Vulnerability Summary for the Week of January 5, 2014

Vulnerability Summary for the Week of January 5, 2014

Vulnerability Summary for the Week of January 5, 2014 Please Note: • The vulnerabilities are cattegorized by their level of severity which is either High, Medium or Low. • The !" indentity number is the #ublicly $nown %& given to that #articular vulnerability. Therefore you can search the status of that #articular vulnerability using that %&. • The !'S (Common !ulnerability 'coring System) score is a standard scoring system used to determine the severity of the vulnerability. High Severity Vulnerabilities The Primary Vendor --- Description Date CVSS The CVE Product Published Score Identity a*a+,#ost,search,#roject 'QL in*ection vulnerability in the 2015-01-07 7.5 CVE-2012-5853 CONFIRM -- a*a+,#ost,search /the,search,function/ function in BUGTRAQ cardoza,a*a+,search.#h# in the 0102 Post 'earch (cardoza-a*a+-search) #lugin before 3.3 for 5ordPress allows remote attac$ers to e+ecute arbitrary 'QL commands via the srch,t+t #arameter in a /the,search,te+t/ action to wp-admin6admin-a*a+.ph#. asus -- wrt,firmware common.c in infosvr in 0'7' 58T firmware 2015-01-08 10.0 CVE-2014-9583 MISC (link is 4.9.0.4.3;<,39;3, 4.0.0.3;<.=>=:-g9934f>=, and external) other versions, as used in 8T-0 <<7, 8T-N6<7, EXPLOIT-DB and other routers, does not #roperly chec$ the (link is external) MISC (link is M0 address for a re?uest, which allows remote external) attac$ers to by#ass authentication and e+ecute arbitrary commands via a NET, M&,%&,M0NU, MD #ac$et to 7DP #ort @@@@. NOTE: this issue was incorrectly ma##ed to !"-=93:-39999, but that %D is invalid due to its use as an e+am#le of the =93: !E %D synta+ change. basic-cms -- sweetrice Multi#le 'QL in*ection vulnerabilities in 2015-01-03 7.5 CVE-2010-5317 MISC (link is inde+.ph# in 'weet8ice M' before 9.<.7.1 allow external) remote attac$ers to e+ecute arbitrary 'QL commands via (3) the file,name #arameter in an attachment action, (=) the #ost #arameter in a show_comment action, (4) the sys-name #arameter in an rssfeed action, or (:) the sys- name #arameter in a view action. cts,#rojectsBsoftware -- 'QL in*ection vulnerability in showads.ph# in 2015-01-02 7.5 CVE-2014-9455 MISC (link is classad T' Pro*ects B 'oftware lass0d 4.0 allows external) remote attac$ers to e+ecute arbitrary 'QL commands via the catid #arameter. debian -- mime-su##ort run-mailca# in the Debian mime-su##ort 2015-01-06 7.5 CVE-2014-7209 XF (link is #ac$age before 4.5=-3Cdeb;u3 allows conte+t- external) de#endent attac$ers to e+ecute arbitrary BID (link is commands via shell metacharacters in a external) MLIST (link is filename. external) SECUNIA (link is external) deliciousdays -- cformsii 7nrestricted file u#load vulnerability in 2015-01-07 7.5 CVE-2014-9473 CONFIRM lib,nona*a+.ph# in the forms%% #lugin 3:.7 and BUGTRAQ earlier for 5ordPress allows remote attac$ers to (link is external) e+ecute arbitrary code by u#loading a file with an e+ecutable e+tension via the cf,u#loadfile=DE #arameter, then accessing the file via a direct re?uest to the file in the default u#load directory. don,ho -- note#ad+C Fuffer overflow in NotePad+C <.6.@ allows 2015-01-02 10.0 CVE-2014-9456 EXPLOIT-DB remote attac$ers to have uns#ecified im#act via (link is external) a long Time attribute in an Event element in an 2ML file. NOTE: this issue was originally incorrectly ma##ed to !"-=93:-399:G see !"- =93:-399: for more information. he+-rays -- ida Hea#-based buffer overflow in the H&F 2015-01-02 10.0 CVE-2014-9458 SECUNIA (link debugger module in He+-8ays %&0 Pro before <.6 is external) cumulative fi+ =93:-3=-=: allows remote H&F servers to have uns#ecified im#act via un$nown vectors. humhub -- humhub 'QL in*ection vulnerability in the action%nde+ 2015-01-06 7.5 CVE-2014-9528 CONFIRM (link function in is external) #rotected/modules,core6notification6controllers XF (link is 6List ontroller.ph# in HumHub 9.19.0-rc.1 and external) EXPLOIT-DB earlier allows remote authenticated users to (link is external) e+ecute arbitrary 'QL commands via the from FULLDISC #arameter to inde+.ph#. NOTE: this can be MISC (link is leveraged for cross-site scri#ting (2'') attac$s external) via a re?uest that causes an error. infinitewp -- 'QL in*ection vulnerability in login.#h# in 2015-01-05 7.5 CVE-2014-9519 MISC (link is infinitewp,admin,#anel %nfinite5P 0dmin Panel before =.4.4 allows external) remote attac$ers to e+ecute arbitrary 'QL FULLDISC commands via the email #arameter. infinitewp -- 'QL in*ection vulnerability in e+ecute.ph# in 2015-01-05 7.5 CVE-2014-9520 MISC (link is infinitewp,admin,#anel %nfinite5P 0dmin Panel before =.4.: allows external) remote attac$ers to e+ecute arbitrary 'QL FULLDISC commands via the historyID #arameter. infinitewp -- 7nrestricted file u#load vulnerability in 2015-01-05 7.5 CVE-2014-9521 MISC (link is infinitewp,admin,#anel u#loadScri#t.ph# in %nfinite5P 0dmin Panel external) before =.4.:, when the allWPIiles ?uery FULLDISC #arameter is set, allows remote attac$ers to e+ecute arbitrary code by u#loading a file with a double e+tension, then accessing it via a direct re?uest to the file in the u#loads directory, as demonstrated by the .ph#.swp filename. installatron -- 'QL in*ection vulnerability in incl/create.inc.ph# 2015-01-02 7.5 CVE-2014-9445 XF (link is g?,file,manager in %nstallatron HQ Iile Manager 9.2.5 allows external) remote attac$ers to e+ecute arbitrary 'QL EXPLOIT-DB commands via the create #arameter to (link is external) inde+.ph#. NOTE: this can be leveraged for cross- site scri#ting (2'') attac$s by creating a file that generates an error. NOTE: this issue was originally incorrectly ma##ed to !"-=93:-334;G see !"-=93:-334; for more information. linu+ -- linu+,$ernel The batadv_frag,merge,#ac$ets function in 2015-01-02 7.8 CVE-2014-9428 MLIST net6batman-adv/fragmentation.c in the CONFIRM (link F.A.T.M.A.N. im#lementation in the Linu+ $ernel is external) through 4.1J.1 uses an incorrect length field MLIST (link is external) during a calculation of an amount of memory, MLIST (link is external) which allows remote attac$ers to cause a denial CONFIRM of service (mesh-node system crash) via CONFIRM fragmented #ac$ets. mediawi$i -- mediawi$i The wfMangleIlashPolicy function in 2015-01-04 7.5 CVE-2014-9277 CONFIRM Aut#utHandler.ph# in Media5i$i before 3.1@.==, MLIST (link is 3.=9.x through 3.2=.x before 3.2=.3:, and 3.24.x external) before 3.24.7 allows remote attac$ers to conduct MLIST (link is external) PHP ob*ect in*ection attac$s via a crafted string DEBIAN containing Kcross-domain-#olicyL in a PHP SECTRACK format re?uest, which causes the string length (link is external) to change when converting the re?uest to KNOT-cross-domain-#olicy>. microweber -- microweber 'QL in*ection vulnerability in ategory.#h# in 2015-01-03 7.5 CVE-2014-9464 MISC (link is Microweber M' 9.9> before =93:3=9@ allows external) remote attac$ers to e+ecute arbitrary 'QL CONFIRM (link commands via the category #arameter when is external) dis#laying a category, related to the M#arent,id variable. mini-stream -- rm- Fuffer overflow in Mini-stream 8M-MP4 2015-01-02 7.5 CVE-2014-9448 EXPLOIT-DB m#4,converter onverter 4.1.2.3.2939.94.39 allows remote (link is external) attac$ers to e+ecute arbitrary code or cause a EXPLOIT-DB denial of service (crash) via a long string in a (link is external) OSVDB 502 file. osclass -- osclass 'QL in*ection vulnerability in the 2015-01-05 7.5 CVE-2014-8083 BID (link is 'earch::set1son0lert method in A' lass before external) 4.:.3 allows remote attac$ers to e+ecute BUGTRAQ arbitrary '.L commands via the alert #arameter (link is external) FULLDISC in a search alert subscri#tion action. MISC (link is external) MISC (link is external) osclass -- osclass Directory traversal vulnerability in oc- 2015-01-05 7.5 CVE-2014-8084 BID (link is includes6osclass6controller6a*a+.ph# in A' lass external) before 4.4.4 allows remote attac$ers to include BUGTRAQ and e+ecute arbitrary local files via a .. (dot dot) (link is external) FULLDISC in the a*a+file #arameter in a custom action. MISC (link is external) MISC (link is external) #h# -- #h# sa#i6cgi6cgi,main.c in the H% com#onent in PHP 2015-01-02 7.5 CVE-2014-9427 CONFIRM (link through >.4.3<, >.5.x through >.5.29, and >.6.x is external) through >.6.4, when mma# is used to read a .ph# MLIST (link is file, does not #ro#erly consider the ma##ingNs external) MLIST (link is length during #rocessing of an invalid file that external) begins with a O character and lac$s a newline MLIST (link is character, which causes an out-of-bounds read external) and might (3) allow remote attac$ers to obtain CONFIRM (link is external) sensitive information from #h#-cgi #rocess memory by leveraging the ability to u#load a .ph# file or (=) trigger une+#ected code e+ecution if a valid PHP scri#t is #resent in memory locations adjacent to the ma##ing.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    21 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us