New Vulnerabilities Friday 03 June


New Alerts for Confluence (Exploited 0-Day), Carrier LenelS2, Illumina, CODESYS, NetApp, and Linux.

Atlassian 0-Day

Atlassian has been made aware of current active exploitation of a critical severity unauthenticated remote code execution vulnerability in Confluence Data Center and Server. Patches are expected out today.
More info.

Carrier LenelS2 

Carrier LenelS2 HID Mercury access panels contain several vulnerabilities, including Protection Mechanism Failure, Forced Browsing, Classic Buffer Overflow, Path Traversal, and OS Command Injection. Highest CVSSv3 score of 10
More info.

Illumina 

Illumina Local Run Manager contains several security vulnerabilities, including Path Traversal, Unrestricted Upload of File with Dangerous Type, Improper Access Control, Cleartext Transmission of Sensitive Information. Successful exploitation allows a remote attacker to take control of the affected product remotely and take any action at the operating system level. Highest CVSSv3 score of 10
More info.

CODESYS 

CODESYS Visualization provides a weak login dialog and inject it into the generated code, which is downloaded to and executed by the HMI or PLC. CVSSv3 score of 7.3
More info.

NetApp 

NetApp has published 9 new bulletins identifying security vulnerabilities in third-party software included in their products. Some patches are available.
More info.

Linux 

SUSE has updated the kernel firmware. More info.
OpenSUSE has updated the kernel firmware and others. More info.



Security Wizardry Cyber Threat Intelligence - The Mobile Radar Page

A mobile version of our Security Wizardry Radar Page, providing vulnerability details and visibility for a variety of software and industries.

SecurityWizardry.com - Vulnerability Details

Security Wizardry Radar Page provides vulnerability details and visibility for a variety of software and industries.

Report Print
×
Stay Informed

When you subscribe to the blog, we will send you an e-mail when there are new updates on the site so you wouldn't miss them.

By accepting you will be accessing a service provided by a third-party external to https://www.cndltd.com/

Find Out More

© Computer Network Defence Limited 2022