CVE-2018-1332 – Apache Syncope 2.0.7 Remote Code Execution
https://notcve.org/view.php?id=CVE-2018-1332
Apache Storm version 1.0.6 and earlier, 1.2.1 and earlier, and version 1.1.2 and earlier expose a vulnerability that could allow a user to impersonate another user when communicating with some Storm Daemons. Apache Storm en versiones 1.0.6 y anteriores, 1.2.1 y anteriores y versiones 1.1.2 y anteriores expone una vulnerabilidad que podría permitir que un usuario suplante a otro al comunicarse con algunos demonios Storm. Apache Syncope version 2.7 suffers from a remote code execution vulnerability. • http://www.securityfocus.com/bid/104399 https://lists.apache.org/thread.html/50f1d6a7af27f49d2e498a9ab2975685302cd8ca47000b7c38f339a4%40%3Cdev.storm.apache.org%3E • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2018-8008
https://notcve.org/view.php?id=CVE-2018-8008
Apache Storm version 1.0.6 and earlier, 1.2.1 and earlier, and version 1.1.2 and earlier expose an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So when the filename gets concatenated to the target extraction directory, the final path ends up outside of the target folder. Apache Storm en versiones 1.0.6 y anteriores, 1.2.1 y anteriores y versiones 1.1.2 y anteriores expone una vulnerabilidad de escritura de archivos arbitrarios, que puede lograrse empleando un archivo zip especialmente m anipulado (afecta también a otros archivos, como bzip2, tar, xz, war, cpio o 7z) que contiene nombres de archivo de salto de directorio. Por lo tanto, cuando el nombre de archivo se concatena al directorio de extracción objetivo, la ruta final acaba fuera de la carpeta objetivo. • http://www.securityfocus.com/bid/104418 https://lists.apache.org/thread.html/613b2fca8bcd0a3b12c0b763ea8f7cf62e422e9f79fce6cfa5b08a58%40%3Cdev.storm.apache.org%3E • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2017-9799
https://notcve.org/view.php?id=CVE-2017-9799
It was found that under some situations and configurations of Apache Storm 1.x before 1.0.4 and 1.1.x before 1.1.1, it is theoretically possible for the owner of a topology to trick the supervisor to launch a worker as a different, non-root, user. In the worst case this could lead to secure credentials of the other user being compromised. **RECHAZADA** NO UTILICE ESTE NÚMERO DE CANDIDATO. ConsultIDs: none. Motivo: Este candidato ha sido retirado por su CNA. • http://www.securityfocus.com/bid/100235 http://www.securitytracker.com/id/1039116 https://lists.apache.org/thread.html/b9125bf507ed6f2ca6e85ba1a4b44e232aa70eeddfba2a9d8a954127%40%3Cdev.storm.apache.org%3E •
CVE-2015-3188
https://notcve.org/view.php?id=CVE-2015-3188
The UI daemon in Apache Storm 0.10.0 before 0.10.0-beta1 allows remote attackers to execute arbitrary code via unspecified vectors. El demonio IU en Apache Storm 0.10.0 en versiones anteriores a 0.10.0-beta1 permite a atacantes remotos ejecutar código arbitrario a través de vectores no especificados.. • http://packetstormsecurity.com/files/132417/Apache-Storm-0.10.0-beta-Code-Execution.html http://www.securityfocus.com/archive/1/535804/100/0/threaded http://www.securitytracker.com/id/1032695 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2009-1807 – BaoFeng - 'config.dll' ActiveX Remote Code Execution
https://notcve.org/view.php?id=CVE-2009-1807
Unspecified vulnerability in Config.dll in Baofeng products 3.09.04.17 and earlier allows remote attackers to execute arbitrary code by calling the SetAttributeValue method, as exploited in the wild in April and May 2009. Vulnerabilidad sin especificar en Config.dll en productos Baofeng v3.09.04.17 y anteriores permite a atacantes remotos ejecutar código de su elección llamando al método SetAttributeValue, como se ha explotado libremente en Abril y Mayo de 2009. • https://www.exploit-db.com/exploits/8757 http://www.cisrt.org/enblog/read.php?245 http://www.vupen.com/english/advisories/2009/1392 •