[Forgot Password]
Login  Register Subscribe

25354

 
 

132805

 
 

139033

 
 

909

 
 

112583

 
 

156

 
 
Paid content will be excluded from the download.

Filter
Matches : 25 Download | Alert*

openssh: scp client improper directory name validation

CVE-2019-6111 openssh: Improper validation of object names allows malicious server to overwrite files via scp client

CVE-2019-6109 openssh: Missing character encoding in progress display allows for spoofing of scp client output.

CVE-2019-6110 openssh: Acceptance and display of arbitrary stderr allows for spoofing of scp client output

A flaw was found in samba when certain parameters were set in the samba configuration file. An unauthenticated attacker could use this flaw to escape the shared directory and access the contents of directories outside of the share.

The host is installed with samba version 4.x and is prone to a denial of service vulnerability. A flaw is present in samba which fails to handle character conversion at log level 3 or above. An unauthenticated attacker could use this flaw to cause samba to crash.

It was found that libreoffice was vulnerable to a directory traversal attack which could be used to execute arbitrary macros bundled with a document. An attacker could craft a document, which when opened by LibreOffice, would execute a Python method from a script in any arbitrary file system location, specified relative to the LibreOffice install location.

libssh versions 0.6 and above have an authentication bypass vulnerability in the server code. By presenting the server an SSH2_MSG_USERAUTH_SUCCESS message in place of the SSH2_MSG_USERAUTH_REQUEST message which the server would expect to initiate authentication, the attacker could successfully authenticate without any credentials.

The host is installed with Linux kernel and is prone to a TCP session hijack vulnerability. A flaw is present in the application, which fails to handle a blind in-window attack. Successful exploitation allows man-in-the-middle attackers to hijack TCP sessions.

In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.


Pages:      Start    1    2    ..   2

© SecPod Technologies