New Alerts for Confluence (Exploited 0-Day), Carrier LenelS2, Illumina, CODESYS, NetApp, and Linux.
Atlassian 0-Day
Atlassian has been made aware of current active exploitation of a critical severity unauthenticated remote code execution vulnerability in Confluence Data Center and Server. Patches are expected out today.
More info.
Carrier LenelS2 HID Mercury access panels contain several vulnerabilities, including Protection Mechanism Failure, Forced Browsing, Classic Buffer Overflow, Path Traversal, and OS Command Injection. Highest CVSSv3 score of 10
More info.
Illumina Local Run Manager contains several security vulnerabilities, including Path Traversal, Unrestricted Upload of File with Dangerous Type, Improper Access Control, Cleartext Transmission of Sensitive Information. Successful exploitation allows a remote attacker to take control of the affected product remotely and take any action at the operating system level. Highest CVSSv3 score of 10
More info.
CODESYS Visualization provides a weak login dialog and inject it into the generated code, which is downloaded to and executed by the HMI or PLC. CVSSv3 score of 7.3
More info.
NetApp has published 9 new bulletins identifying security vulnerabilities in third-party software included in their products. Some patches are available.
More info.
SUSE has updated the kernel firmware. More info.
OpenSUSE has updated the kernel firmware and others. More info.
Comments