Skip to main content

CND News and Blog

New Vulnerabilities Monday 15 July


New Alerts for Tanzu, NetApp, IBM, Check Point, and Linux.

Tanzu 

Tanzu has published several bulletins identifying vulnerabilities in third-party software included in the products.
More info.

NetApp 

NetApp has published 5 new bulletins identifying vulnerabilities in third-party software included in their products. Highest CVSSv3 score of 9.1
No patches yet.
More info.

IBM 

IBM QRadar SIEM includes vulnerable components that could be identified and exploited with automated tools. Highest CVSSv3 score of 9.8
More info.

Vulnerability in pdfmake could allow a remote attacker to execute arbitrary code on the system, which could affect IBM Spectrum Control. CVSSv3 score of 9.8
More info.

Protobuf is used by IBM Storage Ceph, and contains a vulnerability. CVSSv3 score of 9.8
More info.

Multiple security vulnerabilities have been addressed in updates to IBM Security Verify Governance - Identity Manager and IBM Security Verify Governance - Identity Manager virtual appliance. Highest CVSSv3 score of 9.8
More info.

Potential code execution vulnerability in Node.js IP package has been identified that could affect IBM Watson Assistant for IBM Cloud Pak for Data. CVSSv3 score of 9.8
More info.

Check Point 

An RCE vulnerability in the OpenSSH server included in Quantum Spark appliances can cause an unauthenticated RCE that grants full root access.
More info.

Linux 

Red Hat has updated the kernel. More info.
Mageia has updated the kernel. More info.



Security Wizardry Cyber Threat Intelligence - The Mobile Radar Page

A mobile version of our Security Wizardry Radar Page, providing vulnerability details and visibility for a variety of software and industries.

SecurityWizardry.com - Vulnerability Details

Security Wizardry Radar Page provides vulnerability details and visibility for a variety of software and industries.

Report Print
×
Stay Informed

When you subscribe to the blog, we will send you an e-mail when there are new updates on the site so you wouldn't miss them.

By accepting you will be accessing a service provided by a third-party external to https://www.cndltd.com/