Category Archives: US-CERT

US-CERT Alerts – Alerts warn about vulnerabilities, incidents, and other security issues that pose a significant risk.

TA15-120A: Securing End-to-End Communications

Original release date: April 30, 2015

Systems Affected

Networked systems

Overview

Securing end-to-end communications plays an important role in protecting privacy and preventing some forms of man-in-the-middle (MITM) attacks. Recently, researchers described a MITM attack used to inject code, causing unsecured web browsers around the world to become unwitting participants in a distributed denial-of-service attack. That same code can be employed to deliver an exploit for a particular vulnerability or to take other arbitrary actions.

Description

A MITM attack occurs when a third party inserts itself between the communications of a client and a server. MITM attacks as a general class are not new. Classic MITM attacks (e.g., ARP Spoofing) focus on redirecting network communications. By definition, network infrastructure under attacker control is vulnerable to MITM. However, as technology evolves, new methods for performing MITM attacks evolve as well.

Currently, there is no single technology or configuration to prevent all MITM attacks. However, increasing the complexity with multiple layers of defense may raise the cost for the attacker. Increasing the attacker’s cost in time, effort, or money can be an effective deterrent to avoiding future network compromise.

Generally, encryption and digital certificates provide an effective safeguard against MITM attacks, assuring both the confidentiality and integrity of communications. As a result, modern MITM attacks have focused on taking advantage of weaknesses in the cryptographic infrastructure (e.g., certificate authorities (CAs), web browser certificate stores) or the encryption algorithms and protocols themselves.

Impact

MITM attacks are critical because of the wide range of potential impacts—these include the exposure of sensitive information, modification of trusted data, and injection of data.

Solution

Employing multiple network and browser protection methods forces an attacker to develop different tactics, techniques, and procedures to circumvent the new security configuration.

US-CERT recommends reviewing the following mitigations to reduce vulnerability to MITM attacks:

Update Transport Layer Security and Secure Socket Layer (TLS/SSL)

US-CERT recommends upgrading TLS to 1.1 or higher and ensuring TLS 1.0 and SSL 1, 2, 3.x are disabled, unless required. TLS 1.0 clients can fall back to version 3.0 of the SSL protocol, which is vulnerable to a padding oracle attack when Cypher-Block Chaining mode is used. This method is commonly referred to as the “POODLE” (Padding Oracle on Downgraded Legacy Encryption) attack. Vulnerable TLS implementations can be updated by applying the patch provided by the vendor. Vendor information is available in the National Vulnerability Database (NVD) entry for CVE-2014-3566 [1] or in CERT Vulnerability Note VU#577193 [2]. See US-CERT TA14-290A [3] for additional information on this vulnerability.

Utilize Certificate Pinning

Certificate pinning [4] is a method of associating X.509 certificate and its public key to a specific CA or root. Typically, certificates are validated by checking a verifiable chain of trust back to a trusted root certificate. Certificate pinning bypasses this validation process and allows the user to trust “this certificate only” or “trust only certificates signed by this certificate.” Please use the following resources to configure your browser for certificate pinning:

Microsoft Certificate Trust

The Microsoft Enhanced Mitigation Experience Toolkit (EMET) 5.2 employs a feature named “Certificate Trust” for SSL/TLS certificate pinning. This feature is intended to detect and stop MITM attacks that leverage Public Key Infrastructure. [5]

To use the Certificate Trust, you must provide a list of websites you want to protect and certificate pinning rules applicable to those websites. In order to do this, work with the Certificate Trust Configuration feature of the graphical application or use the Configuration Wizard to automatically configure EMET with the recommended settings. [6] Also, ensure period defaults are updated through patching.

Browser Certificate Pinning

Google Chrome and Mozilla Firefox, among others, perform certificate pinning. They conduct a variation of certificate pinning using the HTTP Strict Transport Security (HSTS), which pre-loads a specific set of public key hashes into the HSTS configuration, limiting valid certificates to only those with the specified indicated public key. Chrome uses HTTPS pins for most Google properties. It uses whitelisted public keys which include keys from Verisign, Google Internet Authority, Equifax, and GeoTrust. Thus, Chrome will not accept certificates for Google properties from other CAs.

Firefox 32 on desktop and later (Firefox 34 and later on Android) has the ability to use certificate pinning. It also has the ability to enforce built-in pinsets (mapping of public keys) information to domains. Firefox will pin all sites that Chrome already does, pin their own sites after audit and cleansing, and pin other popular sites that are already in good standing. Please visit this site on How to Use Pinning [7] and for more information.

Implement DNS-based Authentication of Named Entities (DANE)

DANE is a protocol that allows certificates (X.509) commonly used for TLS. DANE is bound to DNS which uses Domain Name System Security Extensions (DNSSEC). A working group in the Internet Engineering Task Force of DANE developed a new type of DNS record that allows a domain itself to sign statements about which entities are authorized to represent it. [8]

Google Chrome does not use DANE but uses an add-on [9] for support. Mozilla Firefox also uses an add-on [10] to check the existence and validity of DNSSEC.

Use Network Notary Servers

Network notary servers aim to improve the security of communications between computers and websites by enabling browsers to verify website authenticity without relying on CAs. CAs are often considered a security risk because they can be compromised. [11] As a result, browsers can deem fraudulent sites trustworthy and are left vulnerable to MITM attacks.

Each network notary server, or group of servers, is public and can be operated by public/private organizations or individuals. These servers regularly monitor websites and build a history of each site’s certificate data over time. When a browser equipped with a network notary add-on communicates with a website and obtains its certificate information, a user-designated network notary server supplies the browser with historical certificate data for that site. If certificate information provided by the website is inconsistent with the notary’s historical data, a MITM attack could be at play. [12]

References

Revision History

  • April 30, 2015: Initial Release

This product is provided subject to this Notification and this Privacy & Use policy.

Nepal Earthquake Disaster Email Scams

Original release date: April 30, 2015

US-CERT warns users of potential email scams citing the earthquake in Nepal. The scam emails may contain links or attachments that may direct users to phishing or malware infected websites. Phishing emails and websites requesting donations for fraudulent charitable organizations commonly appear after these types of natural disasters.

US-CERT encourages users to take the following measures to protect themselves:

  • Do not follow unsolicited web links or attachments in email messages.
  • Maintain up-to-date antivirus software.
  • Review the Federal Trade Commission’s Charity Checklist.
  • Verify the legitimacy of the email by contacting the organization directly through a trusted contact number. Trusted contact    information can be found on the Better Business Bureau National Charity Report Index.
  • Refer to the Security Tip (ST04-014) on Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.

This product is provided subject to this Notification and this Privacy & Use policy.

TA15-119A: Top 30 Targeted High Risk Vulnerabilities

Original release date: April 29, 2015

Systems Affected

Systems running unpatched software from Adobe, Microsoft, Oracle, or OpenSSL. 

Overview

Cyber threat actors continue to exploit unpatched software to conduct attacks against critical infrastructure organizations. As many as 85 percent of targeted attacks are preventable [1].

This Alert provides information on the 30 most commonly exploited vulnerabilities used in these attacks, along with prevention and mitigation recommendations.

It is based on analysis completed by the Canadian Cyber Incident Response Centre (CCIRC) and was developed in collaboration with our partners from Canada, New Zealand, the United Kingdom, and the Australian Cyber Security Centre.

Description

Unpatched vulnerabilities allow malicious actors entry points into a network. A set of vulnerabilities are consistently targeted in observed attacks.

Impact

A successful network intrusion can have severe impacts, particularly if the compromise becomes public and sensitive information is exposed. Possible impacts include:

  • Temporary or permanent loss of sensitive or proprietary information,
  • Disruption to regular operations,
  • Financial losses relating to restoring systems and files, and
  • Potential harm to an organization’s reputation.

Solution

Maintain up-to-date software

The attack vectors frequently used by malicious actors such as email attachments, compromised “watering hole” websites, and other tools often rely on taking advantage of unpatched vulnerabilities found in widely used software applications. Patching is the process of repairing vulnerabilities found in these software components.

It is necessary for all organizations to establish a strong ongoing patch management process to ensure the proper preventive measures are taken against potential threats. The longer a system remains unpatched, the longer it is vulnerable to being compromised. Once a patch has been publicly released, the underlying vulnerability can be reverse engineered by malicious actors in order to create an exploit. This process has been documented to take anywhere from 24-hours to four days. Timely patching is one of the lowest cost yet most effective steps an organization can take to minimize its exposure to the threats facing its network.

Patch commonly exploited vulnerabilities

Executives should ensure their organization’s information security professionals have patched the following software vulnerabilities. Please see patching information for version specifics.

Microsoft

CVE

Affected Products

Patching Information

CVE-2006-3227 ​Internet Explorer Microsoft Malware Protection Encyclopedia Entry

CVE-2008-2244

Office Word

Microsoft Security Bulletin MS08-042

CVE-2009-3129

Office
Office for Mac
Open XML File Format Converter for Mac
Office Excel Viewer
Excel
Office Compatibility Pack for Word, Excel, and PowerPoint

Microsoft Security Bulletin MS09-067

​CVE-2009-3674 ​Internet Explorer ​Microsoft Security Bulletin MS09-072
CVE-2010-0806​ ​Internet Explorer Microsoft Security Bulletin MS10-018

CVE-2010-3333

Office
Office for Mac
Open XML File Format Converter for Mac

Microsoft Security Bulletin MS10-087

CVE-2011-0101

Excel

Microsoft Security Bulletin MS11-021

CVE-2012-0158

Office
SQL Server
BizTalk Server
Commerce Server
Visual FoxPro
Visual Basic

Microsoft Security Bulletin MS12-027

CVE-2012-1856

Office
SQL Server
Commerce Server
Host Integration Server
Visual FoxPro Visual Basic

Microsoft Security Bulletin MS12-060

​CVE-2012-4792 ​Internet Explorer ​Microsoft Security Bulletin MS13-008
CVE-2013-0074 ​Silverlight and Developer Runtime Microsoft Security Bulletin MS13-022
CVE-2013-1347 ​Internet Explorer Microsoft Security Bulletin MS13-038
CVE-2014-0322​ ​​Internet Explorer Microsoft Security Bulletin MS14-012

CVE-2014-1761

Microsoft Word
Office Word Viewer
Office Compatibility Pack
Office for Mac
Word Automation Services on SharePoint Server
Office Web Apps
Office Web Apps Server

​CVE-2014-1776 ​Internet Explorer Microsoft Security Bulletin MS14-021
​Windows Microsoft Security Bulletin MS14-060
 
 
Oracle

CVE

Affected Products

Patching Information

CVE-2012-1723

Java Development Kit, SDK, and JRE

CVE-2013-2465

Java Development Kit and JRE

Oracle Java SE Critical Patch Update Advisory – June 2013

 
 
Adobe

CVE

Affected Products

Patching Information

​CVE-2009-3953
Reader
Acrobat ​
Adobe Security Bulletin APSB10-02​
​CVE-2010-0188
​Reader
Acrobat
Adobe Security Bulletin APSB10-07
CVE-2010-2883
Reader
Acrobat ​
Adobe Security Bulletin APSB10-21
CVE-2011-0611
​Flash Player
AIR
Reader
Acrobat
​CVE-2011-2462
Reader
Acrobat ​
Adobe Security Bulletin APSB11-30
​CVE-2013-0625 ColdFusion​ Adobe Security Bulletin APSB13-03
CVE-2013-0632 ​ColdFusion Adobe Security Bulletin APSB13-03
​CVE-2013-2729
​Reader
Acrobat
Adobe Security Bulletin APSB13-15
​CVE-2013-3336 ​ColdFusion Adobe Security Bulletin APSB13-13
CVE-2013-5326

 
 
​ColdFusion Adobe Security Bulletin APSB13-27

CVE-2014-0564

Flash Player
AIR
AIR SDK & Compiler

Adobe Security Bulletin APSB14-22

 
OpenSSL

CVE

Affected Product

Patching Information

CVE-2014-0160

OpenSSL

CERT Vulnerability Note VU#720951

 
 

Implement the following four mitigation strategies.

As part of a comprehensive security strategy, network administrators should implement the following four mitigation strategies, which can help prevent targeted cyber attacks.

Ranking

Mitigation Strategy

Rationale

1

Use application whitelisting to help prevent malicious software and unapproved programs from running.

Application whitelisting is one of the best security strategies as it allows only specified programs to run, while blocking all others, including malicious software.

2

Patch applications such as Java, PDF viewers, Flash, web browsers and Microsoft Office.

Vulnerable applications and operating systems are the target of most attacks. Ensuring these are patched with the latest updates greatly reduces the number of exploitable entry points available to an attacker.

3

Patch operating system vulnerabilities.

4

Restrict administrative privileges to operating systems and applications based on user duties.

Restricting these privileges may prevent malware from running or limit its capability to spread through the network.

It is recommended that users review US-CERT Security Tip (ST13-003) and CCIRC’s Mitigation Guidelines for Advanced Persistent Threats for additional background information and to assist in the detection of, response to, and recovery from malicious activity linked to advance persistent threats [2, 3].

References

Revision History

  • April 29, 2015: Initial release

This product is provided subject to this Notification and this Privacy & Use policy.

SB15-117: Vulnerability Summary for the Week of April 20, 2015

Original release date: April 27, 2015

The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. The NVD is sponsored by the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) / United States Computer Emergency Readiness Team (US-CERT). For modified or updated entries, please visit the NVD, which contains historical vulnerability information.

The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:

  • High – Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 – 10.0

  • Medium – Vulnerabilities will be labeled Medium severity if they have a CVSS base score of 4.0 – 6.9

  • Low – Vulnerabilities will be labeled Low severity if they have a CVSS base score of 0.0 – 3.9

Entries may include additional information provided by organizations and efforts sponsored by US-CERT. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletins is compiled from external, open source reports and is not a direct result of US-CERT analysis.

High Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
apport_project — apport The crash reporting feature in Apport 2.13 through 2.17.x before 2.17.1 allows local users to gain privileges via a crafted usr/share/apport/apport file in a namespace (container). 2015-04-17 7.2 CVE-2015-1318
CONFIRM
CONFIRM
UBUNTU
cisco — unified_meetingplace Unrestricted file upload vulnerability in the Custom Prompts upload implementation in Cisco Unified MeetingPlace 8.6(1.9) allows remote authenticated users to execute arbitrary code by using the languageShortName parameter to upload a file that provides shell access, aka Bug ID CSCus95712. 2015-04-20 9.0 CVE-2015-0702
CISCO
google — chrome Use-after-free vulnerability in the RenderFrameImpl::OnMessageReceived function in content/renderer/render_frame_impl.cc in Google Chrome before 42.0.2311.90 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger renderer IPC messages during a detach operation. 2015-04-19 7.5 CVE-2015-1237
CONFIRM
CONFIRM
CONFIRM
google — chrome Skia, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via unknown vectors. 2015-04-19 7.5 CVE-2015-1238
CONFIRM
CONFIRM
google — chrome The ReduceTransitionElementsKind function in hydrogen-check-elimination.cc in Google V8 before 4.2.77.8, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that leverages “type confusion” in the check-elimination optimization. 2015-04-19 7.5 CVE-2015-1242
CONFIRM
CONFIRM
CONFIRM
CONFIRM
google — chrome Multiple unspecified vulnerabilities in Google Chrome before 42.0.2311.90 allow attackers to cause a denial of service or possibly have other impact via unknown vectors. 2015-04-19 7.5 CVE-2015-1249
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
google — chrome Multiple unspecified vulnerabilities in Google V8 before 4.2.77.14, as used in Google Chrome before 42.0.2311.90, allow attackers to cause a denial of service or possibly have other impact via unknown vectors. 2015-04-19 7.5 CVE-2015-3333
CONFIRM
google — chrome The NaClSandbox::InitializeLayerTwoSandbox function in components/nacl/loader/sandbox_linux/nacl_sandbox_linux.cc in Google Chrome before 42.0.2311.90 does not have RLIMIT_AS and RLIMIT_DATA limits for Native Client (aka NaCl) processes, which might make it easier for remote attackers to conduct row-hammer attacks or have unspecified other impact by leveraging the ability to run a crafted program in the NaCl sandbox. 2015-04-19 7.5 CVE-2015-3335
CONFIRM
CONFIRM
ibm — domino IBM Domino 8.5 before 8.5.3 FP6 IF4 and 9.0 before 9.0.1 FP3 IF2 allows remote attackers to execute arbitrary code or cause a denial of service (integer truncation and application crash) via a crafted GIF image, aka SPR KLYH9T7NT9. 2015-04-21 10.0 CVE-2015-0135
CONFIRM
kiegroup — drools XML external entity (XXE) vulnerability in Drools and jBPM before 6.2.0 allows remote attackers to read arbitrary files or possibly have other unspecified impact via a crafted BPMN2 file. 2015-04-21 7.5 CVE-2014-8125
CONFIRM
CONFIRM
CONFIRM
REDHAT
REDHAT
microsoft — windows_7 Unspecified vulnerability in Microsoft Windows before 8 allows local users to gain privileges via unknown vectors, as exploited in the wild in April 2015. 2015-04-21 7.2 CVE-2015-1701
MISC
MISC
new_atlanta — blue_dragon Directory traversal vulnerability in the CFChart servlet (com.naryx.tagfusion.cfm.cfchartServlet) in New Atlanta BlueDragon before 7.1.1.18527 allows remote attackers to read or possibly delete arbitrary files via a .. (dot dot) in the QUERY_STRING to cfchart.cfchart. 2015-04-21 7.5 CVE-2014-5370
MISC
FULLDISC
MISC
searchblox — searchblox Unrestricted file upload vulnerability in admin/uploadImage.html in SearchBlox before 8.2 allows remote attackers to execute arbitrary code by uploading a file with an executable extension and the image/jpeg content type, a different vulnerability than CVE-2013-3590. 2015-04-17 7.5 CVE-2015-0968
CERT-VN
simple_ads_manager_project — simple_ads_manager Unrestricted file upload vulnerability in sam-ajax-admin.php in the Simple Ads Manager plugin before 2.5.96 for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in the directory specified by the path parameter. 2015-04-21 7.5 CVE-2015-2825
CONFIRM
MISC
FULLDISC
MISC
sixapart — movabletype Format string vulnerability in Movable Type Pro, Open Source, and Advanced before 5.2.13 and Pro and Advanced 6.0.x before 6.0.8 allows remote attackers to execute arbitrary code via vectors related to localization of templates. 2015-04-17 7.5 CVE-2015-0845
CONFIRM
DEBIAN
tp-link — tl-wrd741nd_(5.0) Directory traversal vulnerability in TP-LINK Archer C5 (1.2) with firmware before 150317, C7 (2.0) with firmware before 150304, and C8 (1.0) with firmware before 150316, Archer C9 (1.0), TL-WDR3500 (1.0), TL-WDR3600 (1.0), and TL-WDR4300 (1.0) with firmware before 150302, TL-WR740N (5.0) and TL-WR741ND (5.0) with firmware before 150312, and TL-WR841N (9.0), TL-WR841N (10.0), TL-WR841ND (9.0), and TL-WR841ND (10.0) with firmware before 150310 allows remote attackers to read arbitrary files via a .. (dot dot) in the PATH_INFO to login/. 2015-04-21 7.8 CVE-2015-3035
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
MISC
BUGTRAQ
FULLDISC
MISC
wikiwiki_project — wikiwiki SQL injection vulnerability in the WikiWiki module before 6.x-1.2 for Drupal allows remote attackers to execute arbitrary SQL commands via unspecified vectors. 2015-04-21 7.5 CVE-2015-3346
MISC
CONFIRM
MLIST

Back to top

Medium Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
alfresco — alfresco Cross-site request forgery (CSRF) vulnerability in the Alfresco module before 6.x-1.3 for Drupal allows remote attackers to hijack the authentication of arbitrary users for requests that delete an alfresco node via unspecified vectors. 2015-04-21 5.8 CVE-2015-3366
MISC
CONFIRM
MLIST
amazon_aws_project — amazon_aws The Amazon AWS module before 7.x-1.3 for Drupal uses the base URL and AWS access key to generate the access token, which makes it easier for remote attackers to guess the token value and create backups via a crafted URL. 2015-04-21 5.0 CVE-2015-3373
MISC
CONFIRM
MLIST
CONFIRM
apache — tomcat_connectors Apache Tomcat Connectors (mod_jk) before 1.2.41 ignores JkUnmount rules for subtrees of previous JkMount rules, which allows remote attackers to access otherwise restricted artifacts via unspecified vectors. 2015-04-21 5.0 CVE-2014-8111
REDHAT
REDHAT
REDHAT
REDHAT
balanced — commerce_balanced_payments Cross-site request forgery (CSRF) vulnerability in the Commerce Balanced Payments module for Drupal allows remote attackers to hijack the authentication of arbitrary users for requests that delete the user’s configured bank accounts via unspecified vectors. 2015-04-21 5.8 CVE-2015-3388
MISC
MLIST
batch_jobs_project — batch_jobs Multiple cross-site request forgery (CSRF) vulnerabilities in the Batch Jobs module before 7.x-1.2 for Drupal allow remote attackers to hijack the authentication of certain users for requests that (1) delete a batch job record or (2) execute a task via unspecified vectors. 2015-04-21 6.8 CVE-2015-3355
MISC
MISC
MLIST
certify_project — certify The Certify module before 6.x-2.3 for Drupal does not properly perform node access checks, which allows remote authenticated users to bypass intended access restrictions and obtain sensitive PDF certificate information via vectors related to “showing (and creating) the PDF certificates.” 2015-04-22 4.0 CVE-2015-3404
MISC
CONFIRM
MLIST
MLIST
cisco — unified_meetingplace Cross-site scripting (XSS) vulnerability in the administrative web interface in Cisco Unified MeetingPlace 8.6(1.9) allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCus95857. 2015-04-20 4.3 CVE-2015-0703
CISCO
cisco — unified_meetingplace Multiple cross-site request forgery (CSRF) vulnerabilities in API features in Cisco Unified MeetingPlace 8.6(1.9) allow remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCus95884. 2015-04-21 6.8 CVE-2015-0704
CISCO
cisco — unified_meetingplace Cross-site request forgery (CSRF) vulnerability in the SOAP API endpoints of the web-services directory in Cisco Unified MeetingPlace 8.6(1.9) allows remote attackers to hijack the authentication of administrators for requests that create administrative accounts, aka Bug ID CSCus97494. 2015-04-21 6.8 CVE-2015-0705
CISCO
cisco — firesight_system_software Open redirect vulnerability in Cisco FireSIGHT System Software 5.3.1.1, 5.3.1.2, and 6.0.0 in FireSIGHT Management Center allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a crafted HTTP header, aka Bug IDs CSCut06060, CSCut06056, and CSCus98966. 2015-04-22 5.8 CVE-2015-0706
CISCO
cloudwords — cloudwords_for_multilingual Cross-site request forgery (CSRF) vulnerability in the Cloudwords for Multilingual Drupal module before 7.x-2.3 for Drupal allows remote attackers to hijack the authentication of unspecified victims via an unknown menu callback. 2015-04-21 6.8 CVE-2015-3347
MISC
CONFIRM
MLIST
corner_project — _corner Multiple cross-site request forgery (CSRF) vulnerabilities in the Corner module for Drupal allow remote attackers to hijack the authentication of administrators for requests that (1) enable or (2) disable corners via unspecified vectors. 2015-04-21 5.8 CVE-2015-3374
MISC
MLIST
dounokouno — transmitmail Cross-site scripting (XSS) vulnerability in TAGAWA Takao TransmitMail 1.0.11 through 1.5.8 allows remote attackers to inject arbitrary web script or HTML via a crafted filename. 2015-04-23 4.3 CVE-2015-0910
JVNDB
JVN
CONFIRM
dounokouno — transmitmail Directory traversal vulnerability in TAGAWA Takao TransmitMail 1.0.11 through 1.5.8 allows remote attackers to read arbitrary files via vectors related to attachment handling. 2015-04-23 5.0 CVE-2015-0911
JVNDB
JVN
CONFIRM
fibonacciorange — wedeal Open redirect vulnerability in the Commerce WeDeal module before 7.x-1.3 for Drupal allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via an unspecified parameter. 2015-04-21 5.8 CVE-2015-3393
MISC
CONFIRM
XF
MLIST
funnymonkey — feature_set Multiple cross-site request forgery (CSRF) vulnerabilities in the Feature Set module for Drupal allow remote attackers to hijack the authentication of administrator for requests that (1) enable or (2) disable a module via unspecified vectors. 2015-04-21 5.8 CVE-2015-3380
MISC
MLIST
google — chrome The ContainerNode::parserRemoveChild function in core/dom/ContainerNode.cpp in the HTML parser in Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to bypass the Same Origin Policy via a crafted HTML document with an IFRAME element. 2015-04-19 5.0 CVE-2015-1235
CONFIRM
CONFIRM
CONFIRM
google — chrome The MediaElementAudioSourceNode::process function in modules/webaudio/MediaElementAudioSourceNode.cpp in the Web Audio API implementation in Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to bypass the Same Origin Policy and obtain sensitive audio sample values via a crafted web site containing a media element. 2015-04-19 4.3 CVE-2015-1236
CONFIRM
CONFIRM
CONFIRM
google — chrome gpu/blink/webgraphicscontext3d_impl.cc in the WebGL implementation in Google Chrome before 42.0.2311.90 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WebGL program that triggers a state inconsistency. 2015-04-19 5.0 CVE-2015-1240
CONFIRM
CONFIRM
CONFIRM
google — chrome Google Chrome before 42.0.2311.90 does not properly consider the interaction of page navigation with the handling of touch events and gesture events, which allows remote attackers to trigger unintended UI actions via a crafted web site that conducts a “tapjacking” attack. 2015-04-19 4.3 CVE-2015-1241
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
google — chrome The URLRequest::GetHSTSRedirect function in url_request/url_request.cc in Google Chrome before 42.0.2311.90 does not replace the ws scheme with the wss scheme whenever an HSTS Policy is active, which makes it easier for remote attackers to obtain sensitive information by sniffing the network for WebSocket traffic. 2015-04-19 5.0 CVE-2015-1244
CONFIRM
CONFIRM
CONFIRM
google — chrome Use-after-free vulnerability in the OpenPDFInReaderView::Update function in browser/ui/views/location_bar/open_pdf_in_reader_view.cc in Google Chrome before 41.0.2272.76 might allow user-assisted remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact by triggering interaction with a PDFium “Open PDF in Reader” button that has an invalid tab association. 2015-04-19 6.8 CVE-2015-1245
CONFIRM
CONFIRM
CONFIRM
google — chrome Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. 2015-04-19 5.0 CVE-2015-1246
CONFIRM
CONFIRM
google — chrome The SearchEngineTabHelper::OnPageHasOSDD function in browser/ui/search_engines/search_engine_tab_helper.cc in Google Chrome before 42.0.2311.90 does not prevent use of a file: URL for an OpenSearch descriptor XML document, which might allow remote attackers to obtain sensitive information from local files via a crafted (1) http or (2) https web site. 2015-04-19 5.0 CVE-2015-1247
CONFIRM
CONFIRM
CONFIRM
google — chrome The FileSystem API in Google Chrome before 40.0.2214.91 allows remote attackers to bypass the SafeBrowsing for Executable Files protection mechanism by creating a .exe file in a temporary filesystem and then referencing this file with a filesystem:http: URL. 2015-04-19 4.3 CVE-2015-1248
CONFIRM
CONFIRM
google — chrome browser/ui/website_settings/website_settings.cc in Google Chrome before 42.0.2311.90 does not always display “Media: Allowed by you” in a Permissions table after the user has granted camera permission to a web site, which might make it easier for user-assisted remote attackers to obtain sensitive video data from a device’s physical environment via a crafted web site that turns on the camera at a time when the user believes that camera access is prohibited. 2015-04-19 4.3 CVE-2015-3334
CONFIRM
CONFIRM
google — chrome Google Chrome before 42.0.2311.90 does not always ask the user before proceeding with CONTENT_SETTINGS_TYPE_FULLSCREEN and CONTENT_SETTINGS_TYPE_MOUSELOCK changes, which allows user-assisted remote attackers to cause a denial of service (UI disruption) by constructing a crafted HTML document containing JavaScript code with requestFullScreen and requestPointerLock calls, and arranging for the user to access this document with a file: URL. 2015-04-19 4.3 CVE-2015-3336
CONFIRM
CONFIRM
htaccess_project — htaccess Multiple cross-site request forgery (CSRF) vulnerabilities in the Htaccess module before 7.x-2.3 for Drupal allow remote attackers to hijack the authentication of administrators for requests that (1) deploy or (2) delete an .htaccess file via unspecified vectors. 2015-04-21 6.8 CVE-2015-3349
MISC
CONFIRM
MLIST
ibm — infosphere_biginsights The Big SQL component in IBM InfoSphere BigInsights 3.0 through 3.0.0.2 allows remote authenticated users to bypass intended HDFS data-access restrictions via (1) a crafted CREATE HADOOP TABLE statement referencing the data of an arbitrary user or (2) an import of a certain Hive table definition with the HCAT_SYNC_OBJECTS procedure. 2015-04-22 6.5 CVE-2015-1889
CONFIRM
insite — node_basket Multiple cross-site request forgery (CSRF) vulnerabilities in the Node basket module for Drupal allow remote attackers to hijack the authentication of arbitrary users for requests that (1) add or (2) remove nodes from a basket via unspecified vectors. 2015-04-21 5.8 CVE-2015-3382
MISC
MLIST
insite — node_basket Open redirect vulnerability in the Node basket module for Drupal allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. 2015-04-21 5.8 CVE-2015-3383
MISC
MLIST
jammer_project — jammer Multiple cross-site request forgery (CSRF) vulnerabilities in the Jammer module before 6.x-1.8 and 7.x-1.x before 7.x-1.4 for Drupal allow remote attackers to hijack the authentication of administrators for requests that delete a setting for (1) hidden form elements or (2) status messages via unspecified vectors, related to “report administration.” 2015-04-21 6.8 CVE-2015-3352
MISC
CONFIRM
CONFIRM
MLIST
joshics — contact_form_fields Cross-site request forgery (CSRF) vulnerability in the Contact Form Fields module before 6.x-2.3 for Drupal allows remote attackers to hijack the authentication of administrators for requests that delete fields via unspecified vectors. 2015-04-21 6.8 CVE-2015-3363
MISC
CONFIRM
MLIST
landesk — landesk_management_suite Multiple cross-site request forgery (CSRF) vulnerabilities in Landesk Management Suite 9.6 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) start, (2) stop, or (3) restart services via a request to remote/serverServices.aspx. 2015-04-21 6.8 CVE-2014-5361
BUGTRAQ
MISC
levelteninteractive — content_analysis Cross-site scripting (XSS) vulnerability in the Content Analysis module before 6.x-1.7 for Drupal allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, which are not properly handled in a log message. 2015-04-21 4.3 CVE-2015-3364
MISC
CONFIRM
MLIST
linux — linux_kernel net/llc/sysctl_net_llc.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry. 2015-04-21 4.6 CVE-2015-2041
CONFIRM
CONFIRM
MLIST
CONFIRM
linux — linux_kernel net/rds/sysctl.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry. 2015-04-21 4.6 CVE-2015-2042
CONFIRM
CONFIRM
MLIST
CONFIRM
log_watcher_project — log_watcher Multiple cross-site request forgery (CSRF) vulnerabilities in the Log Watcher module before 6.x-1.2 for Drupal allow remote attackers to hijack the authentication of administrators for requests that (1) enable, (2) disable, or (3) delete a report via unspecified vectors. 2015-04-21 6.8 CVE-2015-3351
MISC
CONFIRM
MLIST
niif — shibboleth_authentication_module Cross-site request forgery (CSRF) vulnerability in the Shibboleth Authentication module before 6.x-4.1 and 7.x-4.x before 7.x-4.1 for Drupal allows remote attackers to hijack the authentication of administrators for requests that delete user role matching rules via unspecified vectors. 2015-04-21 5.8 CVE-2015-3375
MISC
CONFIRM
CONFIRM
MLIST
node_invite_project — node_invite Cross-site request forgery (CSRF) vulnerability in the Node Invite module before 6.x-2.5 for Drupal allows remote attackers to hijack the authentication of users with the “node_invite_can_manage_invite” permission for requests that re-enable node invitations via unspecified vectors. 2015-04-21 6.8 CVE-2015-3370
MISC
CONFIRM
MLIST
node_invite_project — node_invite Open redirect vulnerability in the Node Invite module before 6.x-2.5 for Drupal allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the destination parameter. 2015-04-21 5.8 CVE-2015-3371
MISC
CONFIRM
MLIST
opac_project — opac Cross-site request forgery (CSRF) vulnerability in the OPAC module before 7.x-2.3 for Drupal allows remote attackers to hijack the authentication of unspecified victims for requests that remove a mapping via unknown vectors. 2015-04-21 6.8 CVE-2015-3343
MISC
CONFIRM
MLIST
openstack — keystonemiddleware The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the “insecure” option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate, a different vulnerability than CVE-2014-7144. 2015-04-17 4.3 CVE-2015-1852
CONFIRM
MLIST
openstack — swift OpenStack Object Storage (Swift) before 2.3.0, when allow_version is configured, allows remote authenticated users to delete the latest version of an object by leveraging listing access to the x-versions-location container. 2015-04-17 5.5 CVE-2015-1856
CONFIRM
MLIST
path_breadcrumbs_project — path_breadcrumbs The Path Breadcrumbs module before 7.x-3.2 for Drupal allows remote attackers to bypass intended access restrictions and obtaining sensitive node titles by reading a 403 Not Found page. 2015-04-21 5.0 CVE-2015-3391
MISC
CONFIRM
XF
MLIST
patterns — patterns Multiple cross-site request forgery (CSRF) vulnerabilities in the Patterns module before 7.x-2.2 for Drupal allow remote attackers to hijack the authentication of administrators for requests that (1) restore, (2) publish, or (3) unpublish a pattern via unspecified vectors. 2015-04-21 6.8 CVE-2015-3367
MISC
CONFIRM
MLIST
phplist_integration_project — phplist_integration SQL injection vulnerability in the PHPlist Integration Module before 6.x-1.7 for Drupal allows remote administrators to execute arbitrary SQL commands via unspecified vectors, related to the “phpList database.” 2015-04-21 6.5 CVE-2015-3345
MISC
CONFIRM
MLIST
qemu — qemu The (1) BMDMA and (2) AHCI HBA interfaces in the IDE functionality in QEMU 1.0 through 2.1.3 have multiple interpretations of a function’s return value, which allows guest OS users to cause a host OS denial of service (memory consumption or infinite loop, and system crash) via a PRDT with zero complete sectors, related to the bmdma_prepare_buf and ahci_dma_prepare_buf functions. 2015-04-21 4.9 CVE-2014-9718
MLIST
CONFIRM
searchblox — searchblox Multiple cross-site scripting (XSS) vulnerabilities in SearchBlox before 8.2 allow remote attackers to inject arbitrary web script or HTML via (1) the search field in plugin/index.html or (2) the title field in the Create Featured Result form in admin/main.jsp. 2015-04-17 4.3 CVE-2015-0967
CERT-VN
searchblox — searchblox SearchBlox before 8.2 allows remote attackers to obtain sensitive information via a pretty=true action to the _cluster/health URI. 2015-04-17 5.0 CVE-2015-0969
CERT-VN
searchblox — searchblox Cross-site request forgery (CSRF) vulnerability in SearchBlox before 8.2 allows remote attackers to hijack the authentication of arbitrary users. 2015-04-17 6.8 CVE-2015-0970
CERT-VN
symantec — workspace_streaming Unquoted Windows search path vulnerability in the agent in Symantec Workspace Streaming (SWS) 6.1 before SP8 MP2 HF7 and 7.5 before SP1 HF4, when AppMgrService.exe is configured as a service, allows local users to gain privileges via a Trojan horse executable file in the %SYSTEMDRIVE% directory, as demonstrated by program.exe. 2015-04-22 6.9 CVE-2015-1484
CONFIRM
BID
tadaa!_project — tadaa! Multiple cross-site request forgery (CSRF) vulnerabilities in the Tadaa! module before 7.x-1.4 for Drupal allow remote attackers to hijack the authentication of arbitrary users for requests that (1) enable or (2) disable modules or (3) change variables via unspecified vectors. 2015-04-21 6.8 CVE-2015-3356
CONFIRM
MISC
MLIST
tadaa!_project — tadaa! Multiple open redirect vulnerabilities in the Tadaa! module before 7.x-1.4 for Drupal allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in a destination parameter, related to callbacks that (1) enable and disable modules or (2) change variables. 2015-04-21 5.8 CVE-2015-3358
MISC
CONFIRM
MLIST
todo_filter_project — todo_filter Cross-site request forgery (CSRF) vulnerability in the Todo Filter module before 6.x-1.1 and 7.x-1.x before 7.x-1.1 for Drupal allows remote attackers to hijack the authentication of arbitrary users for requests that toggle a task via unspecified vectors. 2015-04-21 6.8 CVE-2015-3350
MISC
CONFIRM
CONFIRM
MLIST
ubercart_currency_conversion_project — ubercart_currency_conversion Open redirect vulnerability in the Ubercart Currency Conversion module before 6.x-1.2 for Drupal allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the destination query parameter. 2015-04-21 5.8 CVE-2015-3342
MISC
CONFIRM
BID
MLIST
views_project — views Open redirect vulnerability in the Views module before 6.x-2.18, 6.x-3.x before 6.x-3.2, and 7.x-3.x before 7.x-3.10 for Drupal, when the Views UI submodule is enabled, allows remote authenticated users to redirect users to arbitrary web sites and conduct phishing attacks via vectors related to the break lock page for edited views. 2015-04-21 4.9 CVE-2015-3378
MISC
CONFIRM
CONFIRM
CONFIRM
MLIST
views_project — views The Views module before 6.x-2.18, 6.x-3.x before 6.x-3.2, and 7.x-3.x before 7.x-3.10 for Drupal does not properly restrict access to the default views configurations, which allows remote authenticated users to obtain sensitive information via unspecified vectors. 2015-04-21 4.0 CVE-2015-3379
MISC
CONFIRM
CONFIRM
CONFIRM
MLIST
wishlist_project — wishlist Cross-site request forgery (CSRF) vulnerability in the Wishlist module before 6.x-2.7 and 7.x-2.x before 7.x-2.7 for Drupal allows remote attackers to hijack the authentication of arbitrary users for requests that delete wishlist purchase intentions via unspecified vectors. 2015-04-21 5.8 CVE-2015-3354
MISC
CONFIRM
CONFIRM
MLIST

Back to top

Low Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
ajax_timeline_project — ajax_timeline Cross-site scripting (XSS) vulnerability in the Ajax Timeline module before 7.x-1.1 for Drupal allows remote authenticated users to inject arbitrary web script or HTML via a node title. 2015-04-21 3.5 CVE-2015-3392
MISC
CONFIRM
XF
MLIST
cisco — firesight_system_software Cross-site scripting (XSS) vulnerability in Cisco FireSIGHT System Software 5.3.1.1 and 6.0.0 in FireSIGHT Management Center allows remote authenticated users to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCus85425. 2015-04-22 3.5 CVE-2015-0707
CISCO
cloudwords — cloudwords_for_multilingual Cross-site scripting (XSS) vulnerability in the Cloudwords for Multilingual Drupal module before 7.x-2.3 for Drupal allows remote authenticated users to inject arbitrary web script or HTML via a node title. 2015-04-21 3.5 CVE-2015-3348
MISC
CONFIRM
MLIST
commerce_balanced_payments_project — commerce_balanced_payments Cross-site scripting (XSS) vulnerability in the Bank Account Listing Page in the Commerce Balanced Payments module for Drupal allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. 2015-04-21 3.5 CVE-2015-3384
MISC
MLIST
dlc_solutions — course Cross-site scripting (XSS) vulnerability in the Course module 6.x-1.x before 6.x-1.2 and 7.x-1.x before 7.x-1.4 for Drupal allows remote authenticated users to inject arbitrary web script or HTML via a node title. 2015-04-21 3.5 CVE-2015-3344
MISC
CONFIRM
CONFIRM
MLIST
facebook_album_fetcher_project — facebook_album_fetcher Cross-site scripting (XSS) vulnerability in the Facebook Album Fetcher module for Drupal allows remote authenticated users with the “access administration pages” permission to inject arbitrary web script or HTML via unspecified vectors. 2015-04-21 3.5 CVE-2015-3390
MISC
XF
MLIST
field_display_label_project — field_display_label Cross-site scripting (XSS) vulnerability in the Field Display Label module before 7.x-1.3 for Drupal allows remote authenticated users to inject arbitrary web script or HTML via the alternate field label in content types settings. 2015-04-21 3.5 CVE-2015-3353
MISC
CONFIRM
MLIST
insite — node_basket Cross-site scripting (XSS) vulnerability in the Node basket module for Drupal allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. 2015-04-21 3.5 CVE-2015-3381
MISC
MLIST
linkit_project — linkit Cross-site scripting (XSS) vulnerability in the Linkit module before 7.x-2.7 and 7.x-3.x before 7.x-3.3 for Drupal, when the node search plugin is enabled, allows remote authenticated users to inject arbitrary web script or HTML via a node title. 2015-04-21 2.1 CVE-2015-3361
MISC
CONFIRM
CONFIRM
MLIST
node_access_product_project — node_access_product Cross-site scripting (XSS) vulnerability in the Node Access Product module for Drupal allows remote authenticated users to inject arbitrary web script or HTML via a node title. 2015-04-21 3.5 CVE-2015-3386
MISC
MLIST
node_invite_project — node_invite Cross-site scripting (XSS) vulnerability in the Node Invite module before 6.x-2.5 for Drupal allows remote authenticated users to inject arbitrary web script or HTML via a node title. 2015-04-21 3.5 CVE-2015-3372
MISC
CONFIRM
MLIST
nodeauthor_project — nodeauthor Cross-site scripting (XSS) vulnerability in the nodeauthor module for Drupal allows remote authenticated users to inject arbitrary web script or HTML via a Profile2 field in a provided block. 2015-04-21 3.5 CVE-2015-3365
MISC
MLIST
osinet — classified_ads Cross-site scripting (XSS) vulnerability in the administration user interface in the Classified Ads module before 6.x-3.1 and 7.x-3.x before 7.x-3.1 for Drupal allows remote authenticated users with the “administer taxonomy” permission to inject arbitrary web script or HTML via a category name. 2015-04-21 3.5 CVE-2015-3368
MISC
CONFIRM
CONFIRM
MLIST
public_download_count_project — public_download_count Cross-site scripting (XSS) vulnerability in the Download counts report page in the Public Download Count module (pubdlcnt) 7.x-1.x-dev and earlier for Drupal allows remote authnticated users to inject arbitrary web script or HTML via unspecified vectors. 2015-04-21 3.5 CVE-2015-3389
MISC
XF
MLIST
quizzler_project — quizzler Cross-site scripting (XSS) vulnerability in the Quizzler module before 7-x.1.16 for Drupal allows remote authenticated users to inject arbitrary web script or HTML via a node title. 2015-04-21 3.5 CVE-2015-3376
MISC
CONFIRM
MLIST
randall_library — room_reservations Multiple cross-site scripting (XSS) vulnerabilities in the Room Reservations module before 7.x-1.1 for Drupal allow remote authenticated users with the “Administer the room reservations system” permission to inject arbitrary web script or HTML via the (1) node title of a “Room Reservations Category” or (2) body of a “Room Reservations Room” node. 2015-04-21 3.5 CVE-2015-3359
MISC
CONFIRM
MLIST
redhat — jboss_enterprise_application_platform The default configuration for the Command Line Interface in Red Hat Enterprise Application Platform before 6.4.0 and WildFly (formerly JBoss Application Server) uses weak permissions for .jboss-cli-history, which allows local users to obtain sensitive information via unspecified vectors. 2015-04-21 2.1 CVE-2014-3586
CONFIRM
REDHAT
REDHAT
REDHAT
REDHAT
taxonews_project — taxonews Cross-site scripting (XSS) vulnerability in the Taxonews module before 6.x-1.2 and 7.x-1.x before 7.x-1.1 for Drupal allows remote authenticated users with the “administer taxonomy” permission to inject arbitrary web script or HTML via a term name in a block. 2015-04-21 3.5 CVE-2015-3369
MISC
CONFIRM
CONFIRM
MLIST
taxonomy_path_project — taxonomy_path Cross-site scripting (XSS) vulnerability in the Taxonomy Path module before 7.x-1.2 for Drupal allows remote authenticated users to inject arbitrary web script or HTML via the “Link to path” field formatter. 2015-04-21 3.5 CVE-2015-3385
MISC
CONFIRM
MLIST
taxonomy_tools_project — taxonomy_tools Multiple cross-site scripting (XSS) vulnerabilities in the Taxonomy Tools module before 7.x-1.4 for Drupal allow remote authenticated users to inject arbitrary web script or HTML via a (1) node or (2) taxonomy term title. 2015-04-21 3.5 CVE-2015-3387
MISC
CONFIRM
MLIST
term_merge_project — term_merge Cross-site scripting (XSS) vulnerability in the Term Merge module before 7.x-1.2 for Drupal allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. 2015-04-21 3.5 CVE-2015-3360
MISC
CONFIRM
MLIST
video_project — video Cross-site scripting (XSS) vulnerability in the Video module before 7.x-2.11 for Drupal, when using the video WYSIWYG plugin, allows remote authenticated users to inject arbitrary web script or HTML via a node title. 2015-04-21 3.5 CVE-2015-3362
MISC
CONFIRM
MLIST
wishlist_project — wishlist Cross-site scripting (XSS) vulnerability in the Wishlist module before 6.x-2.7 and 7.x-2.x before 7.x-2.7 for Drupal allows remote authenticated users with the “access wishlists” permission to inject arbitrary web script or HTML via unspecified vectors, which are not properly handled in a log message. 2015-04-21 3.5 CVE-2015-3357
MISC
CONFIRM
CONFIRM
MLIST

Back to top


This product is provided subject to this Notification and this Privacy & Use policy.

WordPress Releases Security Update

Original release date: April 23, 2015

WordPress 4.1.2 has been released to address multiple vulnerabilities, one of which could allow a site to be compromised by a remote attacker. WordPress 4.1.1 and earlier are affected by this vulnerability.

US-CERT recommends users and administrators review the WordPress Security Release and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.

IC3 Warns of Cyber Attacks Focused on Law Enforcement and Public Officials

Original release date: April 21, 2015

The Internet Crime Complaint Center (IC3) has issued an alert warning that law enforcement personnel and public officials may be at an increased risk of cyber attacks. Doxing—the act of gathering and publishing individuals’ personal information without permission—has been observed. Hacking collectives may exploit publicly available information identifying officers or officials, their employers, and their families. These target groups should protect their online presence and exposure.

Users are encouraged to review the IC3 Alert for details and refer to US-CERT Tip ST06-003 for information on staying safe on social network sites.


This product is provided subject to this Notification and this Privacy & Use policy.

SB15-110: Vulnerability Summary for the Week of April 13, 2015

Original release date: April 20, 2015

The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. The NVD is sponsored by the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) / United States Computer Emergency Readiness Team (US-CERT). For modified or updated entries, please visit the NVD, which contains historical vulnerability information.

The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:

  • High – Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 – 10.0

  • Medium – Vulnerabilities will be labeled Medium severity if they have a CVSS base score of 4.0 – 6.9

  • Low – Vulnerabilities will be labeled Low severity if they have a CVSS base score of 0.0 – 3.9

Entries may include additional information provided by organizations and efforts sponsored by US-CERT. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletins is compiled from external, open source reports and is not a direct result of US-CERT analysis.

High Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
adobe — flash_player Double free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0359. 2015-04-14 10.0 CVE-2015-0346
CONFIRM
adobe — flash_player Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043. 2015-04-14 10.0 CVE-2015-0347
CONFIRM
adobe — flash_player Buffer overflow in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors. 2015-04-14 10.0 CVE-2015-0348
CONFIRM
adobe — flash_player Use-after-free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0351, CVE-2015-0358, and CVE-2015-3039. 2015-04-14 10.0 CVE-2015-0349
CONFIRM
adobe — flash_player Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043. 2015-04-14 10.0 CVE-2015-0350
CONFIRM
adobe — flash_player Use-after-free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0349, CVE-2015-0358, and CVE-2015-3039. 2015-04-14 10.0 CVE-2015-0351
CONFIRM
adobe — flash_player Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043. 2015-04-14 10.0 CVE-2015-0352
CONFIRM
adobe — flash_player Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043. 2015-04-14 10.0 CVE-2015-0353
CONFIRM
adobe — flash_player Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043. 2015-04-14 10.0 CVE-2015-0354
CONFIRM
adobe — flash_player Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043. 2015-04-14 10.0 CVE-2015-0355
CONFIRM
adobe — flash_player Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code by leveraging an unspecified “type confusion.” 2015-04-14 10.0 CVE-2015-0356
CONFIRM
adobe — flash_player Use-after-free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0349, CVE-2015-0351, and CVE-2015-3039. 2015-04-14 10.0 CVE-2015-0358
CONFIRM
adobe — flash_player Double free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0346. 2015-04-14 10.0 CVE-2015-0359
CONFIRM
adobe — flash_player Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043. 2015-04-14 10.0 CVE-2015-0360
CONFIRM
adobe — flash_player Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043. 2015-04-14 10.0 CVE-2015-3038
CONFIRM
adobe — flash_player Use-after-free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0349, CVE-2015-0351, and CVE-2015-0358. 2015-04-14 10.0 CVE-2015-3039
CONFIRM
adobe — flash_player Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3042, and CVE-2015-3043. 2015-04-14 10.0 CVE-2015-3041
CONFIRM
adobe — flash_player Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, and CVE-2015-3043. 2015-04-14 10.0 CVE-2015-3042
CONFIRM
adobe — flash_player Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in April 2015, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, and CVE-2015-3042. 2015-04-14 10.0 CVE-2015-3043
CONFIRM
apple — apple_tv IOHIDFamily in Apple iOS before 8.3, Apple OS X before 10.10.3, and Apple TV before 7.2 allows physically proximate attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted HID device. 2015-04-10 7.2 CVE-2015-1095
CONFIRM
CONFIRM
CONFIRM
SECTRACK
APPLE
APPLE
APPLE
apple — apple_tv The kernel in Apple iOS before 8.3, Apple OS X before 10.10.3, and Apple TV before 7.2 does not properly handle TCP headers, which allows man-in-the-middle attackers to cause a denial of service via unspecified vectors. 2015-04-10 7.1 CVE-2015-1102
CONFIRM
CONFIRM
CONFIRM
SECTRACK
APPLE
APPLE
APPLE
apple — apple_tv The kernel in Apple iOS before 8.3, Apple OS X before 10.10.3, and Apple TV before 7.2 makes routing changes in response to ICMP_REDIRECT messages, which allows remote attackers to cause a denial of service (network outage) or obtain sensitive packet-content information via a crafted ICMP packet. 2015-04-10 7.5 CVE-2015-1103
CONFIRM
CONFIRM
CONFIRM
SECTRACK
APPLE
APPLE
APPLE
apple — mac_os_x The XPC implementation in Admin Framework in Apple OS X before 10.10.3 allows local users to bypass authentication and obtain admin privileges via unspecified vectors. 2015-04-10 7.2 CVE-2015-1130
CONFIRM
SECTRACK
APPLE
apple — mac_os_x fontd in Apple Type Services (ATS) in Apple OS X before 10.10.3 allows local users to gain privileges via unspecified vectors, a different vulnerability than CVE-2015-1132, CVE-2015-1133, CVE-2015-1134, and CVE-2015-1135. 2015-04-10 7.2 CVE-2015-1131
CONFIRM
SECTRACK
APPLE
apple — mac_os_x fontd in Apple Type Services (ATS) in Apple OS X before 10.10.3 allows local users to gain privileges via unspecified vectors, a different vulnerability than CVE-2015-1131, CVE-2015-1133, CVE-2015-1134, and CVE-2015-1135. 2015-04-10 10.0 CVE-2015-1132
CONFIRM
SECTRACK
APPLE
apple — mac_os_x fontd in Apple Type Services (ATS) in Apple OS X before 10.10.3 allows local users to gain privileges via unspecified vectors, a different vulnerability than CVE-2015-1131, CVE-2015-1132, CVE-2015-1134, and CVE-2015-1135. 2015-04-10 7.2 CVE-2015-1133
CONFIRM
SECTRACK
APPLE
apple — mac_os_x fontd in Apple Type Services (ATS) in Apple OS X before 10.10.3 allows local users to gain privileges via unspecified vectors, a different vulnerability than CVE-2015-1131, CVE-2015-1132, CVE-2015-1133, and CVE-2015-1135. 2015-04-10 7.2 CVE-2015-1134
CONFIRM
SECTRACK
APPLE
apple — mac_os_x fontd in Apple Type Services (ATS) in Apple OS X before 10.10.3 allows local users to gain privileges via unspecified vectors, a different vulnerability than CVE-2015-1131, CVE-2015-1132, CVE-2015-1133, and CVE-2015-1134. 2015-04-10 7.2 CVE-2015-1135
CONFIRM
SECTRACK
APPLE
apple — mac_os_x The NVIDIA graphics driver in Apple OS X before 10.10.3 allows local users to gain privileges or cause a denial of service (NULL pointer dereference) via an unspecified IOService userclient type. 2015-04-10 7.2 CVE-2015-1137
CONFIRM
SECTRACK
APPLE
apple — mac_os_x Buffer overflow in IOHIDFamily in Apple OS X before 10.10.3 allows local users to gain privileges via unspecified vectors. 2015-04-10 7.2 CVE-2015-1140
CONFIRM
SECTRACK
APPLE
apple — mac_os_x LaunchServices in Apple OS X before 10.10.3 allows local users to gain privileges via a crafted localized string, related to a “type confusion” issue. 2015-04-10 7.2 CVE-2015-1143
CONFIRM
SECTRACK
APPLE
apple — mac_os_x Buffer overflow in the UniformTypeIdentifiers component in Apple OS X before 10.10.3 allows local users to gain privileges via a crafted Uniform Type Identifier. 2015-04-10 7.2 CVE-2015-1144
CONFIRM
SECTRACK
APPLE
apple — xcode Integer overflow in the simulator in Swift in Apple Xcode before 6.3 allows context-dependent attackers to cause a denial of service or possibly have unspecified other impact by triggering an incorrect result of a type conversion. 2015-04-10 7.5 CVE-2015-1149
CONFIRM
SECTRACK
APPLE
bittorrent — sync BitTorrent Sync allows remote attackers to execute arbitrary commands via a crafted btsync: link. 2015-04-13 9.3 CVE-2015-2846
MISC
boosted — boosted_boards Unspecified vulnerability in Boosted Boards skateboards allows physically proximate attackers to modify skateboard movement, cause human injury, or cause physical damage via vectors related to an “injection attack” that blocks and hijacks a Bluetooth signal. 2015-04-10 8.3 CVE-2015-2247
MISC
MISC
MISC
MISC
cisco — adaptive_security_appliance_software The failover ipsec implementation in Cisco Adaptive Security Appliance (ASA) Software 9.1 before 9.1(6), 9.2 before 9.2(3.3), and 9.3 before 9.3(3) does not properly validate failover communication messages, which allows remote attackers to reconfigure an ASA device, and consequently obtain administrative control, by sending crafted UDP packets over the local network to the failover interface, aka Bug ID CSCur21069. 2015-04-12 8.3 CVE-2015-0675
SECTRACK
CISCO
cisco — adaptive_security_appliance_software The DNS implementation in Cisco Adaptive Security Appliance (ASA) Software 7.2 before 7.2(5.16), 8.2 before 8.2(5.57), 8.3 before 8.3(2.44), 8.4 before 8.4(7.28), 8.5 before 8.5(1.24), 8.6 before 8.6(1.17), 8.7 before 8.7(1.16), 9.0 before 9.0(4.33), 9.1 before 9.1(6.1), 9.2 before 9.2(3.4), and 9.3 before 9.3(3) allows man-in-the-middle attackers to cause a denial of service (memory consumption or device outage) by triggering outbound DNS queries and then sending crafted responses to these queries, aka Bug ID CSCuq77655. 2015-04-12 7.1 CVE-2015-0676
SECTRACK
CISCO
cisco — adaptive_security_appliance_software The XML parser in Cisco Adaptive Security Appliance (ASA) Software 8.4 before 8.4(7.28), 8.6 before 8.6(1.17), 9.0 before 9.0(4.33), 9.1 before 9.1(6), 9.2 before 9.2(3.4), and 9.3 before 9.3(3), when Clientless SSL VPN, AnyConnect SSL VPN, or AnyConnect IKEv2 VPN is used, allows remote attackers to cause a denial of service (VPN outage or device reload) via a crafted XML document, aka Bug ID CSCus95290. 2015-04-12 7.8 CVE-2015-0677
SECTRACK
CISCO
cisco — asa_cx_context-aware_security_software The virtualization layer in Cisco ASA FirePOWER Software before 5.3.1.2 and 5.4.x before 5.4.0.1 and ASA Context-Aware (CX) Software before 9.3.2.1-9 allows remote attackers to cause a denial of service (device reload) by rapidly sending crafted packets to the management interface, aka Bug IDs CSCus11007 and CSCun56954. 2015-04-10 7.8 CVE-2015-0678
SECTRACK
CISCO
cisco — secure_desktop A certain Cisco JAR file, as distributed in Cache Cleaner in Cisco Secure Desktop (CSD), allows remote attackers to execute arbitrary commands via a crafted web site, aka Bug ID CSCup83001. 2015-04-16 9.3 CVE-2015-0691
CISCO
cisco — web_security_appliance Cisco Web Security Appliance (WSA) devices with software 8.5.0-ise-147 do not properly restrict use of the pickle Python module during certain tunnel-status checks, which allows local users to execute arbitrary Python code and gain privileges via crafted serialized objects, aka Bug ID CSCut39230. 2015-04-10 7.2 CVE-2015-0692
CISCO
cisco — web_security_appliance Cisco Web Security Appliance (WSA) devices with software 8.5.0-ise-147 do not properly restrict use of the pickle Python module during certain tunnel-status checks, which allows local users to execute arbitrary Python code and gain privileges via a crafted pickle file, aka Bug ID CSCut39259. 2015-04-15 7.2 CVE-2015-0693
CISCO
cisco — ios_xr Cisco IOS XR 4.3.4 through 5.3.0 on ASR 9000 devices, when uRPF, PBR, QoS, or an ACL is configured, does not properly handle bridge-group virtual interface (BVI) traffic, which allows remote attackers to cause a denial of service (chip and card hangs and reloads) by triggering use of a BVI interface for IPv4 packets, aka Bug ID CSCur62957. 2015-04-16 7.8 CVE-2015-0695
CISCO
das_watchdog_project — das_watchdog Buffer overflow in das_watchdog 0.9.0 allows local users to execute arbitrary code with root privileges via a large string in the XAUTHORITY environment variable. 2015-04-14 7.2 CVE-2015-2831
CONFIRM
MLIST
MLIST
DEBIAN
debian — dbd-firebird Multiple stack-based buffer overflows in the ib_fill_isqlda function in dbdimp.c in DBD-Firebird before 1.19 allow remote attackers to have unspecified impact via unknown vectors that trigger an error condition, related to binding octets to columns. 2015-04-14 10.0 CVE-2015-2788
CONFIRM
CONFIRM
MLIST
MLIST
DEBIAN
emc — networker Buffer overflow in an unspecified function in nsr_render_log in EMC NetWorker before 8.0.4.3, 8.1.x before 8.1.2.6, and 8.2.x before 8.2.1.2 allows local users to gain privileges via unknown vectors. 2015-04-16 7.2 CVE-2015-0530
BUGTRAQ
fiyo — fiyo_cms Multiple SQL injection vulnerabilities in Fiyo CMS 2.0.1.8 allow remote attackers to execute arbitrary SQL commands via the (1) id parameter in an edit action to dapur/index.php; (2) cat, (3) user, or (4) level parameter to dapur/apps/app_article/controller/article_list.php; or (5) email parameter in an email action or (6) username parameter in a user action to dapur/apps/app_user/controller/check_user.php. 2015-04-14 7.5 CVE-2014-9145
MISC
glpi-project — glpi Directory traversal vulnerability in inc/autoload.function.php in GLPI before 0.84.8 allows remote attackers to include and execute arbitrary local files via a .._ (dot dot underscore) in an item type to the getItemForItemtype, as demonstrated by the itemtype parameter in ajax/common.tabs.php. 2015-04-14 7.5 CVE-2014-8360
CONFIRM
MANDRIVA
CONFIRM
MISC
CONFIRM
gnu — less The is_utf8_well_formed function in GNU less before 475 allows remote attackers to have unspecified impact via malformed UTF-8 characters, which triggers an out-of-bounds read. 2015-04-14 10.0 CVE-2014-9488
MISC
MANDRIVA
SUSE
CONFIRM
gnu — mailman Directory traversal vulnerability in GNU Mailman before 2.1.20, when not using a static alias, allows remote attackers to execute arbitrary files via a .. (dot dot) in a list name. 2015-04-13 7.6 CVE-2015-2775
MLIST
MLIST
MLIST
CONFIRM
UBUNTU
SECTRACK
DEBIAN
gnu — libtasn1 Stack-based buffer overflow in asn1_der_decoding in libtasn1 before 4.4 allows remote attackers to have unspecified impact via unknown vectors. 2015-04-10 10.0 CVE-2015-2806
UBUNTU
MLIST
MLIST
MANDRIVA
DEBIAN
CONFIRM
hp — easy_tools Unspecified vulnerability in HP Easy Deploy, as distributed standalone and in HP Easy Tools before 3.0.1.1650, on HP Thin Client t5540, t5740, and t5740e devices and HP Flexible Thin Client t510, t520, t610, t620, and t820 devices allows remote authenticated users to execute arbitrary code via unknown vectors. 2015-04-14 9.0 CVE-2015-2112
HP
hp — easy_tools Unspecified vulnerability in HP Easy Deploy, as distributed standalone and in HP Easy Tools before 3.0.1.1650, on HP Thin Client t5540, t5740, and t5740e devices and HP Flexible Thin Client t510, t520, t610, t620, and t820 devices allows remote attackers to execute arbitrary code via unknown vectors. 2015-04-14 10.0 CVE-2015-2113
HP
ibm — tivoli_storage_manager_fastback Stack-based buffer overflow in the FastBackMount process in IBM Tivoli Storage Manager FastBack 6.1 before 6.1.11.1 allows local users to gain privileges via unspecified vectors, a different vulnerability than CVE-2015-1898. 2015-04-15 7.2 CVE-2015-1897
CONFIRM
ibm — tivoli_storage_manager_fastback Stack-based buffer overflow in the FastBackMount process in IBM Tivoli Storage Manager FastBack 6.1 before 6.1.11.1 allows local users to gain privileges via unspecified vectors, a different vulnerability than CVE-2015-1897. 2015-04-15 7.2 CVE-2015-1898
CONFIRM
juniper — junos Juniper Junos 12.1X44 before 12.1X44-D45, 12.1X46 before 12.1X46-D30, 12.1X47 before 12.1X47-D20, 12.3 before 12.3R9, 12.3X48 before 12.3X48-D10, 13.2 before 13.2R6, 13.3 before 13.3R5, 14.1 before 14.1R3, and 14.2 before 14.2R1 allows local users to gain privileges via crafted combinations of CLI commands and arguments. 2015-04-10 7.2 CVE-2015-3003
CONFIRM
SECTRACK
mediawiki — mediawiki MediaWiki 1.24.x before 1.24.2, when using PBKDF2 for password hashing, allows remote attackers to cause a denial of service (CPU consumption) via a long password. 2015-04-13 7.1 CVE-2015-2936
MLIST
CONFIRM
MLIST
MLIST
MANDRIVA
mediawiki — mediawiki MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2, when using HHVM or Zend PHP, allows remote attackers to cause a denial of service (“quadratic blowup” and memory consumption) via an XML file containing an entity declaration with long replacement text and many references to this entity, a different vulnerability than CVE-2015-2942. 2015-04-13 7.1 CVE-2015-2937
MLIST
CONFIRM
MLIST
MLIST
MANDRIVA
mediawiki — mediawiki MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2, when using HHVM, allows remote attackers to cause a denial of service (CPU and memory consumption) via a large number of nested entity references in an (1) SVG file or (2) XMP metadata in a PDF file, aka a “billion laughs attack,” a different vulnerability than CVE-2015-2937. 2015-04-13 7.1 CVE-2015-2942
MLIST
CONFIRM
MLIST
MLIST
microsoft — windows_7 Task Scheduler in Microsoft Windows 7 SP1 and Windows Server 2008 R2 SP1 allows local users to gain privileges by triggering application execution by an invalid task, aka “Task Scheduler Elevation of Privilege Vulnerability.” 2015-04-14 7.2 CVE-2015-0098
MS
microsoft — windows_7 HTTP.sys in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted HTTP requests, aka “HTTP.sys Remote Code Execution Vulnerability.” 2015-04-14 10.0 CVE-2015-1635
MS
microsoft — office Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word for Mac 2011, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, and Office Web Apps Server 2010 SP2 and 2013 SP1 allow remote attackers to execute arbitrary code via a crafted RTF document, aka “Microsoft Office Memory Corruption Vulnerability.” 2015-04-14 9.3 CVE-2015-1641
MS
microsoft — windows_7 Microsoft Windows Server 2003 R2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 do not properly constrain impersonation levels, which allows local users to gain privileges via a crafted application, aka “NtCreateTransactionManager Type Confusion Vulnerability.” 2015-04-14 7.2 CVE-2015-1643
MS
microsoft — windows_7 Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 do not properly constrain impersonation levels, which allows local users to gain privileges via a crafted application, aka “Windows MS-DOS Device Name Vulnerability.” 2015-04-14 7.2 CVE-2015-1644
MS
microsoft — windows_7 Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allow remote attackers to execute arbitrary code via a crafted Enhanced Metafile (EMF) image, aka “EMF Processing Remote Code Execution Vulnerability.” 2015-04-14 9.3 CVE-2015-1645
MS
microsoft — office Use-after-free vulnerability in Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, and Office Web Apps Server 2010 SP2 allows remote attackers to execute arbitrary code via a crafted Office document, aka “Microsoft Office Component Use After Free Vulnerability.” 2015-04-14 9.3 CVE-2015-1649
MS
microsoft — office Use-after-free vulnerability in Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, and Office Web Apps Server 2010 SP2 and 2013 SP1 allows remote attackers to execute arbitrary code via a crafted Office document, aka “Microsoft Office Component Use After Free Vulnerability.” 2015-04-14 9.3 CVE-2015-1650
MS
microsoft — office_compatibility_pack Use-after-free vulnerability in Microsoft Word 2007 SP3, Word Viewer, and Office Compatibility Pack SP3 allows remote attackers to execute arbitrary code via a crafted Office document, aka “Microsoft Office Component Use After Free Vulnerability.” 2015-04-14 9.3 CVE-2015-1651
MS
microsoft — internet_explorer Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka “Internet Explorer Memory Corruption Vulnerability,” a different vulnerability than CVE-2015-1666. 2015-04-14 9.3 CVE-2015-1652
MS
microsoft — internet_explorer Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka “Internet Explorer Memory Corruption Vulnerability.” 2015-04-14 9.3 CVE-2015-1657
MS
microsoft — internet_explorer Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka “Internet Explorer Memory Corruption Vulnerability,” a different vulnerability than CVE-2015-1662 and CVE-2015-1665. 2015-04-14 9.3 CVE-2015-1659
MS
microsoft — internet_explorer Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka “Internet Explorer Memory Corruption Vulnerability.” 2015-04-14 9.3 CVE-2015-1660
MS
microsoft — internet_explorer Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka “Internet Explorer Memory Corruption Vulnerability,” a different vulnerability than CVE-2015-1659 and CVE-2015-1665. 2015-04-14 9.3 CVE-2015-1662
MS
microsoft — internet_explorer Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka “Internet Explorer Memory Corruption Vulnerability,” a different vulnerability than CVE-2015-1659 and CVE-2015-1662. 2015-04-14 9.3 CVE-2015-1665
MS
microsoft — internet_explorer Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka “Internet Explorer Memory Corruption Vulnerability,” a different vulnerability than CVE-2015-1652. 2015-04-14 9.3 CVE-2015-1666
MS
microsoft — internet_explorer Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka “Internet Explorer Memory Corruption Vulnerability.” 2015-04-14 9.3 CVE-2015-1667
MS
microsoft — internet_explorer Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka “Internet Explorer Memory Corruption Vulnerability.” 2015-04-14 9.3 CVE-2015-1668
MS
oracle — solaris Unspecified vulnerability in Oracle Sun Solaris 11.2 allows local users to affect confidentiality, integrity, and availability via vectors related to ZFS File system. 2015-04-16 7.2 CVE-2015-0448
CONFIRM
oracle — database_server Unspecified vulnerability in the Java VM component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors. 2015-04-16 9.0 CVE-2015-0457
CONFIRM
oracle — jdk Unspecified vulnerability in in Oracle Java SE 6u91, 7u76, and 8u40 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment. 2015-04-16 7.6 CVE-2015-0458
CONFIRM
oracle — javafx Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and JavaFX 2.2.76, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2015-0491. 2015-04-16 10.0 CVE-2015-0459
CONFIRM
oracle — jdk Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot. 2015-04-16 9.3 CVE-2015-0460
CONFIRM
oracle — fusion_middleware Unspecified vulnerability in the Oracle Access Manager component in Oracle Fusion Middleware 11.1.1.5 and 11.1.1.7 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Authentication Engine. 2015-04-16 7.0 CVE-2015-0461
CONFIRM
oracle — jdk Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. 2015-04-16 10.0 CVE-2015-0469
CONFIRM
oracle — javafx Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and Java FX 2.2.76, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2015-0459. 2015-04-16 10.0 CVE-2015-0491
CONFIRM
oracle — javafx Unspecified vulnerability in Oracle Java SE 7u76 and 8u40, and JavaFX 2.2.76, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2015-0484. 2015-04-16 9.3 CVE-2015-0492
CONFIRM
oracle — solaris Unspecified vulnerability in Oracle Sun Solaris 10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Accounting commands. 2015-04-16 7.2 CVE-2015-2577
CONFIRM
oracle — solaris Unspecified vulnerability in Oracle Sun Solaris 11.2 allows remote attackers to affect availability via vectors related to Kernel IDMap. 2015-04-16 7.1 CVE-2015-2578
CONFIRM

Back to top

Medium Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
adobe — coldfusion Cross-site scripting (XSS) vulnerability in Adobe ColdFusion 10 before Update 16 and 11 before Update 5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. 2015-04-15 4.3 CVE-2015-0345
CONFIRM
adobe — flash_player Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux does not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors, a different vulnerability than CVE-2015-3040. 2015-04-14 5.0 CVE-2015-0357
CONFIRM
adobe — flash_player Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux does not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors, a different vulnerability than CVE-2015-0357. 2015-04-14 5.0 CVE-2015-3040
CONFIRM
adobe — flash_player Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors. 2015-04-14 5.0 CVE-2015-3044
CONFIRM
apple — apple_tv The Audio Drivers subsystem in Apple iOS before 8.3 and Apple TV before 7.2 does not properly validate IOKit object metadata, which allows attackers to execute arbitrary code in a privileged context via a crafted app. 2015-04-10 6.9 CVE-2015-1086
CONFIRM
CONFIRM
SECTRACK
APPLE
APPLE
apple — iphone_os CFURL in Apple iOS before 8.3 and Apple OS X before 10.10.3 does not properly validate URLs, which allows remote attackers to execute arbitrary code via a crafted web site. 2015-04-10 6.8 CVE-2015-1088
CONFIRM
CONFIRM
SECTRACK
APPLE
APPLE
apple — iphone_os CFNetwork in Apple iOS before 8.3 and Apple OS X before 10.10.3 does not properly handle cookies during processing of redirects in HTTP responses, which allows remote attackers to bypass the Same Origin Policy via a crafted web site. 2015-04-10 5.0 CVE-2015-1089
CONFIRM
CONFIRM
SECTRACK
APPLE
APPLE
apple — iphone_os CFNetwork in Apple iOS before 8.3 does not delete HTTP Strict Transport Security (HSTS) state information in response to a Safari history-clearing action, which allows attackers to obtain sensitive information by reading a history file. 2015-04-10 5.0 CVE-2015-1090
CONFIRM
SECTRACK
APPLE
apple — iphone_os The CFNetwork Session component in Apple iOS before 8.3 and Apple OS X before 10.10.3 does not properly handle request headers during processing of redirects in HTTP responses, which allows remote attackers to bypass the Same Origin Policy via a crafted web site. 2015-04-10 4.3 CVE-2015-1091
CONFIRM
CONFIRM
SECTRACK
APPLE
APPLE
apple — apple_tv NSXMLParser in Foundation in Apple iOS before 8.3 and Apple TV before 7.2 allows remote attackers to read arbitrary files via an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. 2015-04-10 5.0 CVE-2015-1092
CONFIRM
CONFIRM
SECTRACK
APPLE
APPLE
apple — iphone_os FontParser in Apple iOS before 8.3 and Apple OS X before 10.10.3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font file. 2015-04-10 6.8 CVE-2015-1093
CONFIRM
CONFIRM
SECTRACK
APPLE
APPLE
apple — iphone_os iWork in Apple iOS before 8.3 and Apple OS X before 10.10.3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted iWork file. 2015-04-10 6.8 CVE-2015-1098
CONFIRM
CONFIRM
SECTRACK
APPLE
APPLE
apple — apple_tv Race condition in the setreuid system-call implementation in the kernel in Apple iOS before 8.3, Apple OS X before 10.10.3, and Apple TV before 7.2 allows attackers to cause a denial of service via a crafted app. 2015-04-10 4.0 CVE-2015-1099
CONFIRM
CONFIRM
CONFIRM
SECTRACK
APPLE
APPLE
APPLE
apple — apple_tv The kernel in Apple iOS before 8.3, Apple OS X before 10.10.3, and Apple TV before 7.2 allows attackers to cause a denial of service (out-of-bounds memory access) or obtain sensitive memory-content information via a crafted app. 2015-04-10 5.4 CVE-2015-1100
CONFIRM
CONFIRM
CONFIRM
SECTRACK
APPLE
APPLE
APPLE
apple — apple_tv The kernel in Apple iOS before 8.3, Apple OS X before 10.10.3, and Apple TV before 7.2 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. 2015-04-10 6.9 CVE-2015-1101
CONFIRM
CONFIRM
CONFIRM
SECTRACK
APPLE
APPLE
APPLE
apple — apple_tv The kernel in Apple iOS before 8.3, Apple OS X before 10.10.3, and Apple TV before 7.2 does not properly determine whether an IPv6 packet had a local origin, which allows remote attackers to bypass an intended network-filtering protection mechanism via a crafted packet. 2015-04-10 5.0 CVE-2015-1104
CONFIRM
CONFIRM
CONFIRM
SECTRACK
APPLE
APPLE
APPLE
apple — apple_tv The TCP implementation in the kernel in Apple iOS before 8.3, Apple OS X before 10.10.3, and Apple TV before 7.2 does not properly implement the Urgent (aka out-of-band data) mechanism, which allows remote attackers to cause a denial of service via crafted packets. 2015-04-10 5.0 CVE-2015-1105
CONFIRM
CONFIRM
CONFIRM
SECTRACK
APPLE
APPLE
APPLE
apple — apple_tv The Podcasts component in Apple iOS before 8.3 and Apple TV before 7.2 allows remote attackers to discover unique identifiers by reading asset-download request data. 2015-04-10 5.0 CVE-2015-1110
CONFIRM
CONFIRM
SECTRACK
APPLE
APPLE
apple — iphone_os Safari in Apple iOS before 8.3 does not delete Recently Closed Tabs data in response to a history-clearing action, which allows attackers to obtain sensitive information by reading a history file. 2015-04-10 5.0 CVE-2015-1111
CONFIRM
SECTRACK
APPLE
apple — safari Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, as used on iOS before 8.3 and other platforms, does not properly delete browsing-history data from the history.plist file, which allows attackers to obtain sensitive information by reading this file. 2015-04-10 5.0 CVE-2015-1112
CONFIRM
CONFIRM
SECTRACK
APPLE
APPLE
apple — iphone_os The Telephony component in Apple iOS before 8.3 allows attackers to bypass a sandbox protection mechanism and access unintended telephone capabilities via a crafted app. 2015-04-10 4.4 CVE-2015-1115
CONFIRM
SECTRACK
APPLE
apple — apple_tv The (1) setreuid and (2) setregid system-call implementations in the kernel in Apple iOS before 8.3, Apple OS X before 10.10.3, and Apple TV before 7.2 do not properly perform privilege drops, which makes it easier for attackers to execute code with unintended user or group privileges via a crafted app. 2015-04-10 6.9 CVE-2015-1117
CONFIRM
CONFIRM
CONFIRM
SECTRACK
APPLE
APPLE
APPLE
apple — apple_tv libnetcore in Apple iOS before 8.3, Apple OS X before 10.10.3, and Apple TV before 7.2 allows attackers to cause a denial of service (memory corruption and application crash) via a crafted configuration profile. 2015-04-10 5.0 CVE-2015-1118
CONFIRM
CONFIRM
CONFIRM
SECTRACK
APPLE
APPLE
APPLE
apple — apple_tv WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4. 2015-04-10 6.8 CVE-2015-1119
CONFIRM
CONFIRM
CONFIRM
SECTRACK
APPLE
APPLE
APPLE
apple — apple_tv WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4. 2015-04-10 6.8 CVE-2015-1120
CONFIRM
CONFIRM
CONFIRM
SECTRACK
APPLE
APPLE
APPLE
apple — apple_tv WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4. 2015-04-10 6.8 CVE-2015-1121
CONFIRM
CONFIRM
CONFIRM
SECTRACK
APPLE
APPLE
APPLE
apple — apple_tv WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4. 2015-04-10 6.8 CVE-2015-1122
CONFIRM
CONFIRM
CONFIRM
SECTRACK
APPLE
APPLE
APPLE
apple — apple_tv WebKit, as used in Apple iOS before 8.3 and Apple TV before 7.2, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-3 and APPLE-SA-2015-04-08-4. 2015-04-10 6.8 CVE-2015-1123
CONFIRM
CONFIRM
SECTRACK
APPLE
APPLE
apple — apple_tv WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4. 2015-04-10 6.8 CVE-2015-1124
CONFIRM
CONFIRM
CONFIRM
SECTRACK
APPLE
APPLE
APPLE
apple — iphone_os The touch-events implementation in WebKit in Apple iOS before 8.3 allows remote attackers to trigger an association between a tap and an unintended web resource via a crafted web site. 2015-04-10 4.3 CVE-2015-1125
CONFIRM
SECTRACK
APPLE
apple — safari WebKit, as used in Apple iOS before 8.3 and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, does not properly handle the userinfo field in FTP URLs, which allows remote attackers to trigger incorrect resource access via unspecified vectors. 2015-04-10 4.3 CVE-2015-1126
CONFIRM
CONFIRM
SECTRACK
APPLE
APPLE
apple — safari The private-browsing implementation in Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5 allows attackers to obtain sensitive browsing-history information via vectors involving push-notification requests. 2015-04-10 5.0 CVE-2015-1128
CONFIRM
SECTRACK
APPLE
apple — safari Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5 does not properly select X.509 client certificates, which makes it easier for remote attackers to track users via a crafted web site. 2015-04-10 4.3 CVE-2015-1129
CONFIRM
SECTRACK
APPLE
apple — mac_os_x Use-after-free vulnerability in CoreAnimation in Apple OS X before 10.10.3 allows remote attackers to execute arbitrary code by leveraging improper use of a mutex. 2015-04-10 6.8 CVE-2015-1136
CONFIRM
SECTRACK
APPLE
apple — mac_os_x Hypervisor in Apple OS X before 10.10.3 allows local users to cause a denial of service via unspecified vectors. 2015-04-10 4.9 CVE-2015-1138
CONFIRM
SECTRACK
APPLE
apple — mac_os_x ImageIO in Apple OS X before 10.10.3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .sgi file. 2015-04-10 6.8 CVE-2015-1139
CONFIRM
SECTRACK
APPLE
apple — mac_os_x The mach_vm_read functionality in the kernel in Apple OS X before 10.10.3 allows local users to cause a denial of service (system crash) via unspecified vectors. 2015-04-10 4.9 CVE-2015-1141
CONFIRM
SECTRACK
APPLE
apple — mac_os_x Open Directory Client in Apple OS X before 10.10.3 sends unencrypted password-change requests in certain circumstances involving missing certificates, which allows remote attackers to obtain sensitive information by sniffing the network. 2015-04-10 5.0 CVE-2015-1147
CONFIRM
SECTRACK
APPLE
apple — mac_os_x Screen Sharing in Apple OS X before 10.10.3 stores the password of a user in a log file, which might allow context-dependent attackers to obtain sensitive information by reading this file. 2015-04-10 5.0 CVE-2015-1148
CONFIRM
SECTRACK
APPLE
apple — xcode Clang in LLVM, as used in Apple Xcode before 6.3, performs incorrect register allocation in a way that triggers stack storage for stack cookie pointers, which might allow context-dependent attackers to bypass a stack-guard protection mechanism via crafted input to an affected C program. 2015-04-10 5.0 CVE-2015-3027
CONFIRM
SECTRACK
APPLE
blue_coat — malware_analysis_appliance Cross-site scripting (XSS) vulnerability in search.php on the Blue Coat Malware Analysis appliance with software before 4.2.4.20150312-RELEASE allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. 2015-04-16 4.3 CVE-2015-0937
CERT-VN
blue_coat — malware_analysis_appliance search.php on the Blue Coat Malware Analysis appliance with software before 4.2.4.20150312-RELEASE allows remote attackers to bypass intended access restrictions, and list or read arbitrary documents, by providing matching keywords in conjunction with a crafted parameter. 2015-04-16 5.0 CVE-2015-0938
CERT-VN
cisco — asr_9001 Cisco ASR 9000 devices with software 5.3.0.BASE do not recognize that certain ACL entries have a single-host constraint, which allows remote attackers to bypass intended network-resource access restrictions by using an address that was not supposed to have been allowed, aka Bug ID CSCur28806. 2015-04-10 5.0 CVE-2015-0694
SECTRACK
CISCO
cisco — telepresence_tc_software Cross-site scripting (XSS) vulnerability in the login page in Cisco TC Software before 7.1.0 on Cisco TelePresence Collaboration Desk and Room Endpoints devices allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCuq94977. 2015-04-15 4.3 CVE-2015-0696
CISCO
cisco — telepresence_tc_software Open redirect vulnerability in the login page in Cisco TC Software before 6.3-26 and 7.x before 7.3.0 on Cisco TelePresence Collaboration Desk and Room Endpoints devices allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors, aka Bug ID CSCuq94980. 2015-04-15 5.8 CVE-2015-0697
CISCO
cisco — web_security_appliance Multiple cross-site scripting (XSS) vulnerabilities in filter search forms in admin web pages on Cisco Web Security Appliance (WSA) devices with software 8.5.0-497 allow remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCut39213. 2015-04-15 4.3 CVE-2015-0698
CISCO
cisco — unified_communications_domain_manager SQL injection vulnerability in the Interactive Voice Response (IVR) component in Cisco Unified Communications Manager (UCM) 10.5(1.98991.13) allows remote attackers to execute arbitrary SQL commands via unspecified vectors, aka Bug ID CSCut21563. 2015-04-15 5.0 CVE-2015-0699
CISCO
cisco — secure_access_control_server Cross-site request forgery (CSRF) vulnerability in the Dashboard page in the monitoring-and-report section in Cisco Secure Access Control Server Solution Engine before 5.5(0.46.5) allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCuj62924. 2015-04-16 6.8 CVE-2015-0700
CISCO
debian — dpkg The dpkg-source command in Debian dpkg before 1.16.16 and 1.17.x before 1.17.25 allows remote attackers to bypass signature verification via a crafted Debian source control file (.dsc). 2015-04-13 4.3 CVE-2015-0840
UBUNTU
DEBIAN
digium — asterisk Asterisk Open Source 1.8 before 1.8.32.3, 11.x before 11.17.1, 12.x before 12.8.2, and 13.x before 13.3.2 and Certified Asterisk 1.8.28 before 1.8.28-cert5, 11.6 before 11.6-cert11, and 13.1 before 13.1-cert2, when registering a SIP TLS device, does not properly handle a null byte in a domain name in the subject’s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. 2015-04-10 4.3 CVE-2015-3008
SECTRACK
BUGTRAQ
FULLDISC
MISC
CONFIRM
facebook — hiphop_virtual_machine Cross-site scripting (XSS) vulnerability in the WddxPacket::recursiveAddVar function in HHVM (aka the HipHop Virtual Machine) before 3.5.0 allows remote attackers to inject arbitrary web script or HTML via a crafted string to the wddx_serialize_value function. 2015-04-13 4.3 CVE-2014-9714
CONFIRM
MLIST
CONFIRM
CONFIRM
MLIST
MLIST
fiyo — fiyo_cms Multiple cross-site scripting (XSS) vulnerabilities in Fiyo CMS 2.0.1.8 allow remote attackers to inject arbitrary web script or HTML via the (1) view, (2) id, (3) page, or (4) app parameter to the default URI or the (5) act parameter to dapur/index.php. 2015-04-14 4.3 CVE-2014-9146
MISC
fortinet — fortimail FortiMail 5.0.3 through 5.2.3 allows remote administrators to obtain credentials via the “diag debug application httpd” command. 2015-04-14 4.0 CVE-2015-3293
CONFIRM
glpi-project — glpi GLPI before 0.84.7 does not properly restrict access to cost information, which allows remote attackers to obtain sensitive information via the cost criteria in the search bar. 2015-04-14 5.0 CVE-2014-5032
CONFIRM
MANDRIVA
CONFIRM
CONFIRM
hotspot_express — hotex_billing_manager Cross-site scripting (XSS) vulnerability in cgi-bin/hotspotlogin.cgi in Hotspot Express hotEx Billing Manager 73 allows remote attackers to inject arbitrary web script or HTML via the reply parameter. 2015-04-14 4.3 CVE-2015-2781
BUGTRAQ
FULLDISC
MISC
hotspotexpress — hotex_billing_manager Hotspot Express hotEx Billing Manager 73 does not include the HTTPOnly flag in a Set-Cookie header, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie. 2015-04-16 5.0 CVE-2015-3319
BUGTRAQ
FULLDISC
MISC
hp — support_solution_framework HP Support Solution Framework before 11.51.0049 allows remote attackers to download an arbitrary program onto a client machine and execute this program via unspecified vectors. 2015-04-14 6.8 CVE-2015-2114
HP
juniper — junos Juniper Junos 12.1X44 before 12.1X44-D45, 12.1X46 before 12.1X46-D30, 12.1X47 before 12.1X47-D15, and 12.3X48 before 12.3X48-D10 on SRX series devices does not properly enforce the log-out-on-disconnect feature when configured in the [system port console] stanza, which allows physically proximate attackers to reconnect to the console port and gain administrative access by leveraging access to the device. 2015-04-10 6.9 CVE-2015-3002
CONFIRM
SECTRACK
juniper — junos J-Web in Juniper Junos 11.4 before 11.4R12, 12.1X44 before 12.1X44-D35, 12.1X46 before 12.1X46-D25, 12.1X47 before 12.1X47-D10, 12.3X48 before 12.3X48-D10, 12.2 before 12.2R9, 12.3 before 12.3R7, 13.2 before 13.2R6, 13.2X51 before 13.2X51-D20, 13.3 before 13.3R5, 14.1 before 14.1R3, 14.1X53 before 14.1X53-D10, and 14.2 before 14.2R1 allows remote attackers to conduct clickjacking attacks via an X-Frame-Options header. 2015-04-10 4.3 CVE-2015-3004
CONFIRM
SECTRACK
juniper — junos Cross-site scripting (XSS) vulnerability in the Dynamic VPN in Juniper Junos 12.1X44 before 12.1X44-D45, 12.1X46 before 12.1X46-D30, 12.1X47 before 12.1X47-D20, and 12.3X48 before 12.3X48-D10 on SRX series devices allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. 2015-04-10 4.3 CVE-2015-3005
CONFIRM
SECTRACK
kanaka — novnc noVNC before 0.5 does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. 2015-04-10 4.3 CVE-2013-7436
CONFIRM
CONFIRM
MLIST
MLIST
REDHAT
lhaplus — lhaplus Directory traversal vulnerability in Lhaplus before 1.70 allows remote attackers to write to arbitrary files via a crafted archive. 2015-04-15 5.8 CVE-2015-0906
CONFIRM
JVNDB
JVN
CONFIRM
lhaplus — lhaplus Buffer overflow in Lhaplus before 1.70 allows remote attackers to execute arbitrary code via a crafted archive. 2015-04-15 6.8 CVE-2015-0907
CONFIRM
JVNDB
JVN
CONFIRM
mediawiki — mediawiki Incomplete blacklist vulnerability in includes/upload/UploadBase.php in MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 allows remote attackers to inject arbitrary web script or HTML via an application/xml MIME type for a nested SVG with a data: URI. 2015-04-13 4.3 CVE-2015-2931
MLIST
CONFIRM
MLIST
MLIST
MANDRIVA
mediawiki — mediawiki Incomplete blacklist vulnerability in MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 allows remote attackers to inject arbitrary web script or HTML via an animated href XLink element. 2015-04-13 4.3 CVE-2015-2932
MLIST
CONFIRM
MLIST
MLIST
MANDRIVA
mediawiki — mediawiki Cross-site scripting (XSS) vulnerability in the Html class in MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 allows remote attackers to inject arbitrary web script or HTML via a LanguageConverter substitution string when using a language variant. 2015-04-13 4.3 CVE-2015-2933
CONFIRM
MLIST
MLIST
MLIST
MANDRIVA
mediawiki — mediawiki MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 does not properly handle when the Zend interpreter xml_parse function does not expand entities, which allows remote attackers to inject arbitrary web script or HTML via a crafted SVG file. 2015-04-13 4.3 CVE-2015-2934
MLIST
CONFIRM
MLIST
MLIST
MANDRIVA
mediawiki — mediawiki MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 allows remote attackers to bypass the SVG filtering and obtain sensitive user information via a mixed case @import in a style element in an SVG file, as demonstrated by “@imporT.” 2015-04-13 5.0 CVE-2015-2935
MLIST
CONFIRM
MLIST
MLIST
MANDRIVA
mediawiki — mediawiki Cross-site scripting (XSS) vulnerability in MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 allows remote attackers to inject arbitrary web script or HTML via a custom JavaScript file, which is not properly handled when previewing the file. 2015-04-13 4.3 CVE-2015-2938
MLIST
CONFIRM
MLIST
MLIST
MANDRIVA
mediawiki — scribunto Cross-site scripting (XSS) vulnerability in the Scribunto extension for MediaWiki allows remote attackers to inject arbitrary web script or HTML via a function name, which is not properly handled in a Lua error backtrace. 2015-04-13 4.3 CVE-2015-2939
MLIST
CONFIRM
MLIST
MLIST
MANDRIVA
mediawiki — checkuser Cross-site request forgery (CSRF) vulnerability in the CheckUser extension for MediaWiki allows remote attackers to hijack the authentication of certain users for requests that retrieve sensitive user information via unspecified vectors. 2015-04-13 6.8 CVE-2015-2940
MLIST
CONFIRM
MLIST
MLIST
MANDRIVA
mediawiki — mediawiki Cross-site scripting (XSS) vulnerability in MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2, when using HHVM, allows remote attackers to inject arbitrary web script or HTML via an invalid parameter in a wddx format request to api.php, which is not properly handled in an error message, related to unsafe calls to wddx_serialize_value. 2015-04-13 4.3 CVE-2015-2941
MLIST
CONFIRM
MLIST
MLIST
microsoft — windows_server_2012 Microsoft Active Directory Federation Services (AD FS) 3.0 on Windows Server 2012 R2 does not properly handle logoff actions, which allows remote attackers to bypass intended access restrictions by leveraging an unattended workstation, aka “Active Directory Federation Services Information Disclosure Vulnerability.” 2015-04-14 5.8 CVE-2015-1638
MS
microsoft — office Cross-site scripting (XSS) vulnerability in Microsoft Office for Mac 2011 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka “Microsoft Outlook App for Mac XSS Vulnerability.” 2015-04-14 4.3 CVE-2015-1639
MS
microsoft — project_server Cross-site scripting (XSS) vulnerability in Microsoft Project Server 2010 SP2 and 2013 SP1 allows remote attackers to inject arbitrary web script or HTML via a crafted request, aka “Microsoft SharePoint XSS Vulnerability.” 2015-04-14 4.3 CVE-2015-1640
MS
microsoft — xml_core_services Microsoft XML Core Services (aka MSXML) 3.0 allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted DTD, aka “MSXML3 Same Origin Policy SFB Vulnerability.” 2015-04-14 4.3 CVE-2015-1646
MS
microsoft — sharepoint_foundation Cross-site scripting (XSS) vulnerability in Microsoft SharePoint Foundation 2013 SP1 and SharePoint Server 2013 SP1 allows remote attackers to inject arbitrary web script or HTML via a crafted request, aka “Microsoft SharePoint XSS Vulnerability.” 2015-04-14 4.3 CVE-2015-1653
MS
microsoft — internet_explorer Microsoft Internet Explorer 6 through 11 allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka “Internet Explorer ASLR Bypass Vulnerability.” 2015-04-14 4.3 CVE-2015-1661
MS
mysql — mysql Unspecified vulnerability in the MySQL Connectors component in Oracle MySQL 5.1.34 and earlier allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Connector/J. 2015-04-16 4.9 CVE-2015-2575
CONFIRM
oracle — mysql Unspecified vulnerability in Oracle MySQL Server 5.6.22 and earlier allows remote authenticated users to affect availability via unknown vectors related to XA. 2015-04-16 4.0 CVE-2015-0405
CONFIRM
oracle — mysql Unspecified vulnerability in Oracle MySQL Server 5.6.22 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer. 2015-04-16 4.0 CVE-2015-0423
CONFIRM
oracle — mysql Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via vectors related to InnoDB : DML. 2015-04-16 4.0 CVE-2015-0433
CONFIRM
oracle — mysql Unspecified vulnerability in Oracle MySQL Server 5.6.22 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition. 2015-04-16 4.0 CVE-2015-0438
CONFIRM
oracle — mysql Unspecified vulnerability in Oracle MySQL Server 5.6.22 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB. 2015-04-16 4.0 CVE-2015-0439
CONFIRM
oracle — right_now_service_cloud Unspecified vulnerability in the Oracle Knowledge component in Oracle Right Now Service Cloud 8.2.3.10.1 and 8.4.7.2 allows remote attackers to affect integrity via unknown vectors related to Information Manager Console. 2015-04-16 5.0 CVE-2015-0440
CONFIRM
oracle — mysql Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Encryption. 2015-04-16 4.0 CVE-2015-0441
CONFIRM
oracle — e-business_suite Unspecified vulnerability in the Oracle Applications Technology Stack component in Oracle E-Business Suite 11.5.10.2, 12.0.6, 12.1.3, 12.2.3, and 12.2.4 allows remote attackers to affect confidentiality via vectors related to Configurator DMZ rules. 2015-04-16 4.3 CVE-2015-0447
CONFIRM
oracle — fusion_middleware Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0, 12.1.1.0, and 12.1.2.0 allows remote attackers to affect integrity via unknown vectors related to Console. 2015-04-16 5.0 CVE-2015-0449
CONFIRM
oracle — fusion_middleware Unspecified vulnerability in the Oracle WebCenter Portal component in Oracle Fusion Middleware 11.1.1.8.0 allows remote attackers to affect integrity via unknown vectors related to WebCenter Spaces Application. 2015-04-16 4.3 CVE-2015-0450
CONFIRM
oracle — vm_server Unspecified vulnerability in the Oracle VM Server for SPARC component in Oracle Sun Systems Products Suite 3.1 and 3.2 allows remote attackers to affect confidentiality via unknown vectors related to Ldom Manager. 2015-04-16 4.3 CVE-2015-0452
CONFIRM
oracle — database_server Unspecified vulnerability in the XDB – XML Database component in Oracle Database Server 11.2.0.3, 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote authenticated users to affect confidentiality via unknown vectors. 2015-04-16 6.8 CVE-2015-0455
CONFIRM
oracle — fusion_middleware Unspecified vulnerability in the Oracle WebCenter Portal component in Oracle Fusion Middleware 11.1.1.8.0 allows remote attackers to affect integrity via unknown vectors related to Portlet Services. 2015-04-16 4.3 CVE-2015-0456
CONFIRM
oracle — supply_chain_products_suite Unspecified vulnerability in the Oracle Transportation Management component in Oracle Supply Chain Products Suite 6.1, 6.2, 6.3.0, 6.3.1, 6.3.2, 6.3.3, 6.3.4, 6.3.5, and 6.3.6 allows remote authenticated users to affect confidentiality via unknown vectors related to Security. 2015-04-16 4.0 CVE-2015-0462
CONFIRM
oracle — supply_chain_products_suite Unspecified vulnerability in the Oracle Transportation Management component in Oracle Supply Chain Products Suite 6.2, 6.3.0, 6.3.1, 6.3.2, 6.3.3, 6.3.4, 6.3.5, and 6.3.6 allows remote authenticated users to affect confidentiality via unknown vectors related to Security. 2015-04-16 4.0 CVE-2015-0463
CONFIRM
oracle — supply_chain_products_suite Unspecified vulnerability in the Oracle Transportation Management component in Oracle Supply Chain Products Suite 6.1, 6.2, 6.3.0, 6.3.1, 6.3.2, 6.3.3, 6.3.4, 6.3.5, and 6.3.6 allows remote attackers to affect confidentiality via unknown vectors related to Security. 2015-04-16 5.0 CVE-2015-0464
CONFIRM
oracle — supply_chain_products_suite Unspecified vulnerability in the Oracle Transportation Management component in Oracle Supply Chain Products Suite 6.1, 6.2, 6.3.0, 6.3.1, 6.3.2, 6.3.3, 6.3.4, 6.3.5, and 6.3.6 allows remote authenticated users to affect confidentiality via unknown vectors related to UI Infrastructure. 2015-04-16 4.0 CVE-2015-0465
CONFIRM
oracle — retail_applications Unspecified vulnerability in the Oracle Retail Back Office component in Oracle Retail Applications 12.0, 12.0IN, 13.0, 13.1, 13.2, 13.3, 13.4, 14.0, and 14.1 allows remote attackers to affect integrity via unknown vectors. 2015-04-16 4.3 CVE-2015-0466
CONFIRM
oracle — jdk Unspecified vulnerability in Oracle Java SE 8u40 allows remote attackers to affect integrity via unknown vectors related to Hotspot. 2015-04-16 4.3 CVE-2015-0470
CONFIRM
oracle — solaris Unspecified vulnerability in Oracle Sun Solaris 10 and 11.2 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to libelfsign. 2015-04-16 4.4 CVE-2015-0471
CONFIRM
oracle — enterprise_manager_grid_control Unspecified vulnerability in the Enterprise Manager Base Platform component in Oracle Enterprise Manager Grid Control MOS 12.1.0.5 and 12.1.0.6 allows remote attackers to affect integrity via unknown vectors related to My Oracle Support Plugin. 2015-04-16 4.3 CVE-2015-0473
CONFIRM
oracle — jd_edwards_products Unspecified vulnerability in the JD Edwards EnterpriseOne Technology component in Oracle JD Edwards Products 9.1 allows remote authenticated users to affect confidentiality via unknown vectors related to Web Runtime Security. 2015-04-16 4.0 CVE-2015-0475
CONFIRM
oracle — sql_trace_analyzer Unspecified vulnerability in the SQL Trace Analyzer component in Oracle Support Tools before 12.1.11 allows remote authenticated users to affect confidentiality and integrity via unknown vectors. 2015-04-16 5.5 CVE-2015-0476
CONFIRM
oracle — jdk Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect integrity via unknown vectors related to Beans. 2015-04-16 4.3 CVE-2015-0477
CONFIRM
oracle — jdk Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and JRockit R28.3.5, allows remote attackers to affect confidentiality via vectors related to JCE. 2015-04-16 4.3 CVE-2015-0478
CONFIRM
oracle — database_server Unspecified vulnerability in the XDK and XDB – XML Database component in Oracle Database Server 11.2.0.3, 11.2.0.4, and 12.1.0.1 allows remote authenticated users to affect availability via unknown vectors. 2015-04-16 4.0 CVE-2015-0479
CONFIRM
oracle — jdk Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect integrity and availability via unknown vectors related to Tools. 2015-04-16 5.8 CVE-2015-0480
CONFIRM
oracle — fusion_middleware Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 12.1.2.0 and 12.1.3.0 allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to WLS-WebServices. 2015-04-16 6.0 CVE-2015-0482
CONFIRM
oracle — database_server Unspecified vulnerability in the Core RDBMS component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote authenticated users to affect integrity via unknown vectors. 2015-04-16 4.0 CVE-2015-0483
CONFIRM
oracle — javafx Unspecified vulnerability in Oracle Java SE 7u76 and 8u40, and Java FX 2.2.76, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2015-0492. 2015-04-16 6.8 CVE-2015-0484
CONFIRM
oracle — jdk Unspecified vulnerability in Oracle Java SE 8u40 allows remote attackers to affect confidentiality via unknown vectors related to Deployment. 2015-04-16 5.0 CVE-2015-0486
CONFIRM
oracle — peoplesoft_products Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.53 and 8.54 allows remote authenticated users to affect integrity via vectors related to PIA Core Technology, a different vulnerability than CVE-2015-0472. 2015-04-16 4.0 CVE-2015-0487
CONFIRM
oracle — jdk Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and JRockit R28.3.5, allows remote attackers to affect availability via vectors related to JSSE. 2015-04-16 5.0 CVE-2015-0488
CONFIRM
oracle — supply_chain_products_suite Unspecified vulnerability in the Oracle Agile Engineering Data Management component in Oracle Supply Chain Products Suite 6.1.3.0 allows remote authenticated users to affect confidentiality and integrity via vectors related to BAS – Base Component. 2015-04-16 4.9 CVE-2015-0490
CONFIRM
oracle — retail_applications Unspecified vulnerability in the Oracle Retail Central Office component in Oracle Retail Applications 13.1, 13.2, 13.3, 13.4, 14.0, and 14.1 allows remote attackers to affect integrity via unknown vectors. 2015-04-16 4.3 CVE-2015-0494
CONFIRM
oracle — peoplesoft_products Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.53 and 8.54 allows remote authenticated users to affect confidentiality via vectors related to PIA Search Functionality. 2015-04-16 4.0 CVE-2015-0496
CONFIRM
oracle — peoplesoft_products Unspecified vulnerability in the PeopleSoft Enterprise Portal Interaction Hub component in Oracle PeopleSoft Products 9.1.00 allows remote attackers to affect integrity via unknown vectors related to Enterprise Portal. 2015-04-16 4.3 CVE-2015-0497
CONFIRM
oracle — mysql Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors. 2015-04-16 4.0 CVE-2015-0500
CONFIRM
oracle — mysql Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Compiling. 2015-04-16 5.7 CVE-2015-0501
CONFIRM
oracle — siebel_crm Unspecified vulnerability in the Siebel UI Framework component in Oracle Siebel CRM 8.1 and 8.2 allows remote attackers to affect integrity via unknown vectors related to Portal Framework. 2015-04-16 4.3 CVE-2015-0502
CONFIRM
oracle — mysql Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition. 2015-04-16 4.0 CVE-2015-0503
CONFIRM
oracle — mysql Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB, a different vulnerability than CVE-2015-0506. 2015-04-16 4.0 CVE-2015-0508
CONFIRM
oracle — hyperion Unspecified vulnerability in the Oracle Hyperion BI+ component in Oracle Hyperion 11.1.2.2 and 11.1.2.3 allows remote attackers to affect integrity via unknown vectors related to Reporting and Analysis. 2015-04-16 4.3 CVE-2015-0509
CONFIRM
oracle — commerce_platform Unspecified vulnerability in the Oracle Commerce Platform component in Oracle Commerce Platform 9.4, 10.0, and 10.2 allows remote attackers to affect integrity via vectors related to Dynamo Application Framework – HTML Admin User Interface. 2015-04-16 4.3 CVE-2015-0510
CONFIRM
oracle — e-business_suite Unspecified vulnerability in the Oracle Installed Base component in Oracle E-Business Suite 11.5.10.2, 12.0.4, 12.0.6, 12.1.1, 12.1.2, and 12.1.3 allows remote attackers to affect integrity via unknown vectors related to Create Item Instance. 2015-04-16 4.3 CVE-2015-2565
CONFIRM
oracle — mysql Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote attackers to affect availability via unknown vectors related to Server : Security : Privileges. 2015-04-16 5.0 CVE-2015-2568
CONFIRM
oracle — supply_chain_products_suite Unspecified vulnerability in the Oracle Demand Planning component in Oracle Supply Chain Products Suite 11.5.10, 12.0, 12.1, and 12.2 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Security. 2015-04-16 6.5 CVE-2015-2570
CONFIRM
oracle — mysql Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer. 2015-04-16 4.0 CVE-2015-2571
CONFIRM
oracle — hyperion_smart_view_for_office Unspecified vulnerability in the Oracle Hyperion Smart View for Office component in Oracle Hyperion 11.1.2.x, when running on Windows, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Core. 2015-04-16 4.6 CVE-2015-2572
CONFIRM
oracle — mysql Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via vectors related to DDL. 2015-04-16 4.0 CVE-2015-2573
CONFIRM
palo_alto_networks — traps Multiple cross-site scripting (XSS) vulnerabilities in Palo Alto Networks Traps (formerly Cyvera Endpoint Protection) 3.1.2.1546 allow remote attackers to inject arbitrary web script or HTML via the (1) Arguments, (2) FileName, or (3) URL parameter in a SOAP request. 2015-04-14 4.3 CVE-2015-2223
MISC
quassel-irc — quassel Stack consumption vulnerability in the message splitting functionality in Quassel before 0.12-rc1 allows remote attackers to cause a denial of service (uncontrolled recursion) via a crafted massage. 2015-04-10 5.0 CVE-2015-2779
CONFIRM
MLIST
MLIST
MLIST
SUSE
tuxfamily — chrony Heap-based buffer overflow in chrony before 1.31.1 allows remote authenticated users to cause a denial of service (chronyd crash) or possibly execute arbitrary code by configuring the (1) NTP or (2) cmdmon access with a subnet size that is indivisible by four and an address with a nonzero bit in the subnet remainder. 2015-04-16 6.5 CVE-2015-1821
MLIST
DEBIAN
tuxfamily — chrony chrony before 1.31.1 does not initialize the last “next” pointer when saving unacknowledged replies to command requests, which allows remote authenticated users to cause a denial of service (uninitialized pointer dereference and daemon crash) or possibly execute arbitrary code via a large number of command requests. 2015-04-16 6.5 CVE-2015-1822
MLIST
DEBIAN
wesnoth — battle_for_wesnoth The WML/Lua API in Battle for Wesnoth 1.7.x through 1.11.x and 1.12.x before 1.12.2 allows remote attackers to read arbitrary files via a crafted (1) campaign or (2) map file. 2015-04-14 5.0 CVE-2015-0844
DEBIAN
CONFIRM
CONFIRM
zoneo-soft — phptraffica Cross-site scripting (XSS) vulnerability in Php/stats/statsRecent.inc.php in phpTrafficA 2.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the HTTP User-Agent header to index.php. 2015-04-14 4.3 CVE-2015-2926
BUGTRAQ
MISC

Back to top

Low Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
apple — iphone_os AppleKeyStore in Apple iOS before 8.3 does not properly restrict a certain passcode-confirmation interface, which makes it easier for attackers to verify correct passcode guesses via a crafted app. 2015-04-10 1.9 CVE-2015-1085
CONFIRM
SECTRACK
APPLE
apple — iphone_os Directory traversal vulnerability in Backup in Apple iOS before 8.3 allows attackers to read arbitrary files via a crafted relative path. 2015-04-10 2.1 CVE-2015-1087
CONFIRM
SECTRACK
APPLE
apple — apple_tv IOAcceleratorFamily in Apple iOS before 8.3 and Apple TV before 7.2 allows attackers to obtain sensitive information about kernel memory via a crafted app. 2015-04-10 1.9 CVE-2015-1094
CONFIRM
CONFIRM
SECTRACK
APPLE
APPLE
apple — apple_tv IOHIDFamily in Apple iOS before 8.3, Apple OS X before 10.10.3, and Apple TV before 7.2 allows attackers to obtain sensitive information about kernel memory via a crafted app. 2015-04-10 1.9 CVE-2015-1096
CONFIRM
CONFIRM
CONFIRM
SECTRACK
APPLE
APPLE
APPLE
apple — apple_tv IOMobileFramebuffer in Apple iOS before 8.3 and Apple TV before 7.2 allows attackers to obtain sensitive information about kernel memory via a crafted app. 2015-04-10 1.9 CVE-2015-1097
CONFIRM
CONFIRM
SECTRACK
APPLE
APPLE
apple — iphone_os The QuickType feature in the Keyboards subsystem in Apple iOS before 8.3 allows physically proximate attackers to discover passcodes by reading the lock screen during use of a Bluetooth keyboard. 2015-04-10 2.1 CVE-2015-1106
CONFIRM
SECTRACK
APPLE
apple — iphone_os The Lock Screen component in Apple iOS before 8.3 does not properly implement the erasure feature for incorrect passcode-authentication attempts, which makes it easier for physically proximate attackers to obtain access by making many passcode guesses. 2015-04-10 1.9 CVE-2015-1107
CONFIRM
SECTRACK
APPLE
apple — iphone_os The Lock Screen component in Apple iOS before 8.3 does not properly enforce the limit on incorrect passcode-authentication attempts, which makes it easier for physically proximate attackers to obtain access by making many passcode guesses. 2015-04-10 2.1 CVE-2015-1108
CONFIRM
SECTRACK
APPLE
apple — iphone_os NetworkExtension in Apple iOS before 8.3 stores credentials in VPN configuration logs, which makes it easier for physically proximate attackers to obtain sensitive information by reading a log file. 2015-04-10 2.1 CVE-2015-1109
CONFIRM
SECTRACK
APPLE
apple — iphone_os The Sandbox Profiles component in Apple iOS before 8.3 allows attackers to read the (1) telephone number or (2) e-mail address of a recent contact via a crafted app. 2015-04-10 1.9 CVE-2015-1113
CONFIRM
SECTRACK
APPLE
apple — apple_tv The Sandbox Profiles component in Apple iOS before 8.3 and Apple TV before 7.2 allows attackers to discover hardware identifiers via a crafted app. 2015-04-10 1.9 CVE-2015-1114
CONFIRM
CONFIRM
SECTRACK
APPLE
APPLE
apple — iphone_os The UIKit View component in Apple iOS before 8.3 displays unblurred application snapshots in the Task Switcher, which makes it easier for physically proximate attackers to obtain sensitive information by reading the device screen. 2015-04-10 2.1 CVE-2015-1116
CONFIRM
SECTRACK
APPLE
apple — safari The private-browsing implementation in WebKit in Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5 places browsing history into an index, which might allow local users to obtain sensitive information by reading index entries. 2015-04-10 2.1 CVE-2015-1127
CONFIRM
SECTRACK
APPLE
apple — mac_os_x LaunchServices in Apple OS X before 10.10.3 allows local users to cause a denial of service (Finder crash) via crafted localization data. 2015-04-10 2.1 CVE-2015-1142
CONFIRM
SECTRACK
APPLE
apple — mac_os_x The Code Signing implementation in Apple OS X before 10.10.3 does not properly validate signatures, which allows local users to bypass intended access restrictions via a crafted bundle, a different vulnerability than CVE-2015-1146. 2015-04-10 1.9 CVE-2015-1145
CONFIRM
SECTRACK
APPLE
apple — mac_os_x The Code Signing implementation in Apple OS X before 10.10.3 does not properly validate signatures, which allows local users to bypass intended access restrictions via a crafted bundle, a different vulnerability than CVE-2015-1145. 2015-04-10 1.9 CVE-2015-1146
CONFIRM
SECTRACK
APPLE
lixil — my_satis_genius_toilet The LIXIL Corporation My SATIS Genius Toilet application for Android has a hardcoded Bluetooth PIN, which allows physically proximate attackers to trigger physical resource consumption (water or heat) or user discomfort. 2015-04-16 3.3 CVE-2013-4866
MISC
MISC
MISC
FULLDISC
MISC
MISC
microsoft — windows_8.1 Virtual Machine Manager (VMM) in Hyper-V in Microsoft Windows 8.1 and Windows Server 2012 R2 allows guest OS users to cause a denial of service (VMM functionality loss) via a crafted application, aka “Windows Hyper-V DoS Vulnerability.” 2015-04-14 2.1 CVE-2015-1647
MS
microsoft — .net_framework ASP.NET in Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2, when the customErrors configuration is disabled, allows remote attackers to obtain sensitive configuration-file information via a crafted request, aka “ASP.NET Information Disclosure Vulnerability.” 2015-04-14 2.6 CVE-2015-1648
MS
oracle — fusion_middleware Unspecified vulnerability in the Oracle OpenSSO component in Oracle Fusion Middleware 3.0-04 allows remote authenticated users to affect confidentiality via vectors related to OpenSSO Web Agents. 2015-04-16 3.5 CVE-2015-0451
CONFIRM
oracle — peoplesoft_products Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.53 and 8.54 allows remote attackers to affect confidentiality via vectors related to PORTAL. 2015-04-16 3.3 CVE-2015-0453
CONFIRM
oracle — peoplesoft_products Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.53 and 8.54 allows remote authenticated users to affect integrity via vectors related to PIA Core Technology, a different vulnerability than CVE-2015-0487. 2015-04-16 3.5 CVE-2015-0472
CONFIRM
oracle — fusion_middleware Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.4.1, 8.5.0, and 8.5.1 allows local users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2015-0493. 2015-04-16 1.5 CVE-2015-0474
CONFIRM
oracle — peoplesoft_products Unspecified vulnerability in the PeopleSoft Enterprise SCM Strategic Sourcing component in Oracle PeopleSoft Products 9.1 and 9.2 allows remote authenticated users to affect confidentiality via unknown vectors related to Security. 2015-04-16 3.5 CVE-2015-0485
CONFIRM
oracle — e-business_suite_amp Unspecified vulnerability in the Application Management Pack for Oracle E-Business Suite component in Oracle E-Business Suite AMP 121030 and 121020 allows local users to affect confidentiality via vectors related to EBS Plugin. 2015-04-16 1.2 CVE-2015-0489
CONFIRM
oracle — fusion_middleware Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.4.1, 8.5.0, and 8.5.1 allows local users to affect availability via unknown vectors related to Outside In Filters, a different vulnerability than CVE-2015-0474. 2015-04-16 1.5 CVE-2015-0493
CONFIRM
oracle — mysql Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Replication. 2015-04-16 1.7 CVE-2015-0498
CONFIRM
oracle — mysql Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Federated. 2015-04-16 3.5 CVE-2015-0499
CONFIRM
oracle — e-business_suite Unspecified vulnerability in the Oracle Application Object Library component in Oracle E-Business Suite 12.0.6 and 12.1.3 allows remote attackers to affect integrity via unknown vectors related to Error Messages. 2015-04-16 2.6 CVE-2015-0504
CONFIRM
oracle — mysql Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via vectors related to DDL. 2015-04-16 3.5 CVE-2015-0505
CONFIRM
oracle — mysql Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB, a different vulnerability than CVE-2015-0508. 2015-04-16 3.5 CVE-2015-0506
CONFIRM
oracle — mysql Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Memcached. 2015-04-16 3.5 CVE-2015-0507
CONFIRM
oracle — mysql Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : SP. 2015-04-16 2.8 CVE-2015-0511
CONFIRM
oracle — mysql Unspecified vulnerability in Oracle MySQL Server 5.6.22 and earlier allows remote authenticated users to affect availability via vectors related to DML. 2015-04-16 2.8 CVE-2015-2566
CONFIRM
oracle — mysql Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Privileges. 2015-04-16 3.5 CVE-2015-2567
CONFIRM
oracle — solaris Unspecified vulnerability in Oracle Sun Solaris 10 allows local users to affect confidentiality via unknown vectors related to Text Utilities. 2015-04-16 2.1 CVE-2015-2574
CONFIRM
oracle — mysql Unspecified vulnerability in the MySQL Utilities component in Oracle MySQL 1.5.1 and earlier, when running on Windows, allows local users to affect integrity via unknown vectors related to Installation. 2015-04-16 2.1 CVE-2015-2576
CONFIRM
oracle — health_sciences_applications Unspecified vulnerability in the Oracle Health Sciences Argus Safety component in Oracle Health Sciences Applications 8.0 allows local users to affect confidentiality via vectors related to BIP Installer. 2015-04-16 2.1 CVE-2015-2579
CONFIRM
shareaholic — shareaholic Cross-site scripting (XSS) vulnerability in admin.php in the Shareaholic plugin before 7.6.1.0 for WordPress allows remote authenticated users to inject arbitrary web script or HTML via the location[id] parameter in a shareaholic_add_location action to wp-admin/admin-ajax.php. 2015-04-14 3.5 CVE-2014-9311
CONFIRM
MISC
MISC
usaa — mobile_banking The USAA Mobile Banking application before 7.10.1 for Android displays the most recently-used screen before prompting the user for login, which might allow physically proximate users to obtain banking account numbers and balances. 2015-04-16 2.1 CVE-2015-1314
FULLDISC
MISC
MISC

Back to top

 


This product is provided subject to this Notification and this Privacy & Use policy.

Oracle Releases April 2015 Security Advisory

Original release date: April 15, 2015 | Last revised: April 16, 2015

Oracle has released security fixes to address 98 vulnerabilities as part of its quarterly Critical Patch Update. Exploitation of some of these vulnerabilities may allow a remote attacker to take control of an affected system.

Users and administrators are encouraged to review the Oracle April 2015 Critical Patch Update and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.

Google Releases Security Update for Chrome

Original release date: April 15, 2015

Google has released Chrome 42.0.2311.90 for Windows, Mac, and Linux to address multiple vulnerabilities. Exploitation of one of these vulnerabilities may allow a remote attacker to take control of an affected system.

US-CERT encourages users and administrators to review the Google Chrome blog entry and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.

TA15-105A: Simda Botnet

Original release date: April 15, 2015

Systems Affected

Microsoft Windows

Overview

The Simda botnet – a network of computers infected with self-propagating malware – has compromised more than 770,000 computers worldwide [1].

The United States Department of Homeland Security (DHS), in collaboration with Interpol and the Federal Bureau of Investigation (FBI), has released this Technical Alert to provide further information about the Simda botnet, along with prevention and mitigation recommendations.

Description

Since 2009, cyber criminals have been targeting computers with unpatched software and compromising them with Simda malware [2]. This malware may re-route a user’s Internet traffic to websites under criminal control or can be used to install additional malware. 

The malicious actors control the network of compromised systems (botnet) through backdoors, giving them remote access to carry out additional attacks or to “sell” control of the botnet to other criminals [1]. The backdoors also morph their presence every few hours, allowing low anti-virus detection rates and the means for stealthy operation [3].    

Impact

A system infected with Simda may allow cyber criminals to harvest user credentials, including banking information; install additional malware; or cause other malicious attacks. The breadth of infected systems allows Simda operators flexibility to load custom features tailored to individual targets.

Solution

Users are recommended to take the following actions to remediate Simda infections:

  • Use and maintain anti-virus software – Anti-virus software recognizes and protects your computer against most known viruses. It is important to keep your anti-virus software up-to-date (see Understanding Anti-Virus Software for more information).
  • Change your passwords – Your original passwords may have been compromised during the infection, so you should change them (see Choosing and Protecting Passwords for more information).
  • Keep your operating system and application software up-to-date – Install software patches so that attackers cannot take advantage of known problems or vulnerabilities. Many operating systems offer automatic updates. If this option is available, you should enable it (see Understanding Patches for more information).
  • Use anti-malware tools – Using a legitimate program that identifies and removes malware can help eliminate an infection. Users can consider employing a remediation tool (examples below) that will help with the removal of Simda from your system.

          Kaspersky Lab : http://www.kaspersky.com/security-scan

          Microsoft: http://www.microsoft.com/security/scanner/en-us/default.aspx

          Trend Micro: http://housecall.trendmicro.com/

  • Check to see if your system is infected – The link below offers a simplified check for beginners and a manual check for experts.

          Cyber Defense Institute:  http://www.cyberdefense.jp/simda/

The above are examples only and do not constitute an exhaustive list. The U.S. government does not endorse or support any particular product or vendor.

References

Revision History

  • April 15, 2015: Initial Release

This product is provided subject to this Notification and this Privacy & Use policy.