Skip to main content

CND News and Blog

New Vulnerabilities Tuesday 26 November


New Alerts for HPE, F5, Mozilla, Sprecher Automation, Hitachi Energy, IBM, and Linux.

HPE 

Security vulnerabilities have been identified in HPE AutoPass License Server (APLS) that could allow a remote attacker to disclose information, bypass authentication, and execute remote code. Highest CVSSv3 score of 8.0
More info.

F5 

F5 has published a bulletin for a vulnerable SSH Server included in BIG-IQ Centralized Management. CVSSv3 score of 6.8
No patches yet. Note the vulnerabilities listed are from 2019.
More info.

Mozilla 

Mozilla has published security bulletins for Thunderbird, Firefox, and Firefox ESR.
More info.

Sprecher Automation 

SPRECON-E, SPRECON-T3, and SPRECON-V460 are vulnerable to BlastRadius. CVSSv3 score of 8.1
More info.

Hitachi Energy 

Multiple vulnerabilities affect NSD570 Management Firmware and HMI570 User Interface Software products that allows a remote attacker to cause low severity confidentiality impact. Highest CVSSv3 score of 5.3
No patches.
More info.

IBM 

IBM has published Critical bulletins for Cloud Pak System and Process Mining.
More info.

Linux 

SUSE has updated the microcode. More info.
OpenSUSE has updated the microcode. More info.
Red Hat has updated the kernel. More info.



Security Wizardry Cyber Threat Intelligence - The Mobile Radar Page

A mobile version of our Security Wizardry Radar Page, providing vulnerability details and visibility for a variety of software and industries.

SecurityWizardry.com - Vulnerability Details

Security Wizardry Radar Page provides vulnerability details and visibility for a variety of software and industries.

Report Print
×
Stay Informed

When you subscribe to the blog, we will send you an e-mail when there are new updates on the site so you wouldn't miss them.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 08 December 2024

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cndltd.com/