Skip to main content

CND News and Blog

New Vulnerabilities Thursday 24 August


New Alerts for Moxa, Sprecher Automation, Rockwell Automation, WithSecure, Wireshark, and Linux.

Moxa 

ioLogik 4000 Series is affected by multiple web server vulnerabilities and an improper access control vulnerability. Highest CVSSv3 score of 5.3
More info.

Sprecher Automation 

A vulnerability in Wibu Systems CodeMeter User Runtime Software affects SPRECON-V460, which could allow a remote attacker to execute code via a buffer overflow. CVSSv3 score of 9.0
More info.

Rockwell Automation 

Select Input/Output Modules contain a vulnerability from Pyramid Solutions EtherNet/IP Adapter kit. A remote attacker can cause an DoS by sending a specially crafted packet. CVSSv3 score of 8.6
More info.

WithSecure 

A DoS vulnerability was discovered in WithSecure products whereby it was possible to crash a scanning engine when unpacking specially crafted data files. The exploit can be triggered remotely by an attacker.
More info.

Wireshark 

Four vulnerabilities have been fixed in Wireshark that could be used to cause a DoS.
More info.

Linux 

SUSE has udpated the kernel. More info.
Mageia has udpated the kernel and microcode. More info.
Amazon Linux has updated the kernel. More info.
Amazon Linux 2 has updated the kernel. More info.



Security Wizardry Cyber Threat Intelligence - The Mobile Radar Page

A mobile version of our Security Wizardry Radar Page, providing vulnerability details and visibility for a variety of software and industries.

SecurityWizardry.com - Vulnerability Details

Security Wizardry Radar Page provides vulnerability details and visibility for a variety of software and industries.

Report Print
×
Stay Informed

When you subscribe to the blog, we will send you an e-mail when there are new updates on the site so you wouldn't miss them.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 28 April 2024

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cndltd.com/