Total
5231 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2013-6964 | 1 Cisco | 1 Webex Meeting Center | 2024-11-21 | 3.5 LOW | N/A |
Cisco WebEx Meeting Center allows remote authenticated users to bypass access control and inject content from a different WebEx site via unspecified vectors, aka Bug ID CSCul36197. | |||||
CVE-2013-6955 | 1 Synology | 1 Diskstation Manager | 2024-11-21 | 10.0 HIGH | N/A |
webman/imageSelector.cgi in Synology DiskStation Manager (DSM) 4.0 before 4.0-2259, 4.2 before 4.2-3243, and 4.3 before 4.3-3810 Update 1 allows remote attackers to append data to arbitrary files, and consequently execute arbitrary code, via a pathname in the SLICEUPLOAD X-TMP-FILE HTTP header. | |||||
CVE-2013-6949 | 1 Belkin | 1 Wemo Home Automation Firmware | 2024-11-21 | 9.3 HIGH | N/A |
The Belkin WeMo Home Automation firmware before 3949 does not properly use the STUN and TURN protocols, which allows remote attackers to hijack connections and possibly have unspecified other impact by leveraging access to a single WeMo device. | |||||
CVE-2013-6945 | 1 Osehra | 1 Vista | 2024-11-21 | 7.5 HIGH | N/A |
The M2M Broker in OSEHRA VistA, as distributed before September 30, 2013, allows attackers to bypass authentication and authorization to perform doctor-only actions and read or modify patient records via unspecified vectors related to a "logic flaw." | |||||
CVE-2013-6918 | 1 Satechi | 1 Smart Travel Router | 2024-11-21 | 5.8 MEDIUM | N/A |
The web interface on the Satechi travel router 1.5, when Wi-Fi is used for WAN access, exposes the console without authentication on the WAN IP address regardless of the "Web Management via WAN" setting, which allows remote attackers to bypass intended access restrictions via HTTP requests. | |||||
CVE-2013-6889 | 1 Gnu | 1 Rush | 2024-11-21 | 4.9 MEDIUM | N/A |
GNU Rush 1.7 does not properly drop privileges, which allows local users to read arbitrary files via the --lint option. | |||||
CVE-2013-6886 | 3 Apple, Linux, Realvnc | 3 Mac Os X, Linux Kernel, Realvnc | 2024-11-21 | 7.2 HIGH | N/A |
RealVNC VNC 5.0.6 on Mac OS X, Linux, and UNIX allows local users to gain privileges via a crafted argument to the (1) vncserver, (2) vncserver-x11, or (3) Xvnc helper. | |||||
CVE-2013-6876 | 1 S3dvt Project | 1 S3dvt | 2024-11-21 | 7.2 HIGH | 7.8 HIGH |
The (1) pty_init_terminal and (2) pipe_init_terminal functions in main.c in s3dvt 0.2.2 and earlier allows local users to gain privileges by leveraging setuid permissions and usage of bash 4.3 and earlier. NOTE: this vulnerability was fixed with commit ad732f00b411b092c66a04c359da0f16ec3b387, but the version number was not changed. | |||||
CVE-2013-6863 | 1 Sybase | 1 Adaptive Server Enterprise | 2024-11-21 | 9.0 HIGH | N/A |
SAP Sybase Adaptive Server Enterprise (ASE) 15.0.3 before 15.0.3 ESD#4.3, 15.5 before 15.5 ESD#5.3, and 15.7 before 15.7 SP50 or 15.7 SP100 allows remote authenticated users to gain privileges via unspecified vectors. | |||||
CVE-2013-6840 | 1 Siemens | 1 Comos | 2024-11-21 | 6.9 MEDIUM | N/A |
Siemens COMOS before 9.2.0.8.1, 10.0 before 10.0.3.1.40, and 10.1 before 10.1.0.0.2 allows local users to gain database privileges via unspecified vectors. | |||||
CVE-2013-6835 | 1 Apple | 2 Iphone Os, Safari | 2024-11-21 | 5.0 MEDIUM | N/A |
TelephonyUI Framework in Apple iOS 7 before 7.1, when Safari is used, does not require user confirmation for FaceTime audio calls, which allows remote attackers to obtain telephone number or e-mail address information via a facetime-audio: URL. | |||||
CVE-2013-6831 | 1 Pineapp | 1 Mail-secure 5099sk | 2024-11-21 | 7.2 HIGH | N/A |
PineApp Mail-SeCure 3.70 and earlier on 5099SK and earlier platforms has a sudoers file that does not properly restrict user specifications, which allows local users to gain privileges via a sudo command that leverages access to the qmailq account. | |||||
CVE-2013-6825 | 1 Offis | 1 Dcmtk | 2024-11-21 | 7.2 HIGH | N/A |
(1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which allows local users to gain privileges by creating a large number of processes. | |||||
CVE-2013-6823 | 1 Sap | 1 Netweaver | 2024-11-21 | 6.4 MEDIUM | N/A |
GRMGApp in SAP NetWeaver allows remote attackers to bypass intended access restrictions via unspecified vectors. | |||||
CVE-2013-6818 | 1 Sap | 1 Netweaver Logviewer | 2024-11-21 | 6.4 MEDIUM | N/A |
SAP NetWeaver Logviewer 6.30, when running on Windows, allows remote attackers to bypass intended access restrictions via unspecified vectors. | |||||
CVE-2013-6802 | 1 Google | 1 Chrome | 2024-11-21 | 5.8 MEDIUM | N/A |
Google Chrome before 31.0.1650.57 allows remote attackers to bypass intended sandbox restrictions by leveraging access to a renderer process, as demonstrated during a Mobile Pwn2Own competition at PacSec 2013, a different vulnerability than CVE-2013-6632. | |||||
CVE-2013-6798 | 3 Apple, Blackberry, Microsoft | 3 Mac Os X, Blackberry Link, Windows | 2024-11-21 | 5.8 MEDIUM | N/A |
BlackBerry Link before 1.2.1.31 on Windows and before 1.1.1 build 39 on Mac OS X does not properly determine the user account for execution of Peer Manager in certain situations involving successive logins with different accounts, which allows context-dependent attackers to bypass intended restrictions on remote file-access folders via IPv6 WebDAV requests, a different vulnerability than CVE-2013-3694. | |||||
CVE-2013-6796 | 1 Deeproot Linux | 1 Deepofix | 2024-11-21 | 5.0 MEDIUM | N/A |
The SMTP server in DeepOfix 3.3 and earlier allows remote attackers to bypass authentication via an empty password, which triggers an LDAP anonymous bind. | |||||
CVE-2013-6775 | 2 Chainfire, Google | 2 Supersu, Android | 2024-11-21 | 10.0 HIGH | N/A |
The Chainfire SuperSU package before 1.69 for Android allows attackers to gain privileges via the (1) backtick or (2) $() type of shell metacharacters in the -c option to /system/xbin/su. | |||||
CVE-2013-6770 | 2 Google, Koushik Dutta | 2 Android, Superuser | 2024-11-21 | 7.6 HIGH | N/A |
The CyanogenMod/ClockWorkMod/Koush Superuser package 1.0.2.1 for Android 4.3 and 4.4 does not properly restrict the set of users who can execute /system/xbin/su with the --daemon option, which allows attackers to gain privileges by leveraging ADB shell access and a certain Linux UID, and then creating a Trojan horse script. |