CVE-2015-1165
https://notcve.org/view.php?id=CVE-2015-1165
RT (aka Request Tracker) 3.8.8 through 4.x before 4.0.23 and 4.2.x before 4.2.10 allows remote attackers to obtain sensitive RSS feed URLs and ticket data via unspecified vectors. RT (también conocido como Request Tracker) 3.8.8 hasta 4.x anterior a 4.0.23 y 4.2.x anterior a 4.2.10 permite a atacantes remotos obtener URLs de alimentación RSS y datos de tickets sensibles a través de vectores no especificados. • http://blog.bestpractical.com/2015/02/security-vulnerabilities-in-rt.html http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154213.html http://lists.fedoraproject.org/pipermail/package-announce/2015-March/154047.html http://www.debian.org/security/2015/dsa-3176 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2015-1464
https://notcve.org/view.php?id=CVE-2015-1464
RT (aka Request Tracker) before 4.0.23 and 4.2.x before 4.2.10 allows remote attackers to hijack sessions via an RSS feed URL. RT (también conocido como Request Tracker) anterior a 4.0.23 y 4.2.x anterior a 4.2.10 permite a atacantes remotos secuestrar sesiones a través de una URL de alimentación RSS. • http://blog.bestpractical.com/2015/02/security-vulnerabilities-in-rt.html http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154213.html http://lists.fedoraproject.org/pipermail/package-announce/2015-March/154047.html http://www.debian.org/security/2015/dsa-3176 • CWE-284: Improper Access Control •
CVE-2014-9472
https://notcve.org/view.php?id=CVE-2014-9472
The email gateway in RT (aka Request Tracker) 3.0.0 through 4.x before 4.0.23 and 4.2.x before 4.2.10 allows remote attackers to cause a denial of service (CPU and disk consumption) via a crafted email. email gateway en RT (también conocido como Request Tracker) 3.0.0 hasta 4.x anterior a 4.0.23 y 4.2.x anterior a 4.2.10 permite a atacantes remotos causar una denegación de servicio (consumo de CPU y disco) a través de un email manipulado. • http://blog.bestpractical.com/2015/02/security-vulnerabilities-in-rt.html http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154213.html http://lists.fedoraproject.org/pipermail/package-announce/2015-March/154047.html http://www.debian.org/security/2015/dsa-3176 http://www.securityfocus.com/bid/72832 • CWE-399: Resource Management Errors •
CVE-2015-2080 – Inductive Automation Ignition 7.8.1 - Remote Leakage Of Shared Buffers
https://notcve.org/view.php?id=CVE-2015-2080
The exception handling code in Eclipse Jetty before 9.2.9.v20150224 allows remote attackers to obtain sensitive information from process memory via illegal characters in an HTTP header, aka JetLeak. El código de manipulación de excepciones en Eclipse Jetty en versiones anteriores a 9.2.9.v20150224 permite a atacantes remotos obtener información sensible de memoria de procesos a través de caracteres no válidos en una cabecera HTTP, vulnerabilidad también conocida como JetLeak. Remote unauthenticated attackers are able to read arbitrary data from other HTTP sessions because Ignition uses a vulnerable Jetty server. When the Jetty web server receives a HTTP request, the below code is used to parse through the HTTP headers and their associated values. Inductive Automation versions 7.8.1 (b2016012216) and 7.8.0 (b2015101414) are affected. • https://www.exploit-db.com/exploits/39455 http://dev.eclipse.org/mhonarc/lists/jetty-announce/msg00074.html http://dev.eclipse.org/mhonarc/lists/jetty-announce/msg00075.html http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151804.html http://packetstormsecurity.com/files/130567/Jetty-9.2.8-Shared-Buffer-Leakage.html http://seclists.org/fulldisclosure/2015/Mar/12 http://www.securityfocus.com/archive/1/534755/100/1600/threaded http://www.securityfocus.com/bid/72768 http • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2015-1038
https://notcve.org/view.php?id=CVE-2015-1038
p7zip 9.20.1 allows remote attackers to write to arbitrary files via a symlink attack in an archive. p7zip 9.20.1 permite a atacantes remotos escribir a ficheros arbitrarios a través de un ataque de enlace simbólico en un archivo. • http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173245.html http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174245.html http://lists.opensuse.org/opensuse-updates/2015-07/msg00000.html http://www.debian.org/security/2015/dsa-3289 http://www.openwall.com/lists/oss-security/2015/01/11/2 http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html http://www.securityfocus.com/bid/71890 https://bugs.debian.org/cgi-bin/bugreport.cg • CWE-59: Improper Link Resolution Before File Access ('Link Following') •