Skip to main content

CND News and Blog

New Vulnerabilities Thursday 03 October


New Alerts for PowerDNS, WithSecure, Cisco, Flexera, DrayTek, and Linux.

PowerDNS 

An attacker can publish a zone containing specific Resource Record Sets. Repeatedly processing and caching results for these sets can lead to a DoS. CVSSv3 score of 7.5
More info.

WithSecure 

A DoS vulnerability was discovered in WithSecure Atlant Product that allows a remote attacker to cause memory corruption when scanning a PE32 file.
More info.

Cisco 

Cisco has published 14 new bulletins, 1 rated Critical, 3 rated High, and the rest Medium. Highest CVSSv3 score of 9.9
More info.

Multiple vulnerabilities in the AnyConnect VPN server of Meraki MX and Meraki Z Series Teleworker Gateway devices could allow a remote attacker to cause a DoS condition to the AnyConnect VPN service. CVSSv3 score of 8.6
More info.

Flexera 

A vulnerability which may allow unauthenticated execution of arbitrary code, depending on system configuration, has been identified in the User Console.
More info.

DrayTek 

Several vulnerabilities have been fixed in DrayTek routers. Highest CVSSv3 score of 10.
Can't find a DrayTek bulletin, so we're listing news articles and researcher reports.
More info. And here.

Linux 

Ubuntu has updated the kernel. More info.



Security Wizardry Cyber Threat Intelligence - The Mobile Radar Page

A mobile version of our Security Wizardry Radar Page, providing vulnerability details and visibility for a variety of software and industries.

SecurityWizardry.com - Vulnerability Details

Security Wizardry Radar Page provides vulnerability details and visibility for a variety of software and industries.

Report Print
×
Stay Informed

When you subscribe to the blog, we will send you an e-mail when there are new updates on the site so you wouldn't miss them.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 06 November 2024

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cndltd.com/