RedTeam Pentesting identified an XML external entity expansion vulnerability in McAfee ePolicy Orchestrator's (ePO) dashboard feature. Users with the ability to create new dashboards in the ePO web interface who exploit this vulnerability can read local files on the ePO server, including sensitive data like the ePO database configuration. Versions 4.6.7 and below are affected.
f7760236a00eacc72f537370300bd2e7c27f9ec542d2cb4813cf607dd4d9f889
WordPress Thanks You Counter Button version 1.8.7 suffers from a cross site scripting vulnerability.
3beb0104ba796c9217de0ec54b1460cd194061fb341d3687622e6a815bf873f8
WordPress EasyMedia Gallery version 1.2.29 suffers from a cross site scripting vulnerability.
65c1f265556eda50715b048d152b9a787813d464fe658d6b4b1e0ab0cc1f40dd
Apache Tomcat versions 6.0.33 through 6.0.37 suffer from a session fixation vulnerability.
36ba52ce6c47d3e65da9ef3538ecc03acfbac6781df236369fa3d9cf1cbe32e3
Apache Tomcat versions 8.0.0-RC1, 7.0.0 through 7.0.42, and 6.0.0 through 6.0.37 suffer from an information disclosure vulnerability due to an incomplete fix for CVE-2005-2090.
85aca72a0ab50801bdc11f8b35cd76f7c8566b582f96d36c721332941fd2bdcc
IO File Manager version 2.0.5 suffers from a path traversal vulnerability.
0cfee755a5b538954bca4d085dca80c9d4c553ed657879443b0b2b5db33e2aa0
Barracuda Networks Firewall suffers from filter bypass and persistent script injection vulnerabilities.
3e6110147616408ffffdc19b6094016444f1836570b03df5c2d8f5beb4982fe6
There is a minor bug on the Microsoft Server 2008 DNS service that responds with the list of all root servers when queried for non-authoritative domains, even when recursion is set to OFF. This allows a malicious party to spoof the source ip on a udp DNS request to any Microsoft Server 2008 DNS and elicit a 533 byte response to a victim, making the server a contributor to coordinated distributed denial of service attacks. The response contains the default list of root DNS servers.
3ab734fcb865afbabdc1004a74625865444aad1020e90004c4aa22a1133b0f2a
Technicolor TC7200 suffers from a credential disclosure vulnerability.
9f6c7c15a7f27f0ec335b9ea7bc481a88b501ed6faf77a5cb0cc350b5d05ef5d
This whitepaper discusses heap spraying. Written in Portuguese.
4d45d4dd1363f5031cde304561cd53549c288ebffe7ac68449637f119a2fbfcc
Sendy version 1.1.8.4 suffers from a remote SQL injection vulnerability.
74aae280b77a5843f8d578ac23031384027384e97236c1b96f69bd194871de8d
Red Hat Security Advisory 2014-0206-01 - OpenLDAP is an open source suite of Lightweight Directory Access Protocol applications and development tools. LDAP is a set of protocols used to access and maintain distributed directory information services over an IP network. The openldap package contains configuration files, libraries, and documentation for OpenLDAP. A denial of service flaw was found in the way the OpenLDAP server daemon performed reference counting when using the rwm overlay. A remote attacker able to query the OpenLDAP server could use this flaw to crash the server by immediately unbinding from the server after sending a search request.
9c689b3ebd6223f8dbf725d5945bc082153a9b46734afbac8556f3e603864fd4
Red Hat Security Advisory 2014-0207-01 - RubyGems is the Ruby standard for publishing and managing third-party libraries. It was discovered that the rubygems API validated version strings using an unsafe regular expression. An application making use of this API to process a version string from an untrusted source could be vulnerable to a denial of service attack through CPU exhaustion.
b6fc9c49b408a54729b4c85557930045fbbf125f724779636954247247d8f72d
Red Hat Security Advisory 2014-0205-01 - Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. It was found that the security audit functionality, as provided by Red Hat JBoss Enterprise Application Platform 6, logged request parameters in plain text. This may have caused passwords to be included in the audit log files when using BASIC or FORM-based authentication. A local attacker with access to audit log files could possibly use this flaw to obtain application or server authentication credentials.
476cc57ac7d2a60a70463bd1508b65b17563cc85cab064c2e1c8b1038f6f9dd7
Zen Cart E-Commerce version 1.5.1 suffers from cross site scripting, open redirection, and remote shell upload vulnerabilities.
4c6c2cecddc3c9d1f83daf55b16aa431c469a46598dead1f3adc59cc5654bbaf
TYPO3 version 6.1.7 suffers from cross site scripting, information disclosure, and remote shell upload vulnerabilities.
b888906af2eec081b22f2e8a0ef4acded7b21991327edff43e08055ec32bc9c8
WiFiles HD version 1.3 suffers from a local file inclusion vulnerability.
4b414f1d66eb244966066e2e74a74ad6bdf3688efbd02ab2dded85f3d7cd5fff
JORJWEB Ltda suffers from a remote SQL injection vulnerability.
99cc837fdfeb8fc9b256b1aaed0d99f7aa765acceb36ff8ffc7a5b6f02798f02
WordPress Media File Renamer plugin version 1.7.0 suffers from a cross site scripting vulnerability.
39e43c6d9014a50baafd552c0ee274abc0e783d155db5d4cfef1cd7983dada81