Skip to main content

CND News and Blog

New Vulnerabilities Friday 03 November


New Alerts for Weintek, Franklin Fueling System, Crimson, Microsoft Edge, Moxa, and Linux.

Weintek 

Weintek EasyBuilder Pro has a Use of Hard-coded Credentials vulnerability that could allow a remote attacker to obtain remote control of a victim's computer as a privileged user. CVSSv3 score of 9.8
More info.

Franklin Fueling System 

Franklin Fueling System TS-550 contains a Use of Password Hash with Insufficient Computational Effort vulnerability that could allow a remote attacker to access the device and gain unauthenticated access. CVSSv3 score of 8.3
More info.

Crimson 

Passwords configured via the Windows-based Crimson configuration tool and downloaded to a FlexEdge device may be truncated if a percent sign is included, thereby creating weaker than intended credentials. CVSSv3 score of 8.8
More info.

Microsoft 

Microsoft has updated Edge to include the latest chromium security patches.
More info.

Moxa 

PT-G503 Series firmware is affected by multiple vulnerabilities due to old version of jQuery, weak cipher suites, and unsecure web cookies. Highest CVSSv3 score of 6.9
Note the CVEs go back to 2005.
More info.

Linux 

OpenSUSE has updated the kernel. More info.
Oracle Linux has updated the kernel. More info.



Security Wizardry Cyber Threat Intelligence - The Mobile Radar Page

A mobile version of our Security Wizardry Radar Page, providing vulnerability details and visibility for a variety of software and industries.

SecurityWizardry.com - Vulnerability Details

Security Wizardry Radar Page provides vulnerability details and visibility for a variety of software and industries.

Report Print
×
Stay Informed

When you subscribe to the blog, we will send you an e-mail when there are new updates on the site so you wouldn't miss them.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 28 April 2024

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cndltd.com/