Weekly Vulnerabilities Reports > March 11 to 17, 2013
Overview
74 new vulnerabilities reported during this period, including 12 critical vulnerabilities and 18 high severity vulnerabilities. This weekly summary report vulnerabilities in 83 products from 34 vendors including Microsoft, Apple, Adobe, Apache, and Redhat. Vulnerabilities are notably categorized as "Improper Restriction of Operations within the Bounds of a Memory Buffer", "Resource Management Errors", "Permissions, Privileges, and Access Controls", "Numeric Errors", and "Information Exposure".
- 66 reported vulnerabilities are remotely exploitables.
- 3 reported vulnerabilities have public exploit available.
- 11 reported vulnerabilities are related to weaknesses in OWASP Top Ten.
- 66 reported vulnerabilities are exploitable by an anonymous user.
- Microsoft has the most reported vulnerabilities, with 19 reported vulnerabilities.
- Microsoft has the most reported critical vulnerabilities, with 8 reported vulnerabilities.
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
EXPLOITABLE
EXPLOITABLE
AVAILABLE
ANONYMOUSLY
WEB APPLICATION
Vulnerability Details
The following table list reported vulnerabilities for the period covered by this report:
12 Critical Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2013-03-14 | CVE-2013-1049 | Debian | Buffer Errors vulnerability in Debian Cfingerd 1.4.33 Buffer overflow in the RFC1413 (ident) client in cfingerd 1.4.3-3 allows remote IDENT servers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted response. | 10.0 |
2013-03-13 | CVE-2013-1375 | Adobe Apple Microsoft Linux | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Adobe products Heap-based buffer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK & Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors. | 10.0 |
2013-03-13 | CVE-2013-1371 | Adobe Apple Microsoft Linux | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Adobe products Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK & Compiler before 3.6.0.6090 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. | 10.0 |
2013-03-13 | CVE-2013-0650 | Adobe Apple Microsoft Linux | Resource Management Errors vulnerability in Adobe products Use-after-free vulnerability in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK & Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors. | 10.0 |
2013-03-13 | CVE-2013-0646 | Adobe Apple Microsoft Linux | Numeric Errors vulnerability in Adobe products Integer overflow in Adobe Flash Player before 10.3.183.68 and 11.x before 11.6.602.180 on Windows and Mac OS X, before 10.3.183.68 and 11.x before 11.2.202.275 on Linux, before 11.1.111.44 on Android 2.x and 3.x, and before 11.1.115.48 on Android 4.x; Adobe AIR before 3.6.0.6090; Adobe AIR SDK before 3.6.0.6090; and Adobe AIR SDK & Compiler before 3.6.0.6090 allows attackers to execute arbitrary code via unspecified vectors. | 10.0 |
2013-03-13 | CVE-2013-2558 | Microsoft | Denial of Service vulnerability in Microsoft Windows 8 Unspecified vulnerability in Microsoft Windows 8 allows remote attackers to cause a denial of service (reboot) or possibly have unknown other impact via a crafted TrueType Font (TTF) file, as demonstrated by the 120612-69701-01.dmp error report. | 10.0 |
2013-03-11 | CVE-2012-4702 | 360Systems | Credentials Management vulnerability in 360Systems Image Server 2000, Image Server Maxx and Maxx 360 Systems Maxx, Image Server Maxx, and Image Server 2000 have a hardcoded password for the root account, which makes it easier for remote attackers to execute arbitrary code, or modify video content or scheduling, via an SSH session. | 10.0 |
2013-03-11 | CVE-2013-2555 | Adobe Opensuse Suse Redhat | Integer Overflow or Wraparound vulnerability in multiple products Integer overflow in Adobe Flash Player before 10.3.183.75 and 11.x before 11.7.700.169 on Windows and Mac OS X, before 10.3.183.75 and 11.x before 11.2.202.280 on Linux, before 11.1.111.50 on Android 2.x and 3.x, and before 11.1.115.54 on Android 4.x; Adobe AIR before 3.7.0.1530; and Adobe AIR SDK & Compiler before 3.7.0.1530 allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013. | 10.0 |
2013-03-13 | CVE-2013-0079 | Microsoft | Remote Code Execution vulnerability in Microsoft Office Filter Pack, Visio and Visio Viewer Microsoft Visio Viewer 2010 SP1 allows remote attackers to execute arbitrary code via a crafted Visio file that triggers incorrect memory allocation, aka "Visio Viewer Tree Object Type Confusion Vulnerability." | 9.3 |
2013-03-13 | CVE-2013-0074 | Microsoft | Unspecified vulnerability in Microsoft Silverlight Microsoft Silverlight 5, and 5 Developer Runtime, before 5.1.20125.0 does not properly validate pointers during HTML object rendering, which allows remote attackers to execute arbitrary code via a crafted Silverlight application, aka "Silverlight Double Dereference Vulnerability." | 9.3 |
2013-03-11 | CVE-2013-2551 | Microsoft | USE After Free vulnerability in Microsoft Internet Explorer Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-1309. | 9.3 |
2013-03-11 | CVE-2013-0787 | Mozilla | Resource Management Errors vulnerability in Mozilla products Use-after-free vulnerability in the nsEditor::IsPreformatted function in editor/libeditor/base/nsEditor.cpp in Mozilla Firefox before 19.0.2, Firefox ESR 17.x before 17.0.4, Thunderbird before 17.0.4, Thunderbird ESR 17.x before 17.0.4, and SeaMonkey before 2.16.1 allows remote attackers to execute arbitrary code via vectors involving an execCommand call. | 9.3 |
18 High Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2013-03-11 | CVE-2012-1999 | HP | Unspecified vulnerability in HP Systems Insight Manager Unspecified vulnerability in HP Systems Insight Manager (SIM) before 7.0 allows remote authenticated users to obtain sensitive information or modify data via unknown vectors. | 8.5 |
2013-03-15 | CVE-2013-2560 | Foscam | Path Traversal vulnerability in Foscam Fi8919W Directory traversal vulnerability in the web interface on Foscam devices with firmware before 11.37.2.49 allows remote attackers to read arbitrary files via a .. | 7.8 |
2013-03-13 | CVE-2013-0085 | Microsoft | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Microsoft Sharepoint Foundation and Sharepoint Server Buffer overflow in Microsoft SharePoint Server 2010 SP1 and SharePoint Foundation 2010 SP1 allows remote attackers to cause a denial of service (W3WP process crash and site outage) via a crafted URL, aka "Buffer Overflow Vulnerability." | 7.8 |
2013-03-12 | CVE-2013-2292 | Bitcoin | Resource Management Errors vulnerability in Bitcoin Bitcoin-Qt, Bitcoin Core and Bitcoind bitcoind and Bitcoin-Qt 0.8.0 and earlier allow remote attackers to cause a denial of service (electricity consumption) by mining a block to create a nonstandard Bitcoin transaction containing multiple OP_CHECKSIG script opcodes. | 7.8 |
2013-03-12 | CVE-2012-4684 | Bitcoin | Resource Management Errors vulnerability in Bitcoin products The alert functionality in bitcoind and Bitcoin-Qt before 0.7.0 supports different character representations of the same signature data, but relies on a hash of this signature, which allows remote attackers to cause a denial of service (resource consumption) via a valid modified signature for a circulating alert. | 7.8 |
2013-03-11 | CVE-2013-1627 | Advantech Indusoft | Path Traversal vulnerability in multiple products Absolute path traversal vulnerability in NTWebServer.exe in Indusoft Studio 7.0 and earlier and Advantech Studio 7.0 and earlier allows remote attackers to read arbitrary files via a full pathname in an argument to the sub_401A90 CreateFileW function. | 7.8 |
2013-03-14 | CVE-2013-1468 | Piwigo | Cross-Site Request Forgery (CSRF) vulnerability in Piwigo Cross-site request forgery (CSRF) vulnerability in the LocalFiles Editor plugin in Piwigo before 2.4.7 allows remote attackers to hijack the authentication of administrators for requests that create arbitrary PHP files via unspecified vectors. | 7.6 |
2013-03-14 | CVE-2013-1667 | Perl | Resource Management Errors vulnerability in Perl The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key. | 7.5 |
2013-03-13 | CVE-2013-0084 | Microsoft | Path Traversal vulnerability in Microsoft Sharepoint Foundation and Sharepoint Server Directory traversal vulnerability in Microsoft SharePoint Server 2010 SP1 and SharePoint Foundation 2010 SP1 allows remote attackers to bypass intended read restrictions for content, and hijack user accounts, via a crafted URL, aka "SharePoint Directory Traversal Vulnerability." | 7.5 |
2013-03-13 | CVE-2013-0080 | Microsoft | Permissions, Privileges, and Access Controls vulnerability in Microsoft Sharepoint Foundation and Sharepoint Server Microsoft SharePoint Server 2010 SP1 and SharePoint Foundation 2010 SP1 allow remote attackers to bypass intended read restrictions for content, and hijack user accounts, via a crafted URL, aka "Callback Function Vulnerability." | 7.5 |
2013-03-11 | CVE-2013-1081 | Novell | Path Traversal vulnerability in Novell Zenworks Mobile Management 2.6.1/2.7.0 Directory traversal vulnerability in MDM.php in Novell ZENworks Mobile Management (ZMM) 2.6.1 and 2.7.0 allows remote attackers to include and execute arbitrary local files via the language parameter. | 7.5 |
2013-03-11 | CVE-2012-1997 | HP | Unspecified vulnerability in HP Systems Insight Manager Unspecified vulnerability in HP Systems Insight Manager (SIM) before 7.0 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via unknown vectors, a different vulnerability than CVE-2012-1998. | 7.5 |
2013-03-11 | CVE-2013-2557 | Microsoft | Buffer Errors vulnerability in Microsoft Internet Explorer 9 The sandbox protection mechanism in Microsoft Internet Explorer 9 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, as demonstrated against Adobe Flash Player by VUPEN during a Pwn2Own competition at CanSecWest 2013. | 7.5 |
2013-03-11 | CVE-2013-2554 | Microsoft | Security Bypass vulnerability in Microsoft Windows 7 Unspecified vulnerability in Microsoft Windows 7 allows attackers to bypass the ASLR and DEP protection mechanisms via unknown vectors, as demonstrated against Firefox by VUPEN during a Pwn2Own competition at CanSecWest 2013, a different vulnerability than CVE-2013-0787. | 7.5 |
2013-03-11 | CVE-2013-2552 | Microsoft | Remote Code Execution vulnerability in Microsoft Internet Explorer 10 Unspecified vulnerability in Microsoft Internet Explorer 10 on Windows 8 allows remote attackers to bypass the sandbox protection mechanism by leveraging access to a Medium integrity process, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013. | 7.5 |
2013-03-11 | CVE-2013-2550 | Adobe | Use After Free Remote Code Execution vulnerability in Adobe Acrobat Reader 11.0.02 Unspecified vulnerability in Adobe Reader 11.0.02 allows attackers to bypass the sandbox protection mechanism via unknown vectors, as demonstrated by George Hotz during a Pwn2Own competition at CanSecWest 2013. | 7.5 |
2013-03-11 | CVE-2013-2549 | Adobe | Code Injection vulnerability in Adobe Acrobat Reader 11.0.02 Unspecified vulnerability in Adobe Reader 11.0.02 allows remote attackers to execute arbitrary code via vectors related to a "break into the sandbox," as demonstrated by George Hotz during a Pwn2Own competition at CanSecWest 2013. | 7.5 |
2013-03-11 | CVE-2013-2553 | Microsoft | Local Privilege Escalation vulnerability in Microsoft Windows 7 Unspecified vulnerability in the kernel in Microsoft Windows 7 allows local users to gain privileges via unknown vectors, as demonstrated by Nils and Jon of MWR Labs during a Pwn2Own competition at CanSecWest 2013, a different vulnerability than CVE-2013-0912. | 7.2 |
40 Medium Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2013-03-15 | CVE-2013-2492 | Firebirdsql Microsoft | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Firebirdsql Firebird Stack-based buffer overflow in Firebird 2.1.3 through 2.1.5 before 18514, and 2.5.1 through 2.5.3 before 26623, on Windows allows remote attackers to execute arbitrary code via a crafted packet to TCP port 3050, related to a missing size check during extraction of a group number from CNCT information. | 6.8 |
2013-03-15 | CVE-2013-0976 | Apple | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Apple mac OS X IOAcceleratorFamily in Apple Mac OS X before 10.8.3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted graphics image. | 6.8 |
2013-03-15 | CVE-2013-0973 | Apple | Remote Code Execution vulnerability in Apple Mac OS X Software Update in Apple Mac OS X through 10.7.5 does not prevent plugin loading within the marketing-text WebView, which allows man-in-the-middle attackers to execute plugin code by modifying the client-server data stream. | 6.8 |
2013-03-15 | CVE-2013-0971 | Apple | Resource Management Errors vulnerability in Apple mac OS X and mac OS X Server Use-after-free vulnerability in PDFKit in Apple Mac OS X before 10.8.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted ink annotations in a PDF document. | 6.8 |
2013-03-15 | CVE-2013-0961 | Apple | Memory Corruption vulnerability in WebKit WebKit in Apple Safari before 6.0.3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2013-0960. | 6.8 |
2013-03-15 | CVE-2013-0960 | Apple | Memory Corruption vulnerability in WebKit WebKit in Apple Safari before 6.0.3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2013-0961. | 6.8 |
2013-03-14 | CVE-2012-4446 | Apache | Improper Authentication vulnerability in Apache Qpid The default configuration for Apache Qpid 0.20 and earlier, when the federation_tag attribute is enabled, accepts AMQP connections without checking the source user ID, which allows remote attackers to bypass authentication and have other unspecified impact via an AMQP request. | 6.8 |
2013-03-11 | CVE-2012-1998 | HP | Unspecified vulnerability in HP Systems Insight Manager Unspecified vulnerability in HP Systems Insight Manager (SIM) before 7.0 allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via unknown vectors, a different vulnerability than CVE-2012-1997. | 6.8 |
2013-03-14 | CVE-2013-1794 | Openafs | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Openafs Buffer overflow in certain client utilities in OpenAFS before 1.6.2 allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a long fileserver ACL entry. | 6.5 |
2013-03-15 | CVE-2013-2373 | Tibco | Permissions, Privileges, and Access Controls vulnerability in Tibco Spotfire web Player The Engine in TIBCO Spotfire Web Player 3.3.x before 3.3.3, 4.0.x before 4.0.3, 4.5.x before 4.5.1, and 5.0.x before 5.0.1 does not properly implement access control, which allows remote attackers to obtain sensitive information or modify data via unspecified vectors. | 6.4 |
2013-03-15 | CVE-2013-0966 | Apple | Authentication Bypass vulnerability in Apple Mac OS X The Apple mod_hfs_apple module for the Apache HTTP Server in Apple Mac OS X before 10.8.3 does not properly handle ignorable Unicode characters, which allows remote attackers to bypass intended directory authentication requirements via a crafted pathname in a URI. | 6.4 |
2013-03-11 | CVE-2012-4703 | Emerson | Resource Management Errors vulnerability in Emerson products The Emerson DeltaV SE3006 through 11.3.1, DeltaV VE3005 through 10.3.1 and 11.x through 11.3.1, and DeltaV VE3006 through 10.3.1 and 11.x through 11.3.1 allow remote attackers to cause a denial of service (device restart) via a crafted packet on (1) TCP port 23, (2) UDP port 161, or (3) TCP port 513. | 6.1 |
2013-03-12 | CVE-2011-4966 | Freeradius | Credentials Management vulnerability in Freeradius modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password. | 6.0 |
2013-03-11 | CVE-2013-2503 | Privoxy | Improper Input Validation vulnerability in Privoxy Privoxy before 3.0.21 does not properly handle Proxy-Authenticate and Proxy-Authorization headers in the client-server data stream, which makes it easier for remote HTTP servers to spoof the intended proxy service via a 407 (aka Proxy Authentication Required) HTTP status code. | 5.8 |
2013-03-12 | CVE-2012-6118 | Redhat | Permissions, Privileges, and Access Controls vulnerability in Redhat Aeolus Conductor The Administer tab in Aeolus Conductor allows remote authenticated users to bypass intended quota restrictions by updating the Maximum Running Instances quota user setting. | 5.5 |
2013-03-12 | CVE-2011-1165 | David King | Remote Security vulnerability in Vino Vino, possibly before 3.2, does not properly document that it opens ports in UPnP routers when the "Configure network to automatically accept connections" setting is enabled, which might make it easier for remote attackers to perform further attacks. | 5.1 |
2013-03-15 | CVE-2013-2371 | Tibco | Information Exposure vulnerability in Tibco Spotfire Statistics Services 3.3/4.5.0/5.0.0 The Web API in the Statistics Server in TIBCO Spotfire Statistics Services 3.3.x before 3.3.1, 4.5.x before 4.5.1, and 5.0.x before 5.0.1 allows remote attackers to obtain sensitive information via an unspecified HTTP request. | 5.0 |
2013-03-14 | CVE-2013-1795 | Openafs | Numeric Errors vulnerability in Openafs Integer overflow in ptserver in OpenAFS before 1.6.2 allows remote attackers to cause a denial of service (crash) via a large list from the IdToName RPC, which triggers a heap-based buffer overflow. | 5.0 |
2013-03-14 | CVE-2012-4459 | Apache | Numeric Errors vulnerability in Apache Qpid Integer overflow in the qpid::framing::Buffer::checkAvailable function in Apache Qpid 0.20 and earlier allows remote attackers to cause a denial of service (crash) via a crafted message, which triggers an out-of-bounds read. | 5.0 |
2013-03-14 | CVE-2012-4458 | Apache | Numeric Errors vulnerability in Apache Qpid The AMQP type decoder in Apache Qpid 0.20 and earlier allows remote attackers to cause a denial of service (memory consumption and server crash) via a large number of zero width elements in the client-properties map in a connection.start-ok message. | 5.0 |
2013-03-13 | CVE-2013-0312 | Fedoraproject | Numeric Errors vulnerability in Fedoraproject 389 Directory Server 389 Directory Server before 1.3.0.4 allows remote attackers to cause a denial of service (crash) via a zero length LDAP control sequence. | 5.0 |
2013-03-13 | CVE-2013-0095 | Microsoft | Information Exposure vulnerability in Microsoft Office 2008/2011 Outlook in Microsoft Office for Mac 2008 before 12.3.6 and Office for Mac 2011 before 14.3.2 allows remote attackers to trigger access to a remote URL and consequently confirm the rendering of an HTML e-mail message by including unspecified HTML5 elements and leveraging the installation of a WebKit browser on the victim's machine, aka "Unintended Content Loading Vulnerability." | 5.0 |
2013-03-13 | CVE-2013-0086 | Microsoft | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Microsoft Sharepoint Foundation and Sharepoint Server Microsoft OneNote 2010 SP1 does not properly determine buffer sizes during memory allocation, which allows remote attackers to obtain sensitive information via a crafted OneNote file, aka "Buffer Size Validation Vulnerability." | 5.0 |
2013-03-12 | CVE-2013-0252 | Boost | Improper Input Validation vulnerability in Boost boost::locale::utf::utf_traits in the Boost.Locale library in Boost 1.48 through 1.52 does not properly detect certain invalid UTF-8 sequences, which might allow remote attackers to bypass input validation protection mechanisms via crafted trailing bytes. | 5.0 |
2013-03-12 | CVE-2013-2293 | Bitcoin | Resource Management Errors vulnerability in Bitcoin Bitcoin-Qt, Bitcoin Core and Bitcoind The CTransaction::FetchInputs method in bitcoind and Bitcoin-Qt before 0.8.0rc1 copies transactions from disk to memory without incrementally checking for spent prevouts, which allows remote attackers to cause a denial of service (disk I/O consumption) via a Bitcoin transaction with many inputs corresponding to many different parts of the stored block chain. | 5.0 |
2013-03-12 | CVE-2013-2273 | Bitcoin | Information Exposure vulnerability in Bitcoin Bitcoin-Qt, Bitcoin Core and Bitcoind bitcoind and Bitcoin-Qt before 0.4.9rc1, 0.5.x before 0.5.8rc1, 0.6.0 before 0.6.0.11rc1, 0.6.1 through 0.6.5 before 0.6.5rc1, and 0.7.x before 0.7.3rc1 make it easier for remote attackers to obtain potentially sensitive information about returned change by leveraging certain predictability in the outputs of a Bitcoin transaction. | 5.0 |
2013-03-12 | CVE-2013-2272 | Bitcoin | Information Exposure vulnerability in Bitcoin Bitcoin-Qt, Bitcoin Core and Bitcoind The penny-flooding protection mechanism in the CTxMemPool::accept method in bitcoind and Bitcoin-Qt before 0.4.9rc1, 0.5.x before 0.5.8rc1, 0.6.0 before 0.6.0.11rc1, 0.6.1 through 0.6.5 before 0.6.5rc1, and 0.7.x before 0.7.3rc1 allows remote attackers to determine associations between wallet addresses and IP addresses via a series of large Bitcoin transactions with insufficient fees. | 5.0 |
2013-03-15 | CVE-2013-0969 | Apple | Permissions, Privileges, and Access Controls vulnerability in Apple mac OS X 10.8.0/10.8.1/10.8.2 Login Window in Apple Mac OS X before 10.8.3 does not prevent application launching with the VoiceOver feature, which allows physically proximate attackers to bypass authentication and make arbitrary System Preferences changes via unspecified use of the keyboard. | 4.9 |
2013-03-12 | CVE-2011-1164 | David King | Configuration vulnerability in David King Vino Vino before 2.99.4 can connect external networks contrary to the statement in the vino-preferences dialog box, which might make it easier for remote attackers to perform attacks. | 4.6 |
2013-03-12 | CVE-2012-6076 | Inkscape | Permissions, Privileges, and Access Controls vulnerability in Inkscape Inkscape before 0.48.4 reads .eps files from /tmp instead of the current directory, which might cause Inkspace to process unintended files, allow local users to obtain sensitive information, and possibly have other unspecified impacts. | 4.4 |
2013-03-15 | CVE-2013-2372 | Tibco | Cross-Site Scripting vulnerability in Tibco Spotfire web Player Cross-site scripting (XSS) vulnerability in the Engine in TIBCO Spotfire Web Player 3.3.x before 3.3.3, 4.0.x before 4.0.3, 4.5.x before 4.5.1, and 5.0.x before 5.0.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | 4.3 |
2013-03-15 | CVE-2013-2566 | Oracle Fujitsu Canonical Mozilla | Inadequate Encryption Strength vulnerability in multiple products The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the same plaintext. | 4.3 |
2013-03-15 | CVE-2013-0970 | Apple | Security Bypass vulnerability in Apple mac OS X 10.8.0/10.8.1/10.8.2 Messages in Apple Mac OS X before 10.8.3 allows remote attackers to bypass the FaceTime call-confirmation prompt via a crafted FaceTime: URL. | 4.3 |
2013-03-15 | CVE-2013-0967 | Apple | Security Bypass vulnerability in Apple Mac OS X CoreTypes in Apple Mac OS X before 10.8.3 includes JNLP files in the list of safe file types, which allows remote attackers to bypass a Java plug-in disabled setting, and trigger the launch of Java Web Start applications, via a crafted web site. | 4.3 |
2013-03-14 | CVE-2013-0275 | Ganglia | Cross-Site Scripting vulnerability in Ganglia Ganglia-Web Multiple cross-site scripting (XSS) vulnerabilities in Ganglia Web before 3.5.6 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. | 4.3 |
2013-03-13 | CVE-2013-0083 | Microsoft | Cross-Site Scripting vulnerability in Microsoft Sharepoint Foundation and Sharepoint Server Cross-site scripting (XSS) vulnerability in Microsoft SharePoint Server 2010 SP1 allows remote attackers to inject arbitrary web script or HTML via crafted content, leading to administrative command execution, aka "SharePoint XSS Vulnerability." | 4.3 |
2013-03-11 | CVE-2012-1996 | HP | Unspecified vulnerability in HP Systems Insight Manager Unspecified vulnerability in HP Systems Insight Manager (SIM) before 7.0 allows remote attackers to modify data via unknown vectors. | 4.3 |
2013-03-14 | CVE-2013-1814 | Apache | Information Exposure vulnerability in Apache Rave The users/get program in the User RPC API in Apache Rave 0.11 through 0.20 allows remote authenticated users to obtain sensitive information about all user accounts via the offset parameter, as demonstrated by discovering password hashes in the password field of a response. | 4.0 |
2013-03-13 | CVE-2013-1469 | Piwigo | Path Traversal vulnerability in Piwigo Directory traversal vulnerability in install.php in Piwigo before 2.4.7 allows remote attackers to read and delete arbitrary files via a .. | 4.0 |
2013-03-12 | CVE-2013-0168 | Redhat | Permissions, Privileges, and Access Controls vulnerability in Redhat Enterprise Virtualization Manager The MoveDisk command in Red Hat Enterprise Virtualization Manager (RHEV-M) 3.1 and earlier does not properly check permissions on storage domains, which allows remote authenticated storage admins to cause a denial of service (free space consumption of other storage domains) via unspecified vectors. | 4.0 |
4 Low Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2013-03-12 | CVE-2012-5659 | Redhat | Unspecified vulnerability in Redhat Automatic BUG Reporting Tool Untrusted search path vulnerability in plugins/abrt-action-install-debuginfo-to-abrt-cache.c in Automatic Bug Reporting Tool (ABRT) 2.0.9 and earlier allows local users to load and execute arbitrary Python modules by modifying the PYTHONPATH environment variable to reference a malicious Python module. | 3.7 |
2013-03-15 | CVE-2013-0248 | Apache | Permissions, Privileges, and Access Controls vulnerability in Apache Commons Fileupload The default configuration of javax.servlet.context.tempdir in Apache Commons FileUpload 1.0 through 1.2.2 uses the /tmp directory for uploaded files, which allows local users to overwrite arbitrary files via an unspecified symlink attack. | 3.3 |
2013-03-11 | CVE-2012-1995 | HP | Unspecified vulnerability in HP Systems Insight Manager Unspecified vulnerability in HP Systems Insight Manager (SIM) before 7.0 allows local users to obtain sensitive information or modify data via unknown vectors. | 3.2 |
2013-03-12 | CVE-2012-6117 | Redhat | Permissions, Privileges, and Access Controls vulnerability in Redhat Cloudforms Cloud Engine 1.0/1.1 Aeolus Configuration Server, as used in Red Hat CloudForms Cloud Engine before 1.1.2, uses world-readable permissions for /var/log/aeolus-configserver/configserver.log, which allows local users to read plaintext passwords by reading the log file. | 2.1 |