Skip to main content

CND News and Blog

New Vulnerabilities Thursday 12 May


Monthly Patches are out for Palo Alto Networks. New Alerts for Mitsubishi Electric, Dell, Xerox, and Linux.

Palo Alto Networks 

Monthly Patches are out for Palo Alto Networks, with 4 bulletins, 1 rated High and 3 rated Medium. Highest CVSSv3 score of 7.2
More info.

Mitsubishi Electric 

MELSOFT iQ AppPortal is affected by vulnerabilities in third party software used by the server software VisualSVN Server. Exploits for these vulnerabilities may allow a remote attacker to disclose or tamper with information with the product, cause a DoS, or execute malicious programs. Highest CVSSv3 score of 9.8
More info.

Dell 

Dell has published an update for EMC iDRAC9 the corrects an Improper Authentication vulnerability that may be exploited by remote attackers to compromise the affected system. Dell rates this Critical. CVSSv3 score of 9.6
More info.

Dell Unity, Dell UnityVSA, and Dell Unity XT contain a XSS vulnerability that may be exploited by remote attackers to compromise the affected system. Dell rates this Critical. CVSSv3 score of 6.1
More info.

Xerox 

Xerox has updated FreeFlow Print Server v2 to include security fixes for Windows 10, OpenJDK, and Firefox.
More info.

Linux 

Ubuntu has updated the kernel. More info.



Security Wizardry Cyber Threat Intelligence - The Mobile Radar Page

A mobile version of our Security Wizardry Radar Page, providing vulnerability details and visibility for a variety of software and industries.

SecurityWizardry.com - Vulnerability Details

Security Wizardry Radar Page provides vulnerability details and visibility for a variety of software and industries.

Report Print
×
Stay Informed

When you subscribe to the blog, we will send you an e-mail when there are new updates on the site so you wouldn't miss them.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 25 April 2024

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cndltd.com/