Skip to main content

CND News and Blog

New Vulnerabilities Wednesday 18 January


New Alerts for GE Digital, IBM, D-Link, Mozilla, Git, and Apache.

GE Digital 

GE Digital Proficy Historian contains multiple vulnerabilities, including Authentication Bypass using an Alternate Path or Channel, Unrestricted Upload of File with Dangerous Type, Improper Access Control, and Weak Encoding for Password. Successful exploitation of these vulnerabilities could crash the device after access, cause a buffer overflow condition, and allow remote code execution. Highest CVSSv3 score of 9.8
More info.

IBM 

There is a vulnerability in min-dash that could allow a remote attacker to execute arbitrary code on the system. The code is used by IBM Process Mining. CVSSv3 score of 9.8
More info.

D-Link 

Mutliple vulnerabilities have been corrected in DIR-1360 hardware.
More info.

Mozilla 

Security updates have been published for Firefox and Firefox ESR.
More info.

Git 

Two vulnerabilities in Git could allow a remote attacker to execute arbitrary code on the system. By sending specially-crafted input, an attacker could exploit this vulnerability to execute arbitrary code on the system. CVSSv3 score of 9.8
More info. And here.

Apache 

Three moderate vulnerabilities have been patched in Apache HTTP Server.
More info.



Security Wizardry Cyber Threat Intelligence - The Mobile Radar Page

A mobile version of our Security Wizardry Radar Page, providing vulnerability details and visibility for a variety of software and industries.

SecurityWizardry.com - Vulnerability Details

Security Wizardry Radar Page provides vulnerability details and visibility for a variety of software and industries.

Report Print
×
Stay Informed

When you subscribe to the blog, we will send you an e-mail when there are new updates on the site so you wouldn't miss them.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 23 April 2024

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cndltd.com/