CyberRota

Güvenlik Açığı İstihbaratı

NVD kaynaklı CVE verileri, Türkçe yorumlar, CISA KEV bilgisi, EPSS skorları ve public exploit sinyalleriyle zenginleştirilir.

Toplam
10
Kritik
2
Yüksek
2
Orta
6
KEV
0

Öncelikli Açıklar

CVSS, EPSS, CISA KEV ve public exploit sinyallerine göre otomatik önceliklendirilmiştir.

CVE-2012-4549
MEDIUM · CVSS 6.5 EPSS %0.13

Detaylı analiz gerekiyor.

Java

A flaw was found in JBoss Enterprise Application Platform. The `processInvocation` function within the `org.jboss.as.ejb3.security.AuthorizationInterceptor` component incorrectly authorizes all requests when no roles are defined for an Enterprise Java Beans (EJB) method invocation. This allows attackers to bypass intended access restrictions for EJB methods, leading to unauthorized access to sensitive functionalities.

CVE-2012-4550
MEDIUM · CVSS 5.3 EPSS %0.20

Uzaktan istismar edilebilir olabilir.

Java

A flaw was found in JBoss Enterprise Application Platform. When role-based authorization is used for Enterprise Java Beans (EJB) access, the system does not correctly call the necessary authorization modules. This prevents Java Authorization Contract for Containers (JACC) permissions from being applied, allowing remote attackers to gain unauthorized access to EJBs.

CVE-2016-3150
MEDIUM · CVSS 6.1 EPSS %0.28 Public Exploit

Uzaktan istismar edilebilir olabilir.

Cross-site scripting (XSS) vulnerability in wallpaper.php in the Base Unit in Barco ClickShare CSC-1 devices with firmware before 01.09.03, CSM-1 devices with firmware before 01.06.02, and CSE-200 devices with firmware before 01.03.02 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

CVE-2016-3151
HIGH · CVSS 7.5 EPSS %0.90 Public Exploit

Uzaktan istismar edilebilir olabilir.

Directory traversal vulnerability in the wallpaper parsing functionality in Barco ClickShare CSC-1 devices with firmware before 01.09.03, CSM-1 devices with firmware before 01.06.02, and CSE-200 devices with firmware before 01.03.02 allows remote attackers to read /etc/shadow via unspecified vectors.

CVE-2016-3152
CRITICAL · CVSS 9.8 EPSS %0.61 Public Exploit

Uzaktan istismar edilebilir olabilir.

Barco ClickShare CSC-1 devices with firmware before 01.09.03 allow remote attackers to obtain the root password by downloading and extracting the firmware image.

CVE-2016-5715
MEDIUM · CVSS 6.1 EPSS %0.69 Public Exploit

Uzaktan istismar edilebilir olabilir.

Open redirect vulnerability in the Console in Puppet Enterprise 2015.x and 2016.x before 2016.4.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a // (slash slash) followed by a domain in the redirect parameter. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6501.

CVE-2016-5737
MEDIUM · CVSS 6.1 EPSS %0.25 Public Exploit

Uzaktan istismar edilebilir olabilir.

The Gerrit configuration in the Openstack Puppet module for Gerrit (aka puppet-gerrit) improperly marks text/html as a safe mimetype, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via a crafted review.

CVE-2016-6492
HIGH · CVSS 7.8 EPSS %0.06 Public Exploit

Detaylı analiz gerekiyor.

Linux

The MT6573FDVT_SetRegHW function in camera_fdvt.c in the MediaTek driver for Linux allows local users to gain privileges via a crafted application that makes an MT6573FDVTIOC_T_SET_FDCONF_CMD IOCTL call.

CVE-2016-9299
CRITICAL · CVSS 9.8 EPSS %89.25 Public Exploit

Uzaktan istismar edilebilir olabilir.

Jenkins Java

The remoting module in Jenkins before 2.32 and LTS before 2.19.3 allows remote attackers to execute arbitrary code via a crafted serialized Java object, which triggers an LDAP query to a third-party server.

CVE-2016-10135
MEDIUM · CVSS 5.5 EPSS %0.23

Detaylı analiz gerekiyor.

Android

An issue was discovered on LG devices using the MTK chipset with L(5.0/5.1), M(6.0/6.0.1), and N(7.0) software, and RCA Voyager Tablet, BLU Advance 5.0, and BLU R1 HD devices. The MTKLogger app with a package name of com.mediatek.mtklogger has application components that are accessible to any application that resides on the device. Namely, the com.mediatek.mtklogger.framework.LogReceiver and com.mediatek.mtklogger.framework.MTKLoggerService application components are exported since they contain an intent filter, are not protected by a custom permission, and do not explicitly set the android:exported attribute to false. Therefore, these components are exported by default and are thus accessible to any third party application by using android.content.Intent object for communication. These application components can be used to start and stop the logs using Intent objects with embedded data. The available logs are the GPS log, modem log, network log, and mobile log. The base directory that contains the directories for the 4 types of logs is /sdcard/mtklog which makes them accessible to apps that require the READ_EXTERNAL_STORAGE permission. The GPS log contains the GPS coordinates of the user as well as a timestamp for the coordinates. The modem log contains AT commands and their parameters which allow the user's outgoing and incoming calls and text messages to be obtained. The network log is a tcpdump network capture. The mobile log contains the Android log, which is not available to third-party apps as of Android 4.1. The LG ID is LVE-SMP-160019.