Skip to main content

CND News and Blog

New Vulnerabilities Thursday 10 July


New Alerts for Emerson, Ruckus Wireless, Zoom, Broadcom, IBM, and Linux.

Emerson

Emerson ValveLink Products contains multiple vulnerabilities including Cleartext Storage of Sensitive Information in Memory, Protection Mechanism Failure, Uncontrolled Search Path Element, and Improper Input Validation. Highest CVSSv4 score of 9.3
More info.

Ruckus Wireless

Multiple vulnerabilities have been identified in Ruckus Virtual SmartZone and Network Director including authentication bypass, hardcoded secrets, and unauthenticated remote code execution. Highest CVSSv3 score of 9.8
No responses from vendor.
More info.

Zoom

Zoom has published 6 new bulletins, 3 of which identify vulnerabilities exploitable by remote attackers. Highest CVSSv3 score of 7.4
More info.

Broadcom

Broadcom has published 13 new bulletins for Brocade SANNav, 6 rated Medium and 7 rated Low.
More info.

Broadcom has published new bulletins for VMware Tanzu Greenplum and GemFire. Highest CVSSv3 score of 9.8
More info.

IBM

IBM has published Critical bulletins for Analytics Content Hub, Cloud Pak for Applications, Enterprise Application Runtimes, WebSphere Hybrid Edition, Db2, watsonx, Verify Identity Access, and Tivole Composite Application Manager.
More info.

Linux

SUSE has updated the kernel. More info.
OpenSUSE has updated the kernel. More info.
Oracle Linux has updated the kernel. More info.



Security Wizardry Cyber Threat Intelligence - The Mobile Radar Page

A mobile version of our Security Wizardry Radar Page, providing vulnerability details and visibility for a variety of software and industries.

SecurityWizardry.com - Vulnerability Details

Security Wizardry Radar Page provides vulnerability details and visibility for a variety of software and industries.

Report Print
×
Stay Informed

When you subscribe to the blog, we will send you an e-mail when there are new updates on the site so you wouldn't miss them.

By accepting you will be accessing a service provided by a third-party external to https://www.cndltd.com/