what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 4 of 4 RSS Feed

CVE-2018-1112

Status Candidate

Overview

glusterfs server before versions 3.10.12, 4.0.2 is vulnerable when using 'auth.allow' option which allows any unauthenticated gluster client to connect from any network to mount gluster storage volumes. NOTE: this vulnerability exists because of a CVE-2018-1088 regression.

Related Files

Open-AudIT Community 2.1.1 Cross Site Scripting
Posted Jul 18, 2018
Authored by Ranjeet Jaiswal

Open-AudIT Community version 2.1.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2018-11124
SHA-256 | 281cc780abfac2a8109a77f6c527b6c7d873fc6200cf587efadbc46e588d554e
vcftools 0.1.15 Out-Of-Bounds Read / Denial Of Service / Buffer Overflow
Posted May 16, 2018
Authored by Webin Security Lab

vcftools version 0.1.15 suffers from out-of-bounds read, denial of service, buffer overflow, and use-after-free vulnerabilities.

tags | advisory, denial of service, overflow, vulnerability
advisories | CVE-2018-11099, CVE-2018-11129, CVE-2018-11130
SHA-256 | 9eefdd1e2925e6f95ad42de0c06c5cd451572d6217a1defb026d0d90bc7f3fd8
Red Hat Security Advisory 2018-1269-01
Posted May 2, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-1269-01 - GlusterFS is a key building block of Red Hat Gluster Storage. It is based on a stackable user-space design and can deliver exceptional performance for diverse workloads. GlusterFS aggregates various storage servers over network interconnections into one large, parallel network file system. Issues addressed include an unauthenticated access vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2018-1112
SHA-256 | 7dda21269896d4ff764b9e3349027342bbe588d1c56e51205d0b2dc74455bb31
Red Hat Security Advisory 2018-1268-01
Posted May 2, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-1268-01 - GlusterFS is a key building block of Red Hat Gluster Storage. It is based on a stackable user-space design and can deliver exceptional performance for diverse workloads. GlusterFS aggregates various storage servers over network interconnections into one large, parallel network file system. Issues addressed include an unauthenticated access vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2018-1112
SHA-256 | 1fb741e142f3b87e652c821d02370ee9ad30309c3eadf3e4d108f5a60352f835
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close