Оказание ИТ услуг Кемерово CVE-2014-0227

    java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat 6.x before 6.0.42, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle attempts to continue reading data after an error has occurred, which allows remote attackers to conduct HTTP request smuggling attacks or cause a denial of service (resource consumption) by streaming data with malformed chunked transfer coding.
      Теги:
    • нет
    • 0
    • 0
    • 0 комментариев

    Оказание ИТ услуг Кемерово CVE-2014-0154 (ovirt)

      oVirt Engine before 3.5.0 does not include the HTTPOnly flag in a Set-Cookie header for the session IDs, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.
        Теги:
      • нет
      • 0
      • 0
      • 0 комментариев

      Оказание ИТ услуг Кемерово CVE-2013-2027 (jython, opensuse)

        Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.
          Теги:
        • нет
        • 0
        • 0
        • 0 комментариев

        Оказание ИТ услуг Кемерово CVE-2015-0427 (vm_virtualbox)

          Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox prior to 4.3.20 allows local users to affect integrity and availability via vectors related to VMSVGA virtual graphics device, a different vulnerability than CVE-2014-6588, CVE-2014-6589, CVE-2014-6590, and CVE-2014-6595.
            Теги:
          • нет
          • 0
          • 0
          • 0 комментариев

          Оказание ИТ услуг Кемерово CVE-2015-1200

            Race condition in pxz 4.999.99 Beta 3 uses weak file permissions for the output file when compressing a file before changing the permission to match the original file, which allows local users to bypass the intended access restrictions.
              Теги:
            • нет
            • 0
            • 0
            • 0 комментариев