Time |
Event |
11:02a |
|
1:33p |
|
4:37p |
|
4:38p |
Debian Security Advisory 2827-1 http://packetstormsecurity.com/files/124573/dsa-2827-1.txt Debian Linux Security Advisory 2827-1 - It was discovered that Apache Commons FileUpload, a package to make it easy to add robust, high-performance, file upload capability to servlets and web applications, incorrectly handled file names with NULL bytes in serialized instances. A remote attacker able to supply a serialized instance of the DiskFileItem class, which will be deserialized on a server, could use this flaw to write arbitrary content to any location on the server that is accessible to the user running the application server process. |
4:49p |
|
5:01p |
|
6:02p |
EMC Watch4net Information Disclosure http://packetstormsecurity.com/files/124585/ESA-2013-091.txt EMC Watch4Net stores passwords of devices polled during monitoring in clear text in Watch4Net installation repository. This could allow a malicious user with access to Watch4Net installation repository to view those passwords. EMC Watch4Net versions prior to 6.3 are affected. |
7:02p |
EMC Replication Manager Unquoted File Path Enumeration http://packetstormsecurity.com/files/124584/ESA-2013-092.txt EMC Replication Manager allows a user to create scripts with unquoted element such as whitespace or other separators. This may allow local malicious users to access resources in a parent path and execute them. EMC Replication Manager versions prior to 5.5 are affected. |
8:22p |
TOR Virtual Network Tunneling Tool 0.2.4.20 http://packetstormsecurity.com/files/124586/tor-0.2.4.20.tar.gz Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). |