Skip to main content

CND News and Blog

New Vulnerabilities Thursday 17 August


New Alerts for Cisco, ClamAV, Mitsubishi Electric, Moxa, Atlassian, IBM, and Synology.

Cisco 

Cisco has published 17 new bulletins, 5 rated High and 12 rated Medium. Highest CVSSv3 score of 8.1
More info.

Secure Endpoint products are affected by a ClamAV vulnerability allowing a DoS. CVSSv3 score of 7.5
More info. And here.

ClamAV 

ClamAV has been updated to fix DoS vulnerabilities in the HFS+ and AutoIt file parsers. CVSSv3 score of 7.5
More info.

Mitsubishi Electric 

Multiple vulnerabilities exist in OpenSSL library which is installed in GENESIS64. These vulnerabilities could allow a remote attacker to disclose information or cause a DoS. Highest CVSSv3 score of 5.9
More info.

Moxa 

NPort IAW5000A-I/O Series contains hardcoded credentials. CVSSv3 score of 5.4
More info.

Atlassian 

Confluence has been updated to fix a vulnerability in third-party software. CVSSv3 score of 7.5
More info.

IBM 

IBM Security Guardium has been updated to fix vulnerabilities in third-party software. Highest CVSSv3 score of 9.8
More info. And here. And here.

Synology 

A vulnerability allows remote attackers to execute arbitrary code via a susceptible version of Synology Camera BC500 Firmware and Synology Camera TC500 Firmware. Synology rates this Critical.
More info.



Security Wizardry Cyber Threat Intelligence - The Mobile Radar Page

A mobile version of our Security Wizardry Radar Page, providing vulnerability details and visibility for a variety of software and industries.

SecurityWizardry.com - Vulnerability Details

Security Wizardry Radar Page provides vulnerability details and visibility for a variety of software and industries.

Report Print
×
Stay Informed

When you subscribe to the blog, we will send you an e-mail when there are new updates on the site so you wouldn't miss them.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 21 September 2024

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cndltd.com/