Cisco Security Advisory - A vulnerability in the application programming interface (API) of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow an unauthenticated, remote attacker to access and control the API resources. The vulnerability is due to improper input validation of HTTP requests for unauthenticated URIs. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected URIs. Successful exploitation of this vulnerability could allow the attacker to upload malicious code to the application server or read unauthorized management data, such as credentials of devices managed by Cisco Prime Infrastructure or EPNM. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
d0b0c19d2084d83adcd843eacd5cecd81c4f0fd26216c696cb82928bdf546af5
Cisco Security Advisory - A vulnerability in the Lightweight Directory Access Protocol (LDAP) authentication for Cisco Prime Collaboration Provisioning could allow an unauthenticated, remote attacker to bypass authentication. The attacker could be granted full administrator privileges. The vulnerability is due to an improper implementation of LDAP authentication. An attacker could exploit this vulnerability by logging into a targeted device that is configured for LDAP authentication. Successful exploitation of this vulnerability could grant the attacker full administrator privileges. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
26cd55b3d740082746010b9e65acfbd03032ecef581282395e0724041de995a0
Cisco Security Advisory - A vulnerability in Cisco Firepower System Software could allow an unauthenticated, remote attacker to log in to the device with a default account. This account does not have full administrator privileges. The vulnerability is due to a user account that has a default and static password. This account is created during installation. An attacker could exploit this vulnerability by connecting either locally or remotely to the affected system. A successful exploit could allow the attacker to log in to the device using the default account. The default account allows the execution of a subset of command-line interface (CLI) commands that would allow the attacker to partially compromise the device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
bd90d90c1c62d42440a8570739723b548b56f9bbafe0011d76ac4d94ce367aa0
The Xerces-C XML parser fails to successfully parse a DTD that is deeply nested, and this causes a stack overflow, which makes a denial of service attack against many applications possible by an unauthenticated attacker. Apache Xerces-C XML Parser library versions prior to 3.1.4 are affected.
a0b966184480f64c7fc857680e37cc670d35cc9e4cccf14b0d26c6528bbbdd5a
Symantec suffers from a PowerPoint misaligned stream-cache remote stack buffer overflow vulnerability.
052761903f16d88db4affd9da98d81a78c52c8c900fd66dad4540b019026eb1e
Symantec suffers from a missing bounds checks in dec2zip ALPkOldFormatDecompressor::UnShrink.
34b4ac0ff008d01486602041869fd3b2080584c09bba6351c3c21ccd2dc47d09
Symantec suffers from an integer overflow in the TNEF decoder.
ade0be4c94efeb64e7d34ea7456d064b5cda1c9f3ea14dd9429dca9736285693
Symantec attempts to clean or remove components from archives or other multipart containers that they detect as malicious. The code that they use to remove components from MIME encoded messages in CMIMEParser::UpdateHeader() assumes that filenames cannot be longer than 77 characters. This assumption is obviously incorrect, names can be any length, resulting in a very clean heap overflow.
4ee204b77a45094748b81a74a8091d2a517ab376bd6d2bf0dafe5788af13c366
Symantec Antivirus suffers from multiple remote memory corruption issues when unpacking MSPACK archives.
e9d8e37d67b1b78a70b6ba1087bb9ad488f89ea7270258280a0c162de1eee2f1
The Symantec dec2lha library is the library responsible for decompressing LZH and LHA archives. The CSymLHA::get_header() routine has a trivial stack buffer overflow.
7a45122b3424d74bb5da649ff1caa2ecb47dc7b5c6a0d4f9cfd4d9d854735409
Symantec Antivirus version 5.3.11 suffers from multiple remote memory corruption vulnerabilities when unpacking RAR files.
9e44f967c750c035ba888192a2e531afb42978c1fb75803ba25499dfcaae8bc4
The Ubiquiti AirGateway, AirFiber, and mFi platforms feature remote administration via an authenticated web-based portal. Lack of CSRF protection in the Remote Administration Portal, and unsafe passing of user input to operating system commands executed with root privileges, can be abused in a way that enables remote command execution.
90378a8805d8e7a9d70f57b6789f59dbe576e315ddf496817ce14425c0361204
Concrete5 versions 5.7.3.1 and below suffer from a local file inclusion vulnerability.
616ea7b3f7f6993c3c30d60eb69b780ea3e5f8f3d92361e6075cb57b7e9dbbdb
Concrete5 versions 5.7.3.1 and below suffer from multiple persistent cross site scripting vulnerabilities.
9b6d1d19af3879b7eef3ddc8135c623b1cdf6ce2e8e040cf285212c36278ddf2
Concrete5 versions 5.7.3.1 and below suffer from multiple cross site request forgery vulnerabilities.
baf7f093a6b164bb4963ba1136f5cebe78f38d52676c96cbadced44aa534cacd
Linux x86_64 /etc/passwd file sender shellcode.
5a87569d14b522b92d9fdac438521b48a551b8290f62b9c52255a0b6d4540b3c