Skip to main content

CND News and Blog

New Alerts Monday 19 September

New Alerts for IBM, HPE, WithSecure, and Linux.


IBM 

Vulnerabilities in libcurl such as bypassing security restrictions, obtaining sensitive information, and MitM attacks may affect Spectrum Protect Plus and Spectrum Copy Data Management. Highest CVSSv3 score of 9.8.
More info. And here.

Apache Commons Configuration could allow a remote attacker to execute arbitrary code on the system, caused by a flaw when using the interpolation defaults. IBM Sterling Control Center uses Apache Commons Configuration. CVSSv3 score of 9.8
More info.

HPE 

Multiple security vulnerabilities have been identified in HPE SAN switches with Brocade Fabric OS (FOS). These vulnerabilities allow a remote attacker to arbitrarily execute code, cause DoS, perform disclosure of sensitive information, access sensitive information, cause memory corruption and perform unauthorized access to files. Highest CVSSv3 score of 9.8
More info.

WithSecure 

A DoS vulnerability was discovered in WithSecure products where aerdl.so/aerdl.dll may go into an infinite loop when unpacking PE files. It is possible that this can crash the scanning engine. The exploit can be triggered remotely by an attacker.
More info.

Linux 

SUSE has updated the kernel. More info.
OpenSUSE has updated the kernel. More info.



Security Wizardry Cyber Threat Intelligence - The Mobile Radar Page

A mobile version of our Security Wizardry Radar Page, providing vulnerability details and visibility for a variety of software and industries.

SecurityWizardry.com - Vulnerability Details

Security Wizardry Radar Page provides vulnerability details and visibility for a variety of software and industries.

Report Print
×
Stay Informed

When you subscribe to the blog, we will send you an e-mail when there are new updates on the site so you wouldn't miss them.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 20 April 2024

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cndltd.com/