Directory traversal vulnerability in Seeds acmailer before 3.8.18 and 3.9.x before 3.9.12 Beta allows remote authenticated users to delete arbitrary files via a crafted string.
Monthly Archives: July 2015
Active Super Shop 1.0 Cross Site Scripting
Active Super Shop version 1.0 suffers from a cross site scripting vulnerability.
Re: OpenSSH keyboard-interactive authentication brute force vulnerability (MaxAuthTries bypass)
Posted by Reed Loden on Jul 19
http://www.reddit.com/r/netsec/comments/3dnzcq/openssh_keyboardinteractive_authentication_brute/ct726ni
goes over this question pretty well, so as not to rehash everything.
~reed
DSA-3310 freexl – security update
It was discovered that an integer overflow in freexl, a library to parse
Microsoft Excel spreadsheets may result in denial of service if a
malformed Excel file is opened.
Re: weblogin software cross site request
Posted by jericho on Jul 18
: Dork: intitle:weblogin intext:”This page will redirect you to:”
A single site runs this ‘WebLogin’.
: Product:WebLogin
What is the vendor URL? Or there is none, because this is a site-specific
issue for lanl.gov. Worse, it has pretty aggressive filtering and will not
render script tags, HTML tags, and requires the http:// element it seems.
So this is a site specific issue, with no real value or merit, and doesn’t…
Information Exposure Vulnerability in WordPress Mobile Pack WordPress Plugin v2.1.2 and below
Posted by Nitin Venkatesh on Jul 18
# Title: Information Exposure Vulnerability in WordPress Mobile Pack
Wordpress Plugin v2.1.2 and below
# Submitter: Nitin Venkatesh
# Product: WordPress Mobile Pack WordPress Plugin
# Product URL: https://wordpress.org/plugins/wordpress-mobile-pack/
# Vulnerability Type: Information Exposure[CWE-200]
# Affected Versions: v2.1.2 and below. Installed v2.1.3 before June 3, 2015
also affected.
# Tested versions: v2.1.2, v2.1.3 (prior to June 3, 2015)…
Re: OpenSSH keyboard-interactive authentication brute force vulnerability (MaxAuthTries bypass)
Posted by devel on Jul 18
Do you know if this is still affected if you have fail2ban in place.
Fail2ban uses the auth logs to monitor failed password attempts. I
assume that the auth log is still updated even if x number of attempts
is allowed. Thanks
CVE-2015-0795
Multiple stack-based buffer overflows in the SafeShellExecute method in the NetIQExecObject.NetIQExec.1 ActiveX control in NetIQExec.dll in NetIQ Security Solutions for iSeries 8.1 allow remote attackers to execute arbitrary code via long arguments, aka ZDI-CAN-2699.
CVE-2015-4280
Cisco Prime Collaboration Assurance 10.0 allows remote attackers to cause a denial of service (HTTP service outage) via a crafted HTTP request, aka Bug ID CSCum38844.
CVE-2015-4458
The TLS implementation in the Cavium cryptographic-module firmware, as distributed with Cisco Adaptive Security Appliance (ASA) Software 9.1(5.21) and other products, does not verify the MAC field, which allows man-in-the-middle attackers to spoof TLS content by modifying packets, aka Bug ID CSCuu52976.