Skip to main content

CND News and Blog

New Vulnerabilities Wednesday 26 March


New Alerts for Google Chrome (Exploit), Inaba Denki Sangyo, HPE, Broadcom, Arista (0-Day), BD, and Linux.

Google Exploit

Google has updated Chrome for Desktop to fix 1 security vulnerability. Exploits exist in the wild.
More info.

Microsoft is aware. More info.

Inaba Denki Sangyo 

Several vulnerabilities exist in CHOCO TEI WATCHER mini. Highest CVSSv4 score of 9.3
No patches, only workarounds.
More info. And here.

HPE 

Four security vulnerabilities exist in Telco Service Orchestrator software that could allow a remote attacker to cause a DoS, SSRF, and Remote Access Restriction Bypass. Highest CVSSv3 score of 9.4
More info.

Security vulnerabilities have been identified in HPE Unified OSS Console (UOC) and HPE Unified OSS Console Assurance Monitoring (UOCAM). Highest CVSSv3 score of 4.7
More info.

Broadcom 

VMware Tanzu PostgreSQL has been updated to fix 242 vulnerabilities. Highest CVSSv3 score of 9.8
More info.

VMware Tanzu Gemfire has been updated to fix 6 vulnerabilities. Highest CVSSv3 score of 10.
More info.

Tanzu has been updated to fix one vulnerability caused by Apache Tomcat. CVSSv3 score of 9.8
More info.

Arista 0-Day

A vulnerability allows remote attackers to execute arbitrary code on affected installations of Arista NG Firewall. CVSSv3 score of 8.8
No patches.
More info.

BD 

BD has published Critical third-party patches for Alaris.
More info.

Linux 

RedHat has updated the kernel and kernel-rt. More info.



Security Wizardry Cyber Threat Intelligence - The Mobile Radar Page

A mobile version of our Security Wizardry Radar Page, providing vulnerability details and visibility for a variety of software and industries.

SecurityWizardry.com - Vulnerability Details

Security Wizardry Radar Page provides vulnerability details and visibility for a variety of software and industries.

Report Print
×
Stay Informed

When you subscribe to the blog, we will send you an e-mail when there are new updates on the site so you wouldn't miss them.

By accepting you will be accessing a service provided by a third-party external to https://www.cndltd.com/