Weekly Vulnerabilities Reports > October 21 to 27, 2013
Overview
93 new vulnerabilities reported during this period, including 3 critical vulnerabilities and 14 high severity vulnerabilities. This weekly summary report vulnerabilities in 67 products from 33 vendors including Apple, Cisco, IBM, Mozilla, and Redhat. Vulnerabilities are notably categorized as "Permissions, Privileges, and Access Controls", "Improper Input Validation", "Cryptographic Issues", "Numeric Errors", and "Cross-site Scripting".
- 70 reported vulnerabilities are remotely exploitables.
- 5 reported vulnerabilities have public exploit available.
- 15 reported vulnerabilities are related to weaknesses in OWASP Top Ten.
- 85 reported vulnerabilities are exploitable by an anonymous user.
- Apple has the most reported vulnerabilities, with 36 reported vulnerabilities.
- Cisco has the most reported critical vulnerabilities, with 1 reported vulnerabilities.
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
EXPLOITABLE
EXPLOITABLE
AVAILABLE
ANONYMOUSLY
WEB APPLICATION
Vulnerability Details
The following table list reported vulnerabilities for the period covered by this report:
3 Critical Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2013-10-24 | CVE-2013-6245 | Sybase | Remote Code Execution vulnerability in SAP Sybase Adaptive Server Enterprise Unspecified vulnerability in SAP Sybase Adaptive Server Enterprise (ASE) before 15.0.3 ESD#4.3. | 10.0 |
2013-10-22 | CVE-2013-5446 | IBM | Security vulnerability in IBM products The console on IBM WebSphere DataPower XC10 appliances 2.1.0 and 2.5.0 does not properly process logoff actions, which has unspecified impact and remote attack vectors. | 10.0 |
2013-10-25 | CVE-2013-5530 | Cisco | OS Command Injection vulnerability in Cisco Identity Services Engine Software The web framework in Cisco Identity Services Engine (ISE) 1.0 and 1.1.0 before 1.1.0.665-5, 1.1.1 before 1.1.1.268-7, 1.1.2 before 1.1.2.145-10, 1.1.3 before 1.1.3.124-7, 1.1.4 before 1.1.4.218-7, and 1.2 before 1.2.0.899-2 allows remote authenticated users to execute arbitrary commands via a crafted session on TCP port 443, aka Bug ID CSCuh81511. | 9.0 |
14 High Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2013-10-26 | CVE-2013-6016 | F5 | Improper Input Validation vulnerability in F5 products The Traffic Management Microkernel (TMM) in F5 BIG-IP LTM, APM, ASM, Edge Gateway, GTM, Link Controller, and WOM 10.0.0 through 10.2.2 and 11.0.0; Analytics 11.0.0; PSM 9.4.0 through 9.4.8, 10.0.0 through 10.2.4, and 11.0.0 through 11.4.1; and WebAccelerator 9.4.0 through 9.4.8, 10.0.0 through 10.2.4, and 11.0.0 through 11.3.0 might change a TCP connection to the ESTABLISHED state before receiving the ACK packet, which allows remote attackers to cause a denial of service (SIGFPE or assertion failure and TMM restart) via unspecified vectors. | 7.8 |
2013-10-24 | CVE-2013-5537 | Cisco | Improper Input Validation vulnerability in Cisco products The web framework on Cisco Web Security Appliance (WSA), Email Security Appliance (ESA), and Content Security Management Appliance (SMA) devices does not properly manage the state of HTTP and HTTPS sessions, which allows remote attackers to cause a denial of service (management GUI outage) via multiple TCP connections, aka Bug IDs CSCuj59411, CSCuf89818, and CSCuh05635. | 7.8 |
2013-10-27 | CVE-2013-0337 | F5 | Permissions, Privileges, and Access Controls vulnerability in F5 Nginx The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files. | 7.5 |
2013-10-26 | CVE-2013-6284 | SAP | Unspecified vulnerability in SAP ERP Central Component Unspecified vulnerability in the Statutory Reporting for Insurance (FS_SR) component in the Financial Services module for SAP ERP Central Component (ECC) allows attackers to execute arbitrary code via unspecified vectors, related to a "code injection vulnerability." | 7.5 |
2013-10-25 | CVE-2013-6283 | Videolan | Improper Input Validation vulnerability in Videolan VLC Media Player VideoLAN VLC Media Player 2.0.8 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in a URL in a m3u file. | 7.5 |
2013-10-25 | CVE-2013-3280 | EMC | Permissions, Privileges, and Access Controls vulnerability in EMC RSA Authentication Agent 7.1/7.1.1 EMC RSA Authentication Agent 7.1.x before 7.1.2 for Web for Internet Information Services has a fail-open design, which allows remote attackers to bypass intended access restrictions via vectors that trigger an agent crash. | 7.5 |
2013-10-24 | CVE-2013-5179 | Apple | Permissions, Privileges, and Access Controls vulnerability in Apple mac OS X App Sandbox in Apple Mac OS X before 10.9 allows attackers to bypass intended sandbox restrictions via a crafted app that uses the LaunchServices interface to specify process arguments. | 7.5 |
2013-10-24 | CVE-2013-5135 | Apple | USE of Externally-Controlled Format String vulnerability in Apple Remote Desktop and mac OS X Format string vulnerability in Screen Sharing Server in Apple Mac OS X before 10.9 and Apple Remote Desktop before 3.5.4 allows remote attackers to execute arbitrary code via format string specifiers in a VNC username. | 7.5 |
2013-10-23 | CVE-2013-6243 | Landing Pages Project | SQL Injection vulnerability in Landing Pages Project Landing Pages Plugin SQL injection vulnerability in the Landing Pages plugin 1.2.3, before 20131009, and earlier for WordPress allows remote attackers to execute arbitrary SQL commands via the "post" parameter to index.php. | 7.5 |
2013-10-24 | CVE-2013-5148 | Apple | Permissions, Privileges, and Access Controls vulnerability in Apple Keynote Apple Keynote before 6.0 does not properly handle the interaction between Keynote presentation mode and the Screen Lock implementation, which allows physically proximate attackers to obtain access by visiting an unattended workstation on which this mode was enabled during a sleep operation. | 7.2 |
2013-10-25 | CVE-2013-5549 | Cisco | Unspecified vulnerability in Cisco IOS XR Cisco IOS XR 3.8.1 through 4.2.0 does not properly process fragmented packets within the RP-A, RP-B, PRP, and DRP-B route-processor components, which allows remote attackers to cause a denial of service (transmission outage) via (1) IPv4 or (2) IPv6 traffic, aka Bug ID CSCuh30380. | 7.1 |
2013-10-24 | CVE-2013-5172 | Apple | Numeric Errors vulnerability in Apple mac OS X The kernel in Apple Mac OS X before 10.9 does not properly determine the output length for SHA-2 digest function calls, which allows context-dependent attackers to cause a denial of service (panic) by triggering a digest operation, as demonstrated by an IPSec connection. | 7.1 |
2013-10-22 | CVE-2013-5428 | IBM | Permissions, Privileges, and Access Controls vulnerability in IBM products IBM WebSphere DataPower XC10 appliances 2.5.0 do not require authentication for all administrative actions, which allows remote attackers to cause a denial of service via unspecified vectors. | 7.1 |
2013-10-21 | CVE-2013-5970 | Vmware | Improper Input Validation vulnerability in VMWare ESX and Esxi hostd-vmdb in VMware ESXi 4.0 through 5.0 and ESX 4.0 through 4.1 allows remote attackers to cause a denial of service (hostd-vmdb service outage) by modifying management traffic. | 7.1 |
62 Medium Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2013-10-26 | CVE-2013-5914 | Polarssl | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Polarssl Buffer overflow in the ssl_read_record function in ssl_tls.c in PolarSSL before 1.1.8, when using TLS 1.1, might allow remote attackers to execute arbitrary code via a long packet. | 6.8 |
2013-10-26 | CVE-2013-4885 | Nmap Opensuse | Arbitrary File Write vulnerability in Nmap The http-domino-enum-passwords.nse script in NMap before 6.40, when domino-enum-passwords.idpath is set, allows remote servers to upload "arbitrarily named" files via a crafted FullName parameter in a response, as demonstrated using directory traversal sequences. | 6.8 |
2013-10-26 | CVE-2011-4106 | Binarymoon | Improper Input Validation vulnerability in Binarymoon Timthumb 1.09/1.15/1.99 TimThumb (timthumb.php) before 2.0 does not validate the entire source with the domain white list, which allows remote attackers to upload and execute arbitrary code via a URL containing a white-listed domain in the src parameter, then accessing it via a direct request to the file in the cache directory, as exploited in the wild in August 2011. | 6.8 |
2013-10-25 | CVE-2013-4957 | Puppet | Code Injection vulnerability in Puppet Enterprise The dashboard report in Puppet Enterprise before 3.0.1 allows attackers to execute arbitrary YAML code via a crafted report-specific type. | 6.8 |
2013-10-25 | CVE-2013-5424 | IBM | Permissions, Privileges, and Access Controls vulnerability in IBM Flex System Manager 1.3.0 IBM Flex System Manager (FSM) 1.3.0 allows remote attackers to bypass intended access restrictions, and create new user accounts or execute tasks, by leveraging an expired password for the system-level account. | 6.8 |
2013-10-25 | CVE-2013-5522 | Cisco | Permissions, Privileges, and Access Controls vulnerability in Cisco Catalyst 3750-X and IOS Cisco IOS on Catalyst 3750X switches has default Service Module credentials, which makes it easier for local users to gain privileges via a Service Module login, aka Bug ID CSCue92286. | 6.8 |
2013-10-24 | CVE-2013-5143 | Apple | Certificate Validation Security Bypass vulnerability in Apple Mac OS X Server The RADIUS service in Server App in Apple OS X Server before 3.0 selects a fallback X.509 certificate in unspecified circumstances, which might allow man-in-the-middle attackers to hijack RADIUS sessions by leveraging knowledge of the private key that matches this fallback certificate. | 6.8 |
2013-10-24 | CVE-2013-1734 | Mozilla | Cross-Site Request Forgery (CSRF) vulnerability in Mozilla Bugzilla Cross-site request forgery (CSRF) vulnerability in attachment.cgi in Bugzilla 2.x, 3.x, and 4.0.x before 4.0.11; 4.1.x and 4.2.x before 4.2.7; and 4.3.x and 4.4.x before 4.4.1 allows remote attackers to hijack the authentication of arbitrary users for requests that commit an attachment change via an update action. | 6.8 |
2013-10-24 | CVE-2013-1733 | Mozilla | Cross-Site Request Forgery (CSRF) vulnerability in Mozilla Bugzilla 4.4 Cross-site request forgery (CSRF) vulnerability in process_bug.cgi in Bugzilla 4.4.x before 4.4.1 allows remote attackers to hijack the authentication of arbitrary users for requests that modify bugs via vectors involving a midair-collision token. | 6.8 |
2013-10-24 | CVE-2013-5170 | Apple | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Apple mac OS X Buffer underflow in CoreGraphics in Apple Mac OS X before 10.9 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF document. | 6.8 |
2013-10-24 | CVE-2013-5168 | Apple | Improper Input Validation vulnerability in Apple mac OS X Console in Apple Mac OS X before 10.9 allows user-assisted remote attackers to execute arbitrary applications by triggering a log entry with a crafted attached URL. | 6.8 |
2013-10-23 | CVE-2013-4422 | Quassel IRC | SQL Injection vulnerability in Quassel-Irc Quassel IRC SQL injection vulnerability in Quassel IRC before 0.9.1, when Qt 4.8.5 or later and PostgreSQL 8.2 or later are used, allows remote attackers to execute arbitrary SQL commands via a \ (backslash) in a message. | 6.8 |
2013-10-22 | CVE-2013-5703 | Draytek | OS Command Injection vulnerability in Draytek Vigor 2700 Router and Vigor 2700 Router Firmware The DrayTek Vigor 2700 router 2.8.3 allows remote attackers to execute arbitrary JavaScript code, and modify settings or the DNS cache, via a crafted SSID value that is not properly handled during insertion into the sWlessSurvey value in variables.js. | 6.8 |
2013-10-21 | CVE-2013-5971 | Vmware | Permissions, Privileges, and Access Controls vulnerability in VMWare Vcenter Server Session fixation vulnerability in the vSphere Web Client Server in VMware vCenter Server 5.0 before Update 3 allows remote attackers to hijack web sessions and gain privileges via unspecified vectors. | 6.8 |
2013-10-24 | CVE-2013-5175 | Apple | Improper Input Validation vulnerability in Apple mac OS X The kernel in Apple Mac OS X before 10.9 allows local users to obtain sensitive information or cause a denial of service (out-of-bounds read and system crash) via a crafted Mach-O file. | 6.6 |
2013-10-24 | CVE-2013-5165 | Apple | Permissions, Privileges, and Access Controls vulnerability in Apple mac OS X socketfilterfw in Application Firewall in Apple Mac OS X before 10.9 does not properly implement the --blockApp option, which allows remote attackers to bypass intended access restrictions via a network connection to an application for which blocking was configured. | 6.4 |
2013-10-24 | CVE-2013-4299 | Linux Redhat | Permissions, Privileges, and Access Controls vulnerability in Linux Kernel Interpretation conflict in drivers/md/dm-snap-persistent.c in the Linux kernel through 3.11.6 allows remote authenticated users to obtain sensitive information or modify data via a crafted mapping to a snapshot block device. | 6.0 |
2013-10-24 | CVE-2013-3244 | SAP | Code Injection vulnerability in SAP ERP Central Component Multiple unspecified vulnerabilities in the CJDB_FILL_MEMORY_FROM_PPB function in the Project System (PS-IS) module for SAP ERP Central Component (ECC) allow remote attackers to execute arbitrary code via a (1) RFC or (2) SOAP-RFC request. | 6.0 |
2013-10-25 | CVE-2013-6128 | Wellintech | Permissions, Privileges, and Access Controls vulnerability in Wellintech Kingview 3.0/6.5.30.2010.18018/6.52 The KCHARTXYLib.KChartXY ActiveX control in KChartXY.ocx before 65.30.30000.10002 in WellinTech KingView before 6.53 does not properly restrict SaveToFile method calls, which allows remote attackers to create or overwrite arbitrary files, and subsequently execute arbitrary programs, via the single pathname argument, as demonstrated by a directory traversal attack. | 5.8 |
2013-10-25 | CVE-2013-6127 | Wellintech | Path Traversal vulnerability in Wellintech Kingview The SUPERGRIDLib.SuperGrid ActiveX control in SuperGrid.ocx before 65.30.30000.10002 in WellinTech KingView before 6.53 does not properly restrict ReplaceDBFile method calls, which allows remote attackers to create or overwrite arbitrary files, and subsequently execute arbitrary programs, via the two pathname arguments, as demonstrated by a directory traversal attack. | 5.8 |
2013-10-24 | CVE-2013-5189 | Apple | Permissions, Privileges, and Access Controls vulnerability in Apple mac OS X Apple Mac OS X before 10.9 does not preserve a certain administrative system-preferences setting across software updates, which allows context-dependent attackers to bypass intended access restrictions in opportunistic circumstances by leveraging an unintended security configuration after the completion of an update. | 5.8 |
2013-10-24 | CVE-2013-4390 | Apache | Improper Input Validation vulnerability in Apache Sling and Sling Auth Core Component Open redirect vulnerability in the AbstractAuthenticationFormServlet in the Auth Core (org.apache.sling.auth.core) bundle before 1.1.4 in Apache Sling allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the resource parameter, related to "a custom login form and XSS." | 5.8 |
2013-10-21 | CVE-2012-4115 | Cisco | Cryptographic Issues vulnerability in Cisco Unified Computing System The fabric-interconnect component in Cisco Unified Computing System (UCS) does not encrypt KVM virtual-media data, which allows man-in-the-middle attackers to obtain sensitive information by sniffing the network or modify this traffic by inserting packets into the client-server data stream, aka Bug ID CSCtr72964. | 5.8 |
2013-10-24 | CVE-2013-5184 | Apple | Resource Management Errors vulnerability in Apple mac OS X The kernel in Apple Mac OS X before 10.9 does not properly check for errors during the processing of multicast Wi-Fi packets, which allows remote attackers to cause a denial of service (system crash) by leveraging presence in an 802.11 network's coverage area. | 5.7 |
2013-10-27 | CVE-2013-4302 | Mediawiki | Permissions, Privileges, and Access Controls vulnerability in Mediawiki (1) ApiBlock.php, (2) ApiCreateAccount.php, (3) ApiLogin.php, (4) ApiMain.php, (5) ApiQueryDeletedrevs.php, (6) ApiTokens.php, and (7) ApiUnblock.php in includes/api/ in MediaWiki 1.19.x before 1.19.8, 1.20.x before 1.20.7, and 1.21.x before 1.21.2 allow remote attackers to obtain CSRF tokens and bypass the cross-site request forgery (CSRF) protection mechanism via a JSONP request to wiki/api.php. | 5.0 |
2013-10-27 | CVE-2013-4301 | Mediawiki | Information Exposure vulnerability in Mediawiki includes/resourceloader/ResourceLoaderContext.php in MediaWiki 1.19.x before 1.19.8, 1.20.x before 1.20.7, and 1.21.x before 1.21.2 allows remote attackers to obtain sensitive information via a "<" (open angle bracket) character in the lang parameter to w/load.php, which reveals the installation path in an error message. | 5.0 |
2013-10-25 | CVE-2013-4965 | Puppet | Improper Authentication vulnerability in Puppet Enterprise Puppet Enterprise before 3.1.0 does not properly restrict the number of authentication attempts by a console account, which makes it easier for remote attackers to bypass intended access restrictions via a brute-force attack. | 5.0 |
2013-10-25 | CVE-2013-4434 | Dropbear SSH Project | Numeric Errors vulnerability in Dropbear SSH Project Dropbear SSH Dropbear SSH Server before 2013.59 generates error messages for a failed logon attempt with different time delays depending on whether the user account exists, which allows remote attackers to discover valid usernames. | 5.0 |
2013-10-25 | CVE-2013-4421 | Dropbear SSH Project | Numeric Errors vulnerability in Dropbear SSH Project Dropbear SSH The buf_decompress function in packet.c in Dropbear SSH Server before 2013.59 allows remote attackers to cause a denial of service (memory consumption) via a compressed packet that has a large size when it is decompressed. | 5.0 |
2013-10-25 | CVE-2013-5531 | Cisco | Improper Authentication vulnerability in Cisco Identity Services Engine Software 1.0/1.1 Cisco Identity Services Engine (ISE) 1.x before 1.1.1 allows remote attackers to bypass authentication, and read support-bundle configuration and credentials data, via a crafted session on TCP port 443, aka Bug ID CSCty20405. | 5.0 |
2013-10-25 | CVE-2013-5521 | Cisco | Permissions, Privileges, and Access Controls vulnerability in Cisco Identity Services Engine Software Cisco Identity Services Engine does not properly restrict the creation of guest accounts, which allows remote attackers to cause a denial of service (exhaustion of the account supply) via a series of requests within one session, aka Bug ID CSCue94287. | 5.0 |
2013-10-24 | CVE-2013-5536 | Cisco | Improper Input Validation vulnerability in Cisco Secure Access Control System Cisco Secure Access Control System (ACS) does not properly implement an incoming-packet firewall rule, which allows remote attackers to cause a denial of service (process crash) via a flood of crafted packets, aka Bug ID CSCui51521. | 5.0 |
2013-10-24 | CVE-2013-5130 | Apple | Information Exposure vulnerability in Apple Safari WebKit in Apple Safari before 6.1 disables the Private Browsing feature upon a launch of the Web Inspector, which makes it easier for context-dependent attackers to obtain browsing information by leveraging LocalStorage/ files. | 5.0 |
2013-10-24 | CVE-2013-6246 | Dell | Permissions, Privileges, and Access Controls vulnerability in Dell Quest ONE Password Manager 5.0 The Dell Quest One Password Manager, possibly 5.0, allows remote attackers to bypass CAPTCHA protections and obtain sensitive information (user's full name) by sending a login request with a valid domain and username but without the CaptchaType, UseCaptchaEveryTime, and CaptchaResponse parameters. | 5.0 |
2013-10-24 | CVE-2013-5182 | Apple | Cryptographic Issues vulnerability in Apple mac OS X Mail in Apple Mac OS X before 10.9 allows remote attackers to spoof the existence of a cryptographic signature for an e-mail message by using the multipart/signed content type within an unsigned message. | 5.0 |
2013-10-24 | CVE-2013-5178 | Apple | Permissions, Privileges, and Access Controls vulnerability in Apple mac OS X LaunchServices in Apple Mac OS X before 10.9 does not properly restrict Unicode characters in filenames, which allows context-dependent attackers to spoof file extensions via a crafted character sequence. | 5.0 |
2013-10-24 | CVE-2013-5167 | Apple | Configuration vulnerability in Apple mac OS X CFNetwork in Apple Mac OS X before 10.9 does not properly support Safari's deletion of session cookies in response to a reset operation, which makes it easier for remote web servers to track users via Set-Cookie HTTP headers. | 5.0 |
2013-10-24 | CVE-2013-4295 | Apache | Information Exposure vulnerability in Apache Shindig 2.5.0 The gadget renderer in Apache Shindig 2.5.0 for PHP allows remote attackers to obtain sensitive information via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. | 5.0 |
2013-10-24 | CVE-2013-6244 | SAP | Information Disclosure vulnerability in SAP NetWeaver Web Dynpro Live Update XML External Entity The Live Update webdynpro application (webdynpro/dispatcher/sap.com/tc~slm~ui_lup/LUP) in SAP NetWeaver 7.31 and earlier allows remote attackers to read arbitrary files and directories via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. | 5.0 |
2013-10-22 | CVE-2013-1739 | Mozilla | Unspecified vulnerability in Mozilla Network Security Services Mozilla Network Security Services (NSS) before 3.15.2 does not ensure that data structures are initialized before read operations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a decryption failure. | 5.0 |
2013-10-25 | CVE-2013-1067 | Canonical | Permissions, Privileges, and Access Controls vulnerability in Canonical Ubuntu Linux Apport 2.12.5 and earlier uses weak permissions for core dump files created by setuid binaries, which allows local users to obtain sensitive information by reading the file. | 4.9 |
2013-10-24 | CVE-2013-5192 | Apple | Improper Input Validation vulnerability in Apple mac OS X The USB hub controller in Apple Mac OS X before 10.9 allows local users to cause a denial of service (system crash) via a request with a crafted (1) port or (2) port number. | 4.9 |
2013-10-24 | CVE-2013-5177 | Apple | Numeric Errors vulnerability in Apple mac OS X The kernel in Apple Mac OS X before 10.9 allows local users to cause a denial of service (panic) via an invalid iovec structure. | 4.9 |
2013-10-24 | CVE-2013-5176 | Apple | Numeric Errors vulnerability in Apple mac OS X The kernel in Apple Mac OS X before 10.9 does not properly handle integer values during unspecified tty device operations, which allows local users to cause a denial of service (system hang) by triggering a truncation error. | 4.9 |
2013-10-24 | CVE-2013-5174 | Apple | Numeric Errors vulnerability in Apple mac OS X Integer signedness error in the kernel in Apple Mac OS X before 10.9 allows local users to cause a denial of service (system crash) via a crafted tty read operation. | 4.9 |
2013-10-24 | CVE-2013-5166 | Apple | Unspecified vulnerability in Apple mac OS X The Bluetooth USB host controller in Apple Mac OS X before 10.9 prematurely deletes interfaces, which allows local users to cause a denial of service (system crash) via a crafted application. | 4.9 |
2013-10-22 | CVE-2013-5550 | Cisco | Improper Input Validation vulnerability in Cisco Unified Computing System The fabric-interconnect component in Cisco Unified Computing System (UCS) allows local users to cause a denial of service via crafted command parameters that trigger hardware-component write operations, aka Bug ID CSCtq86549. | 4.6 |
2013-10-27 | CVE-2013-4122 | CMU GNU | Numeric Errors vulnerability in CMU Cyrus-Sasl Cyrus SASL 2.1.23, 2.1.26, and earlier does not properly handle when a NULL value is returned upon an error by the crypt function as implemented in glibc 2.17 and later, which allows remote attackers to cause a denial of service (thread crash and consumption) via (1) an invalid salt or, when FIPS-140 is enabled, a (2) DES or (3) MD5 encrypted password, which triggers a NULL pointer dereference. | 4.3 |
2013-10-26 | CVE-2013-1445 | Dlitz | Cryptographic Issues vulnerability in Dlitz Pycrypto The Crypto.Random.atfork function in PyCrypto before 2.6.1 does not properly reseed the pseudo-random number generator (PRNG) before allowing a child process to access it, which makes it easier for context-dependent attackers to obtain sensitive information by leveraging a race condition in which a child process is created and accesses the PRNG within the same rate-limit period as another process. | 4.3 |
2013-10-25 | CVE-2013-6281 | Dhtmlx | Cross-Site Scripting vulnerability in Dhtmlx Dhtmlxspreadsheet 2.0 Cross-site scripting (XSS) vulnerability in codebase/spreadsheet.php in the Spreadsheet (dhtmlxSpreadsheet) plugin 2.0 for WordPress allows remote attackers to inject arbitrary web script or HTML via the "page" parameter. | 4.3 |
2013-10-25 | CVE-2013-6280 | Linksalpha | Cross-Site Scripting vulnerability in Linksalpha Social Sharing Toolkit Plugin Cross-site scripting (XSS) vulnerability in Social Sharing Toolkit plugin before 2.1.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | 4.3 |
2013-10-24 | CVE-2013-1743 | Mozilla | Cross-Site Scripting vulnerability in Mozilla Bugzilla Multiple cross-site scripting (XSS) vulnerabilities in report.cgi in Bugzilla 4.1.x and 4.2.x before 4.2.7 and 4.3.x and 4.4.x before 4.4.1 allow remote attackers to inject arbitrary web script or HTML via a field value that is not properly handled during construction of a tabular report, as demonstrated by the (1) summary or (2) real name field. | 4.3 |
2013-10-24 | CVE-2013-1742 | Mozilla | Cross-Site Scripting vulnerability in Mozilla Bugzilla Multiple cross-site scripting (XSS) vulnerabilities in editflagtypes.cgi in Bugzilla 2.x, 3.x, and 4.0.x before 4.0.11; 4.1.x and 4.2.x before 4.2.7; and 4.3.x and 4.4.x before 4.4.1 allow remote attackers to inject arbitrary web script or HTML via the (1) id or (2) sortkey parameter. | 4.3 |
2013-10-24 | CVE-2013-5190 | Apple | Permissions, Privileges, and Access Controls vulnerability in Apple mac OS X Smart Card Services in Apple Mac OS X before 10.9 does not properly implement certificate-revocation checks, which allows remote attackers to cause a denial of service (Smart Card usage outage) by interfering with the revocation-check procedure. | 4.3 |
2013-10-24 | CVE-2013-5185 | Apple | Cryptographic Issues vulnerability in Apple mac OS X The ldapsearch command-line program in OpenLDAP in Apple Mac OS X before 10.9 does not properly process the minssf configuration setting, which allows remote attackers to obtain sensitive information by leveraging unintended weak encryption and sniffing the network. | 4.3 |
2013-10-24 | CVE-2013-5181 | Apple | Cryptographic Issues vulnerability in Apple mac OS X The auto-configuration feature in Mail in Apple Mac OS X before 10.9 selects plaintext authentication for unspecified servers that support CRAM-MD5 authentication, which allows remote attackers to obtain sensitive information by sniffing the network. | 4.3 |
2013-10-24 | CVE-2013-5180 | Apple | Cryptographic Issues vulnerability in Apple mac OS X The srandomdev function in Libc in Apple Mac OS X before 10.9, when the kernel random-number generator is unavailable, produces predictable values instead of the intended random values, which makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms by leveraging knowledge of these values, related to a compiler-optimization issue. | 4.3 |
2013-10-24 | CVE-2013-5136 | Apple | Information Exposure vulnerability in Apple Remote Desktop Apple Remote Desktop before 3.7 does not properly use server authentication-type information during decisions about whether to present an unencrypted-connection warning message, which allows remote attackers to obtain sensitive information in opportunistic circumstances by sniffing the network during an unintended cleartext VNC session. | 4.3 |
2013-10-23 | CVE-2013-2651 | Boltwire | Cross-Site Scripting vulnerability in Boltwire Multiple cross-site scripting (XSS) vulnerabilities in BoltWire 3.5 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) "p" or (2) content parameter to index.php. | 4.3 |
2013-10-22 | CVE-2013-5389 | IBM | Cross-Site Scripting vulnerability in IBM Lotus Domino 8.5.3.0/9.0.0.0 Cross-site scripting (XSS) vulnerability in iNotes in IBM Domino 8.5.3 before FP5 IF2 and 9.0 before IF5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka SPR PTHN9AYK2X. | 4.3 |
2013-10-22 | CVE-2013-5388 | IBM | Cross-Site Scripting vulnerability in IBM Lotus Domino 8.5.3.0/9.0.0.0 Cross-site scripting (XSS) vulnerability in iNotes in IBM Domino 8.5.3 before FP5 IF2 and 9.0 before IF5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka SPR PTHN9AYK5F. | 4.3 |
2013-10-24 | CVE-2013-5188 | Apple | Permissions, Privileges, and Access Controls vulnerability in Apple mac OS X The Screen Lock implementation in Apple Mac OS X before 10.9, when hibernation and autologin are enabled, does not require a password for a transition out of hibernation, which allows physically proximate attackers to obtain access by visiting an unattended workstation in the hibernating state. | 4.0 |
14 Low Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2013-10-27 | CVE-2013-4428 | Openstack Canonical | Permissions, Privileges, and Access Controls vulnerability in multiple products OpenStack Image Registry and Delivery Service (Glance) Folsom, Grizzly before 2013.1.4, and Havana before 2013.2, when the download_image policy is configured, does not properly restrict access to cached images, which allows remote authenticated users to read otherwise restricted images via an image UUID. | 3.5 |
2013-10-25 | CVE-2013-3989 | IBM | Cryptographic Issues vulnerability in IBM Security Appscan IBM Security AppScan Enterprise 8.x before 8.8 sends a cleartext AppScan Source database password in a response, which allows remote authenticated users to obtain sensitive information, and subsequently conduct man-in-the-middle attacks, by examining the response content. | 3.5 |
2013-10-24 | CVE-2013-5171 | Apple | Permissions, Privileges, and Access Controls vulnerability in Apple mac OS X CoreGraphics in Apple Mac OS X before 10.9 allows local users to bypass secure input mode and log an arbitrary application's keystrokes via a hotkey event registration. | 3.3 |
2013-10-24 | CVE-2013-5164 | Apple | Race Condition vulnerability in Apple Iphone OS Multiple race conditions in the Phone app in Apple iOS before 7.0.3 allow physically proximate attackers to bypass the locked state, and dial the telephone numbers in arbitrary Contacts entries, by visiting the Contacts pane. | 3.3 |
2013-10-24 | CVE-2013-5144 | Apple | Permissions, Privileges, and Access Controls vulnerability in Apple Iphone OS Passcode Lock in Apple iOS before 7.0.3 on iPhone devices allows physically proximate attackers to bypass an intended passcode requirement, and dial arbitrary telephone numbers, by tapping the emergency-call button during a certain notification and camera-pane state to trigger a NULL pointer dereference. | 3.3 |
2013-10-24 | CVE-2013-4373 | Redhat | Improper Input Validation vulnerability in Redhat Jboss Operations Network 3.1.2 The storeFiles method in JPADriftServerBean in Red Hat JBoss Operations Network (JON) 3.1.2 allows local users to load arbitrary drift files into a server by writing the files to the temporary directory that is used to unpack zip files. | 3.2 |
2013-10-24 | CVE-2013-5183 | Apple | Information Exposure vulnerability in Apple mac OS X Mail in Apple Mac OS X before 10.9, when Kerberos authentication is enabled and TLS is disabled, sends invalid cleartext data, which allows remote attackers to obtain sensitive information by sniffing the network. | 2.6 |
2013-10-24 | CVE-2013-5191 | Apple | Permissions, Privileges, and Access Controls vulnerability in Apple mac OS X The syslog implementation in Apple Mac OS X before 10.9 allows local users to obtain sensitive information by leveraging access to the Guest account and reading console-log messages from previous Guest sessions. | 2.1 |
2013-10-24 | CVE-2013-5186 | Apple | Permissions, Privileges, and Access Controls vulnerability in Apple mac OS X Power Management in Apple Mac OS X before 10.9 does not properly handle the interaction between locking and power assertions, which allows physically proximate attackers to obtain sensitive information by reading a screen that should have transitioned into the locked state. | 2.1 |
2013-10-24 | CVE-2013-5173 | Apple | Cryptographic Issues vulnerability in Apple mac OS X The random-number generator in the kernel in Apple Mac OS X before 10.9 provides lengthy exclusive access for processing of large requests, which allows local users to cause a denial of service (temporary generator outage) via an application that requires many random numbers. | 2.1 |
2013-10-24 | CVE-2013-5162 | Apple | Permissions, Privileges, and Access Controls vulnerability in Apple Iphone OS Passcode Lock in Apple iOS before 7.0.3 on iPhone devices allows physically proximate attackers to bypass the passcode-failure disabled state by leveraging certain incorrect visibility of the passcode-entry view after use of the Phone app. | 2.1 |
2013-10-24 | CVE-2013-4293 | Redhat | Cryptographic Issues vulnerability in Redhat Jboss Operations Network 3.1.2 The server in Red Hat JBoss Operations Network (JON) 3.1.2 logs passwords in plaintext, which allows local users to obtain sensitive information by reading the log files. | 2.1 |
2013-10-24 | CVE-2013-5187 | Apple | Permissions, Privileges, and Access Controls vulnerability in Apple mac OS X The Screen Lock implementation in Apple Mac OS X before 10.9 does not immediately accept Keychain Status menu Lock Screen commands, and instead incorrectly relies on a certain timeout setting, which allows physically proximate attackers to obtain sensitive information by reading a screen that should have transitioned into the locked state. | 1.9 |
2013-10-24 | CVE-2013-5169 | Apple | Permissions, Privileges, and Access Controls vulnerability in Apple mac OS X CoreGraphics in Apple Mac OS X before 10.9, when display-sleep mode is used, does not ensure that screen locking blocks the visibility of all windows, which allows physically proximate attackers to obtain sensitive information by reading the screen. | 1.9 |