Quantcast
Channel: Unix Experience » Warn (BSD)
Browsing latest articles
Browse All 6 View Live

Security: sudo

A (potentially malicious) program run by a user with sudo access may be able to bypass the “tty_ticket” constraints. In order for this to succeed there must exist on the machine a terminal device that...

View Article



FreeBSD: nfs remote DoS

A security hole is present on FreeBSD NFS implementation. Insufficient input validation in the NFS server allows an attacker to cause the underlying file system to treat a regular file as a directory....

View Article

Security: mod_security

When ModSecurity receives a request body with a size bigger than the value set by the “SecRequestBodyInMemoryLimit” and with a “Content-Type” that has no request body processor mapped to it,...

View Article

Sécurité: puppet

When making REST api calls, the puppet master takes YAML from an untrusted client, deserializes it, and then calls methods on the resulting object. A YAML payload can be crafted to cause the...

View Article

Security: PHPMyAdmin

The import.php script was vulnerable to GLOBALS variable injection. Therefore, an attacker could manipulate any configuration parameter. This vulnerability can be triggered only by someone who logged...

View Article


Security: puppet

By using the `resource_type` service, an attacker could cause puppet to load arbitrary Ruby files from the puppet master node’s file system. While this behavior is not enabled by default, `auth.conf`...

View Article
Browsing latest articles
Browse All 6 View Live




Latest Images