Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Mageia Linux Local Check: mgasa-2016-0040

Information

Severity

Severity

High

Family

Family

Mageia Linux Local Security Checks

CVSSv2 Base

CVSSv2 Base

7.5

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:S/C:P/I:N/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

8 years ago

Modified

Modified

5 years ago

Summary

Mageia Linux Local Security Checks mgasa-2016-0040

Insight

Insight

A Cross-site scripting (XSS) vulnerability in the OCS discovery provider in ownCloud Server before 8.0.10 allows remote attackers to inject arbitrary web script or HTML via the URL resulting in a reflected Cross-Site-Scripting (CVE-2016-1498). ownCloud Server before 8.0.10 allows remote authenticated users to obtain sensitive information from a directory listing and possibly cause a denial of service (CPU consumption) via the force parameter to index.php/apps/files/ajax/scan.php (CVE-2015-1499). ownCloud Server before 8.0.10, when the file_versions application is enabled, does not properly check the return value of getOwner, which allows remote authenticated users to read the files with names starting with .v and belonging to a sharing user by leveraging an incoming share (CVE-2016-1500).

Solution

Solution

Update the affected packages to the latest available version.

Common Vulnerabilities and Exposures (CVE)