Skip to main content

CND News and Blog

New Vulnerabilities Wednesday 29 May


New Alerts for TIBCO, Xerox, Baxter, Dell, IBM, Campbell Scientific, and Linux.

TIBCO 

Managed File Transfer Platform Server for Unix and z/Linux contain a vulnerability that allows Platform Server clients to bypass user-id/password authentication and transfer files as root or execute commands as root. CVSSv3 score of 9.8
More info.

Xerox 

Xerox has updated the FreeFlow Print Server to fix vulnerabilities in third-party software. Highest CVSSv3 score of 9.8
More info.

Baxter 

Welch Allyn Configuration Tool contains an Insufficiently Protected Credentials vulnerability. Successful exploitation could lead to the unintended exposure of credentials to unauthorized users. CVSSv4 score of 9.4
More info.

Dell 

Dell Live Optics Collector remediation is available for a ZLib vulnerability. Dell rates this Critical.
More info.

IBM 

Multiple vulnerabilities affect IBM Db2 on Cloud Pak for Data, and Db2 Warehouse on Cloud Pak for Data. Highest CVSSv3 score of 10
More info.

Campbell Scientific 

CSI Web Server and RTMC Pro contain Path Traversal and Weak Encoding for Password vulnerabilities that could allow a remote attacker to download files and decode stored passwords. Highest CVSSv4 score of 6.9
More info.

Linux 

SUSE has updated the kernel. More info.
Ubuntu has updated the kernel and microcode. More info.



Security Wizardry Cyber Threat Intelligence - The Mobile Radar Page

A mobile version of our Security Wizardry Radar Page, providing vulnerability details and visibility for a variety of software and industries.

SecurityWizardry.com - Vulnerability Details

Security Wizardry Radar Page provides vulnerability details and visibility for a variety of software and industries.

Report Print
×
Stay Informed

When you subscribe to the blog, we will send you an e-mail when there are new updates on the site so you wouldn't miss them.

By accepting you will be accessing a service provided by a third-party external to https://www.cndltd.com/