New Vulnerabilities Friday 03 June

New Alerts for Confluence (Exploited 0-Day), Carrier LenelS2, Illumina, CODESYS, NetApp, and Linux.

Atlassian 0-Day

Atlassian has been made aware of current active exploitation of a critical severity unauthenticated remote code execution vulnerability in Confluence Data Center and Server. Patches are expected out today.
More info.

Carrier LenelS2 

Carrier LenelS2 HID Mercury access panels contain several vulnerabilities, including Protection Mechanism Failure, Forced Browsing, Classic Buffer Overflow, Path Traversal, and OS Command Injection. Highest CVSSv3 score of 10
More info.


Illumina Local Run Manager contains several security vulnerabilities, including Path Traversal, Unrestricted Upload of File with Dangerous Type, Improper Access Control, Cleartext Transmission of Sensitive Information. Successful exploitation allows a remote attacker to take control of the affected product remotely and take any action at the operating system level. Highest CVSSv3 score of 10
More info.


CODESYS Visualization provides a weak login dialog and inject it into the generated code, which is downloaded to and executed by the HMI or PLC. CVSSv3 score of 7.3
More info.


NetApp has published 9 new bulletins identifying security vulnerabilities in third-party software included in their products. Some patches are available.
More info.


SUSE has updated the kernel firmware. More info.
OpenSUSE has updated the kernel firmware and others. More info.

Security Wizardry Cyber Threat Intelligence - The Mobile Radar Page

A mobile version of our Security Wizardry Radar Page, providing vulnerability details and visibility for a variety of software and industries. - Vulnerability Details

Security Wizardry Radar Page provides vulnerability details and visibility for a variety of software and industries.

Report Print
Stay Informed

When you subscribe to the blog, we will send you an e-mail when there are new updates on the site so you wouldn't miss them.

By accepting you will be accessing a service provided by a third-party external to

Find Out More

© Computer Network Defence Limited 2022