Skip to main content

CND News and Blog

New Vulnerabilities Tuesday 29 August


New Alerts for VirusTotal YARA, SICK, Hitachi Energy, ClamAV, IBM, Mozilla, and Linux.

VirusTotal 

A buffer overflow vulnerability in VirusTotal YARA allows a remote attacker to create a malicious ruleset that will execute arbtirary code. CVSSv3 score of 9.8
Don't use unknown rulesets.
More info.

SICK 

Multiple vulnerabilities exist in the SICK LMS5xx that allow a remote attacker to impact availability, integrity and confidentiality of the LMS5xx. Highest CVSSv3 score of 9.8
One patch, 3 workarounds.
More info.

Hitachi Energy 

Lumada APM Edge product is affected by OpenSSL vulnerabilities.
More info.

ClamAV 

Versions of ClamAV have been updated to patch an unRAR vulnerability. CVSSv3 score of 7.5
More info.

IBM 

IBM Operations Dashboard contains multiple vulnerabilities in Go. Highest CVSSv3 score of 9.8
More info.

Platform Navigator and Automation Assets in IBM Cloud Pak for Integration are vulnerable to code injection and privilege escalation due to multiple vulnerabilities in Go. Highest CVSSv3 score of 9.8
More info.

Mozilla 

Mozilla has published security updates for Firefox and Firefox ESR, rated High.
More info.

Linux 

Red Hat has updated the kernel, kernel-rt, and kpatch. More info.
Ubuntu has updated the kernel. More info.



Security Wizardry Cyber Threat Intelligence - The Mobile Radar Page

A mobile version of our Security Wizardry Radar Page, providing vulnerability details and visibility for a variety of software and industries.

SecurityWizardry.com - Vulnerability Details

Security Wizardry Radar Page provides vulnerability details and visibility for a variety of software and industries.

Report Print
×
Stay Informed

When you subscribe to the blog, we will send you an e-mail when there are new updates on the site so you wouldn't miss them.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 27 April 2024

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cndltd.com/