackers to cause a denial of service (device restart) via a crafted packet on (1) TCP port 23, (2) UDP port 161, or (3) TCP port 513. | 6.1 |
2013-03-12 | CVE-2011-4966 | Freeradius | Credentials Management vulnerability in Freeradius modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password. | 6.0 |
2013-03-12 | CVE-2012-5633 | Apache | Improper Authentication vulnerability in Apache CXF The URIMappingInterceptor in Apache CXF before 2.5.8, 2.6.x before 2.6.5, and 2.7.x before 2.7.2, when using the WSS4JInInterceptor, bypasses WS-Security processing, which allows remote attackers to obtain access to SOAP services via an HTTP GET request. | 5.8 |
2013-03-11 | CVE-2013-2503 | Privoxy | Improper Input Validation vulnerability in Privoxy Privoxy before 3.0.21 does not properly handle Proxy-Authenticate and Proxy-Authorization headers in the client-server data stream, which makes it easier for remote HTTP servers to spoof the intended proxy service via a 407 (aka Proxy Authentication Required) HTTP status code. | 5.8 |
2013-03-12 | CVE-2012-6118 | Redhat | Permissions, Privileges, and Access Controls vulnerability in Redhat Aeolus Conductor The Administer tab in Aeolus Conductor allows remote authenticated users to bypass intended quota restrictions by updating the Maximum Running Instances quota user setting. | 5.5 |
2013-03-12 | CVE-2011-1165 | David King | Remote Security vulnerability in Vino Vino, possibly before 3.2, does not properly document that it opens ports in UPnP routers when the "Configure network to automatically accept connections" setting is enabled, which might make it easier for remote attackers to perform further attacks. | 5.1 |
2013-03-15 | CVE-2013-2371 | Tibco | Information Exposure vulnerability in Tibco Spotfire Statistics Services 3.3/4.5.0/5.0.0 The Web API in the Statistics Server in TIBCO Spotfire Statistics Services 3.3.x before 3.3.1, 4.5.x before 4.5.1, and 5.0.x before 5.0.1 allows remote attackers to obtain sensitive information via an unspecified HTTP request. | 5.0 |
2013-03-14 | CVE-2013-1795 | Openafs | Numeric Errors vulnerability in Openafs Integer overflow in ptserver in OpenAFS before 1.6.2 allows remote attackers to cause a denial of service (crash) via a large list from the IdToName RPC, which triggers a heap-based buffer overflow. | 5.0 |
2013-03-14 | CVE-2012-4460 | Apache | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Apache Qpid The serializing/deserializing functions in the qpid::framing::Buffer class in Apache Qpid 0.20 and earlier allow remote attackers to cause a denial of service (assertion failure and daemon exit) via unspecified vectors. | 5.0 |
2013-03-14 | CVE-2012-4459 | Apache | Numeric Errors vulnerability in Apache Qpid Integer overflow in the qpid::framing::Buffer::checkAvailable function in Apache Qpid 0.20 and earlier allows remote attackers to cause a denial of service (crash) via a crafted message, which triggers an out-of-bounds read. | 5.0 |
2013-03-14 | CVE-2012-4458 | Apache | Numeric Errors vulnerability in Apache Qpid The AMQP type decoder in Apache Qpid 0.20 and earlier allows remote attackers to cause a denial of service (memory consumption and server crash) via a large number of zero width elements in the client-properties map in a connection.start-ok message. | 5.0 |
2013-03-13 | CVE-2013-0312 | Fedoraproject | Numeric Errors vulnerability in Fedoraproject 389 Directory Server 389 Directory Server before 1.3.0.4 allows remote attackers to cause a denial of service (crash) via a zero length LDAP control sequence. | 5.0 |
2013-03-13 | CVE-2013-0095 | Microsoft | Information Exposure vulnerability in Microsoft Office 2008/2011 Outlook in Microsoft Office for Mac 2008 before 12.3.6 and Office for Mac 2011 before 14.3.2 allows remote attackers to trigger access to a remote URL and consequently confirm the rendering of an HTML e-mail message by including unspecified HTML5 elements and leveraging the installation of a WebKit browser on the victim's machine, aka "Unintended Content Loading Vulnerability." | 5.0 |
2013-03-13 | CVE-2013-0086 | Microsoft | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Microsoft Sharepoint Foundation and Sharepoint Server Microsoft OneNote 2010 SP1 does not properly determine buffer sizes during memory allocation, which allows remote attackers to obtain sensitive information via a crafted OneNote file, aka "Buffer Size Validation Vulnerability." | 5.0 |
2013-03-12 | CVE-2013-0239 | Apache | Improper Authentication vulnerability in Apache CXF Apache CXF before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3, when the plaintext UsernameToken WS-SecurityPolicy is enabled, allows remote attackers to bypass authentication via a security header of a SOAP request containing a UsernameToken element that lacks a password child element. | 5.0 |
2013-03-12 | CVE-2013-0252 | Boost | Improper Input Validation vulnerability in Boost boost::locale::utf::utf_traits in the Boost.Locale library in Boost 1.48 through 1.52 does not properly detect certain invalid UTF-8 sequences, which might allow remote attackers to bypass input validation protection mechanisms via crafted trailing bytes. | 5.0 |
2013-03-12 | CVE-2013-2293 | Bitcoin | Resource Management Errors vulnerability in Bitcoin Bitcoin-Qt, Bitcoin Core and Bitcoind The CTransaction::FetchInputs method in bitcoind and Bitcoin-Qt before 0.8.0rc1 copies transactions from disk to memory without incrementally checking for spent prevouts, which allows remote attackers to cause a denial of service (disk I/O consumption) via a Bitcoin transaction with many inputs corresponding to many different parts of the stored block chain. | 5.0 |
2013-03-12 | CVE-2013-2273 | Bitcoin | Information Exposure vulnerability in Bitcoin Bitcoin-Qt, Bitcoin Core and Bitcoind bitcoind and Bitcoin-Qt before 0.4.9rc1, 0.5.x before 0.5.8rc1, 0.6.0 before 0.6.0.11rc1, 0.6.1 through 0.6.5 before 0.6.5rc1, and 0.7.x before 0.7.3rc1 make it easier for remote attackers to obtain potentially sensitive information about returned change by leveraging certain predictability in the outputs of a Bitcoin transaction. | 5.0 |
2013-03-12 | CVE-2013-2272 | Bitcoin | Information Exposure vulnerability in Bitcoin Bitcoin-Qt, Bitcoin Core and Bitcoind The penny-flooding protection mechanism in the CTxMemPool::accept method in bitcoind and Bitcoin-Qt before 0.4.9rc1, 0.5.x before 0.5.8rc1, 0.6.0 before 0.6.0.11rc1, 0.6.1 through 0.6.5 before 0.6.5rc1, and 0.7.x before 0.7.3rc1 allows remote attackers to determine associations between wallet addresses and IP addresses via a series of large Bitcoin transactions with insufficient fees. | 5.0 |
2013-03-15 | CVE-2013-0969 | Apple | Permissions, Privileges, and Access Controls vulnerability in Apple mac OS X 10.8.0/10.8.1/10.8.2 Login Window in Apple Mac OS X before 10.8.3 does not prevent application launching with the VoiceOver feature, which allows physically proximate attackers to bypass authentication and make arbitrary System Preferences changes via unspecified use of the keyboard. | 4.9 |
2013-03-12 | CVE-2011-1164 | David King | Configuration vulnerability in David King Vino Vino before 2.99.4 can connect external networks contrary to the statement in the vino-preferences dialog box, which might make it easier for remote attackers to perform attacks. | 4.6 |
2013-03-12 | CVE-2012-6076 | Inkscape | Permissions, Privileges, and Access Controls vulnerability in Inkscape Inkscape before 0.48.4 reads .eps files from /tmp instead of the current directory, which might cause Inkspace to process unintended files, allow local users to obtain sensitive information, and possibly have other unspecified impacts. | 4.4 |
2013-03-15 | CVE-2013-2372 | Tibco | Cross-Site Scripting vulnerability in Tibco Spotfire web Player Cross-site scripting (XSS) vulnerability in the Engine in TIBCO Spotfire Web Player 3.3.x before 3.3.3, 4.0.x before 4.0.3, 4.5.x before 4.5.1, and 5.0.x before 5.0.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | 4.3 |
2013-03-15 | CVE-2013-2566 | Oracle Fujitsu Canonical Mozilla | Inadequate Encryption Strength vulnerability in multiple products The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the same plaintext. | 4.3 |
2013-03-15 | CVE-2013-0970 | Apple | Security Bypass vulnerability in Apple mac OS X 10.8.0/10.8.1/10.8.2 Messages in Apple Mac OS X before 10.8.3 allows remote attackers to bypass the FaceTime call-confirmation prompt via a crafted FaceTime: URL. | 4.3 |
2013-03-15 | CVE-2013-0967 | Apple | Security Bypass vulnerability in Apple Mac OS X CoreTypes in Apple Mac OS X before 10.8.3 includes JNLP files in the list of safe file types, which allows remote attackers to bypass a Java plug-in disabled setting, and trigger the launch of Java Web Start applications, via a crafted web site. | 4.3 |
2013-03-14 | CVE-2013-0275 | Ganglia | Cross-Site Scripting vulnerability in Ganglia Ganglia-Web Multiple cross-site scripting (XSS) vulnerabilities in Ganglia Web before 3.5.6 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. | 4.3 |
2013-03-14 | CVE-2012-4462 | Condor Project Redhat | Improper Input Validation vulnerability in multiple products aviary/jobcontrol.py in Condor, as used in Red Hat Enterprise MRG 2.3, when removing a job, allows remote attackers to cause a denial of service (condor_schedd restart) via square brackets in the cproc option. | 4.3 |
2013-03-13 | CVE-2013-0083 | Microsoft | Cross-Site Scripting vulnerability in Microsoft Sharepoint Foundation and Sharepoint Server Cross-site scripting (XSS) vulnerability in Microsoft SharePoint Server 2010 SP1 allows remote attackers to inject arbitrary web script or HTML via crafted content, leading to administrative command execution, aka "SharePoint XSS Vulnerability." | 4.3 |
2013-03-11 | CVE-2012-1996 | HP | Unspecified vulnerability in HP Systems Insight Manager Unspecified vulnerability in HP Systems Insight Manager (SIM) before 7.0 allows remote attackers to modify data via unknown vectors. | 4.3 |
2013-03-14 | CVE-2013-1814 | Apache | Information Exposure vulnerability in Apache Rave The users/get program in the User RPC API in Apache Rave 0.11 through 0.20 allows remote authenticated users to obtain sensitive information about all user accounts via the offset parameter, as demonstrated by discovering password hashes in the password field of a response. | 4.0 |
2013-03-13 | CVE-2013-1469 | Piwigo | Path Traversal vulnerability in Piwigo Directory traversal vulnerability in install.php in Piwigo before 2.4.7 allows remote attackers to read and delete arbitrary files via a .. | 4.0 |
2013-03-12 | CVE-2013-0168 | Redhat | Permissions, Privileges, and Access Controls vulnerability in Redhat Enterprise Virtualization Manager The MoveDisk command in Red Hat Enterprise Virtualization Manager (RHEV-M) 3.1 and earlier does not properly check permissions on storage domains, which allows remote authenticated storage admins to cause a denial of service (free space consumption of other storage domains) via unspecified vectors. | 4.0 |
23 Low Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2013-03-12 | CVE-2012-5659 | Redhat | Unspecified vulnerability in Redhat Automatic BUG Reporting Tool Untrusted search path vulnerability in plugins/abrt-action-install-debuginfo-to-abrt-cache.c in Automatic Bug Reporting Tool (ABRT) 2.0.9 and earlier allows local users to load and execute arbitrary Python modules by modifying the PYTHONPATH environment variable to reference a malicious Python module. | 3.7 |
2013-03-15 | CVE-2013-0248 | Apache | Permissions, Privileges, and Access Controls vulnerability in Apache Commons Fileupload The default configuration of javax.servlet.context.tempdir in Apache Commons FileUpload 1.0 through 1.2.2 uses the /tmp directory for uploaded files, which allows local users to overwrite arbitrary files via an unspecified symlink attack. | 3.3 |
2013-03-11 | CVE-2012-1995 | HP | Unspecified vulnerability in HP Systems Insight Manager Unspecified vulnerability in HP Systems Insight Manager (SIM) before 7.0 allows local users to obtain sensitive information or modify data via unknown vectors. | 3.2 |
2013-03-15 | CVE-2013-2548 | Linux Redhat | Cryptographic Issues vulnerability in multiple products The crypto_report_one function in crypto/crypto_user.c in the report API in the crypto user configuration API in the Linux kernel through 3.8.2 uses an incorrect length value during a copy operation, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability. | 2.1 |
2013-03-15 | CVE-2013-2547 | Linux Redhat | Cryptographic Issues vulnerability in multiple products The crypto_report_one function in crypto/crypto_user.c in the report API in the crypto user configuration API in the Linux kernel through 3.8.2 does not initialize certain structure members, which allows local users to obtain sensitive information from kernel heap memory by leveraging the CAP_NET_ADMIN capability. | 2.1 |
2013-03-15 | CVE-2013-2546 | Linux Redhat | Cryptographic Issues vulnerability in multiple products The report API in the crypto user configuration API in the Linux kernel through 3.8.2 uses an incorrect C library function for copying strings, which allows local users to obtain sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability. | 2.1 |
2013-03-15 | CVE-2012-6536 | Linux | Information Exposure vulnerability in Linux Kernel net/xfrm/xfrm_user.c in the Linux kernel before 3.6 does not verify that the actual Netlink message length is consistent with a certain header field, which allows local users to obtain sensitive information from kernel heap memory by leveraging the CAP_NET_ADMIN capability and providing a (1) new or (2) updated state. | 2.1 |
2013-03-12 | CVE-2012-6115 | Redhat | Credentials Management vulnerability in Redhat Enterprise Virtualization Manager The domain management tool (rhevm-manage-domains) in Red Hat Enterprise Virtualization Manager (RHEV-M) 3.1 and earlier, when the validate action is enabled, logs the administrative password to a world-readable log file, which allows local users to obtain sensitive information by reading this file. | 2.1 |
2013-03-12 | CVE-2012-6117 | Redhat | Permissions, Privileges, and Access Controls vulnerability in Redhat Cloudforms Cloud Engine 1.0/1.1 Aeolus Configuration Server, as used in Red Hat CloudForms Cloud Engine before 1.1.2, uses world-readable permissions for /var/log/aeolus-configserver/configserver.log, which allows local users to read plaintext passwords by reading the log file. | 2.1 |
2013-03-12 | CVE-2012-5509 | Redhat | Permissions, Privileges, and Access Controls vulnerability in Redhat Cloudforms Cloud Engine 1.0/1.1 aeolus-configserver-setup in the Aeolas Configuration Server, as used in Red Hat CloudForms Cloud Engine before 1.1.2, uses world-readable permissions for a temporary file in /tmp, which allows local users to read credentials by reading this file. | 2.1 |
2013-03-15 | CVE-2012-6549 | Linux | Information Exposure vulnerability in Linux Kernel The isofs_export_encode_fh function in fs/isofs/export.c in the Linux kernel before 3.6 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel heap memory via a crafted application. | 1.9 |
2013-03-15 | CVE-2012-6548 | Linux Redhat | Information Exposure vulnerability in Linux Kernel The udf_encode_fh function in fs/udf/namei.c in the Linux kernel before 3.6 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel heap memory via a crafted application. | 1.9 |
2013-03-15 | CVE-2012-6547 | Linux | Information Exposure vulnerability in Linux Kernel The __tun_chr_ioctl function in drivers/net/tun.c in the Linux kernel before 3.6 does not initialize a certain structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted application. | 1.9 |
2013-03-15 | CVE-2012-6546 | Linux Redhat | Information Exposure vulnerability in Linux Kernel The ATM implementation in the Linux kernel before 3.6 does not initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application. | 1.9 |
2013-03-15 | CVE-2012-6545 | Redhat Linux | Information Exposure vulnerability in multiple products The Bluetooth RFCOMM implementation in the Linux kernel before 3.6 does not properly initialize certain structures, which allows local users to obtain sensitive information from kernel memory via a crafted application. | 1.9 |
2013-03-15 | CVE-2012-6544 | Linux Redhat | Information Exposure vulnerability in Linux Kernel The Bluetooth protocol stack in the Linux kernel before 3.6 does not properly initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application that targets the (1) L2CAP or (2) HCI implementation. | 1.9 |
2013-03-15 | CVE-2012-6543 | Linux | Information Exposure vulnerability in Linux Kernel The l2tp_ip6_getname function in net/l2tp/l2tp_ip6.c in the Linux kernel before 3.6 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel stack memory via a crafted application. | 1.9 |
2013-03-15 | CVE-2012-6542 | Linux Redhat | Information Exposure vulnerability in Linux Kernel The llc_ui_getname function in net/llc/af_llc.c in the Linux kernel before 3.6 has an incorrect return value in certain circumstances, which allows local users to obtain sensitive information from kernel stack memory via a crafted application that leverages an uninitialized pointer argument. | 1.9 |
2013-03-15 | CVE-2012-6541 | Linux | Information Exposure vulnerability in Linux Kernel The ccid3_hc_tx_getsockopt function in net/dccp/ccids/ccid3.c in the Linux kernel before 3.6 does not initialize a certain structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted application. | 1.9 |
2013-03-15 | CVE-2012-6540 | Linux | Information Exposure vulnerability in Linux Kernel The do_ip_vs_get_ctl function in net/netfilter/ipvs/ip_vs_ctl.c in the Linux kernel before 3.6 does not initialize a certain structure for IP_VS_SO_GET_TIMEOUT commands, which allows local users to obtain sensitive information from kernel stack memory via a crafted application. | 1.9 |
2013-03-15 | CVE-2012-6539 | Linux | Information Exposure vulnerability in Linux Kernel The dev_ifconf function in net/socket.c in the Linux kernel before 3.6 does not initialize a certain structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted application. | 1.9 |
2013-03-15 | CVE-2012-6538 | Linux Redhat | Information Exposure vulnerability in Linux Kernel The copy_to_user_auth function in net/xfrm/xfrm_user.c in the Linux kernel before 3.6 uses an incorrect C library function for copying a string, which allows local users to obtain sensitive information from kernel heap memory by leveraging the CAP_NET_ADMIN capability. | 1.9 |
2013-03-15 | CVE-2012-6537 | Linux Redhat | Information Exposure vulnerability in Linux Kernel net/xfrm/xfrm_user.c in the Linux kernel before 3.6 does not initialize certain structures, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability. | 1.9 |