Subrion CMS version 3.2.2 suffers from a cross site scripting vulnerability.
Monthly Archives: December 2014
phpTrafficA 2.3 SQL Injection
phpTrafficA versions 2.3 and below suffer from a remote SQL injection vulnerability.
goYWP WebPress 13.00.06 Cross Site Scripting
goYWP WebPress version 13.00.06 suffers from multiple cross site scripting vulnerabilities.
Apache CloudStack 4.3 / 4.4 Unauthenticated LDAP Binds
Apache CloudStack may be configured to authenticate LDAP users. When so configured, it performs a simple LDAP bind with the name and password provided by a user. Simple LDAP binds are defined with three mechanisms (RFC 4513): 1) username and password; 2) unauthenticated if only a username is specified; and 3) anonymous if neither username or password is specified. Currently, Apache CloudStack does not check if the password was provided which could allow an attacker to bind as an unauthenticated user. Versions 4.3 and 4.4 are affected.
HP Security Bulletin HPSBST03154 2
HP Security Bulletin HPSBST03154 2 – A potential security vulnerability has been identified with HP StoreFabric C-series MDS switches and HP C-series Nexus 5K switches running Bash Shell. This is the Bash Shell vulnerability known as “ShellShock” which could be exploited remotely to allow execution of code. Revision 2 of this advisory.
Debian Security Advisory 3093-1
Debian Linux Security Advisory 3093-1 – Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation.
Red Hat Security Advisory 2014-1973-01
Red Hat Security Advisory 2014-1973-01 – Red Hat JBoss Portal is the open source implementation of the Java EE suite of services and Portal services running atop Red Hat JBoss Enterprise Application Platform. It comprises a set of offerings for enterprise customers who are looking for pre-configured profiles of JBoss Middleware components that have been tested and certified together to provide an integrated experience. RichFaces is an open source framework that adds Ajax capability into existing JavaServer Faces applications. It was found that RichFaces accepted arbitrary strings included in a URL and returned them unencoded in a CSS file. A remote attacker could use this flaw to perform cross-site scripting attacks against a user running a RichFaces application.
Red Hat Security Advisory 2014-1975-01
Red Hat Security Advisory 2014-1975-01 – The RPM Package Manager is a powerful command line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Each software package consists of an archive of files along with information about the package such as its version, description, and other information. It was found that RPM wrote file contents to the target installation directory under a temporary name, and verified its cryptographic signature only after the temporary file has been written completely. Under certain conditions, the system interprets the unverified temporary file contents and extracts commands from it. This could allow an attacker to modify signed RPM files in such a way that they would execute code chosen by the attacker during package installation.
Red Hat Security Advisory 2014-1974-01
Red Hat Security Advisory 2014-1974-01 – The RPM Package Manager is a powerful command line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Each software package consists of an archive of files along with information about the package such as its version, description, and other information. It was found that RPM wrote file contents to the target installation directory under a temporary name, and verified its cryptographic signature only after the temporary file has been written completely. Under certain conditions, the system interprets the unverified temporary file contents and extracts commands from it. This could allow an attacker to modify signed RPM files in such a way that they would execute code chosen by the attacker during package installation.
Red Hat Security Advisory 2014-1976-01
Red Hat Security Advisory 2014-1976-01 – The RPM Package Manager is a powerful command line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Each software package consists of an archive of files along with information about the package such as its version, description, and other information. It was found that RPM wrote file contents to the target installation directory under a temporary name, and verified its cryptographic signature only after the temporary file has been written completely. Under certain conditions, the system interprets the unverified temporary file contents and extracts commands from it. This could allow an attacker to modify signed RPM files in such a way that they would execute code chosen by the attacker during package installation.