Alerts and Advisories




January   February  


  • Multiple vulnerabilities in Auto-Maskin's Equipment (20 Feb 2020)

    Multiple vulnerabilities such as Cleartext Transmission of Sensitive Information, Origin Validation Error, Use of Hard-coded Credentials, Weak Password Recovery Mechanism for Forgotten Password, and Weak Password Requirements have been discovered in various Equipments- RP 210E Remote Panels, DCU 210E Control Units, and Marine Observer Pro (Android App). Successful exploitation of these vulnerabilities could allow a remote attacker to gain root access to the underlying operating system of the device and may allow read/write access.

  • Multiple vulnerabilities in Honeywell's Equipment (20 Feb 2020)

    Multiple vulnerabilities such as Authentication Bypass by Capture-replay and Path Traversal have been discovered in Honeywell's Equipment- NOTI-FIRE-NET Web Server (NWS-3). Successful exploitation of these vulnerabilities could result in an attacker bypassing web server authentication methods.

  • Vulnerability in Rockwell Automation's Equipment (20 Feb 2020)

    Deserialization of Untrusted Data vulnerability has been discovered in Rockwell Automation's Equipment- FactoryTalk Diagnostics. Successful exploitation of this vulnerability could allow a remote unauthenticated attacker to execute arbitrary code with SYSTEM level privileges.

  • Vulnerability in B&R Industrial Automation GmbH's Equipment (20 Feb 2020)

    Improper Authorization vulnerability has been discovered in B&R Industrial Automation GmbH's Equipment- Automation Studio and Automation Runtime. Successful exploitation of this vulnerability may allow a remote attacker to modify the configuration of affected devices.

  • Adobe releases security updates for After Effects and Media Encoder (19 Feb 2020)

    Adobe has released an update for Adobe After Effects and Media Encoder. This update resolves a critical out-of-bounds write vulnerability that could lead to arbitrary code execution in the context of the current user.

  • Cisco releases security updates (19 Feb 2020)

    Cisco has released security updates to address vulnerabilities affecting multiple products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.

  • Google releases security updates for Chrome (18 Feb 2020)

    Google has released Chrome version 80.0.3987.116 for Windows, Mac, and Linux. This version addresses vulnerabilities that an attacker could exploit to take control of an affected system.

  • Vulnerability in Emerson's Equipment (18 Feb 2020)

    Heap-based Buffer Overflow vulnerability has been discovered in Emerson's Equipment- OpenEnterprise SCADA Server. Successful exploitation of this vulnerability could allow an attacker to execute code on an OpenEnterprise SCADA Server.

  • Vulnerability in Honeywell's Equipment (18 Feb 2020)

    Improper Privilege Management vulnerability has been discovered in Honeywell's Equipment- INNCOM INNControl 3. Successful exploitation of this vulnerability could allow an attacker to escalate user privileges within the INNControl application.

  • Vulnerability in Spacelabs' Equipment (18 Feb 2020)

    Improper Input Validation vulnerability has been discovered in Spacelabs' Equipment- Xhibit Telemetry Receiver. An attacker can exploit this vulnerability to perform remote code execution on an unprotected system.

  • Multiple vulnerabilities in Interpeak's Equipment (18 Feb 2020)

    Multiple vulnerabilities such as Stack-based Buffer Overflow, Heap-based Buffer Overflow, Integer Underflow, Improper Restriction of Operations within the Bounds of a Memory Buffer, Race Condition, Argument Injection, and Null Pointer Dereference have been discovered in various Equipments- OSE by ENEA, INTEGRITY RTOS by Green Hills Software, ITRON, ZebOS by IP Infusion, and VxWorks by Wind River. Successful exploitation of these vulnerabilities could allow remote code execution.

  • Vulnerability in GE's Equipment (18 Feb 2020)

    Protection Mechanism Failure vulnerability has been discovered in GE's Equipment- Ultrasound Products. The affected GE Healthcare ultrasound devices utilize a method of software application implementation called “Kiosk Mode.” This Kiosk Mode is vulnerable to local breakouts, which could allow an attacker with physical access to gain access to the operating system of affected devices.

  • Vulnerability in IBM DB2 (18 Feb 2020)

    Db2 is vulnerable to denial of service. Db2 could allow an attacker to send specially crafted packets to the Db2 server to cause excessive memory usage and cause Db2 to terminate abnormally.

  • Vulnerability in ClamAV (18 Feb 2020)

    It has been discovered that ClamAV, an antivirus software, was susceptible to a denial of service attack by unauthenticated users via inefficient MIME parsing of especially crafted email files.

  • Multiple vulnerabilities in PHP7.3 (17 Feb 2020)

    Multiple security issues were found in PHP, a widely-used open source general purpose scripting language which could result in information disclosure, denial of service or incorrect validation of path names.

  • Vulnerability Summary (17 Feb 2020)

    Summary of vulnerabilities for the week of Feb 10, 2020.

  • Multiple vulnerabilities in evince (14 Feb 2020)

    Multiple vulnerabilities such as command injection, disclosure of uninitialized memory and buffer overflow have been discovered in evince, a simple multi-page document viewer.

  • Vulnerability in FortiManager (13 Feb 2020)

    An Insufficient Verification of Data Authenticity vulnerability in FortiManager may allow an unauthenticated attacker to perform a Cross-Site WebSocket Hijacking (CSWSH) attack.

  • Vulnerability in Schneider Electric's Magelis HMI Panel Equipment (13 Feb 2020)

    Improper Check for Unusual or Exceptional Conditions vulnerability has been discovered in Schneider Electric's Equipment- Magelis HMI Panel. Successful exploitation of this vulnerability could allow a denial-of-service condition.

  • Multiple vulnerabilities in Schneider Electric's Modicon Equipment (13 Feb 2020)

    Improper Check for Unusual or Exceptional Conditions and Improper Access Control vulnerabilities have been discovered in Schneider Electric's Equipment- Modicon BMXNOR0200H. Successful exploitation of these vulnerabilities could allow remote code execution or cause a denial-of-service condition.

  • Vulnerability in Huawei Firewall Products (12 Feb 2020)

    An out-of-bound read vulnerability has been discovered in Huawei Firewall products that the IPSec module does not validate a field in a specific message. Attackers can exploit this vulnerability to send malformed message to cause out-of-bound read, compromising normal service.

  • Vulnerability in GlobalProtect (12 Feb 2020)

    A denial-of-service (DoS) vulnerability has been discovered in Palo Alto Networks GlobalProtect software running on Mac OS. This vulnerability allows authenticated local users to cause the Mac OS kernel to hang or crash. This issue affects GlobalProtect 5.0.5 and earlier versions of GlobalProtect 5.0 on Mac OS.

  • Vulnerability in PAN-OS (12 Feb 2020)

    Missing XML validation vulnerability has been discovered in the PAN-OS web interface on Palo Alto Networks PAN-OS software. This vulnerability allows authenticated users to inject arbitrary XML that results in privilege escalation. This issue affects PAN-OS 8.1 versions earlier than PAN-OS 8.1.12 and PAN-OS 9.0 versions earlier than PAN-OS 9.0.6.

  • libemail-address-list-perl security update (12 Feb 2020)

    Denial of service via an algorithmic complexity attack on email address parsing has been discovered in libemail-address-list-perl. It is recommended to upgrade the libemail-address-list-perl packages.

  • Red Hat JBoss Fuse/A-MQ 6.3 security update (12 Feb 2020)

    This patch is an update to Red Hat Fuse 6.3 and Red Hat A-MQ 6.3 and includes bug fixes.

  • openjdk-8 security update (12 Feb 2020)

    Several vulnerabilities have been discovered in the OpenJDK Java runtime, resulting in denial of service, incorrect implementation of Kerberos GSSAPI and TGS requests or incorrect TLS handshakes. It is recommended to upgrade the openjdk-8 packages.

  • Mozilla releases security updates for multiple products (11 Feb 2020)

    Mozilla has released security updates to address vulnerabilities in Firefox, Firefox ESR, and Thunderbird. An attacker could exploit some of these vulnerabilities to take control of an affected system.

  • Adobe releases security updates for multiple products (11 Feb 2020)

    Adobe has released security updates to address vulnerabilities in multiple Adobe products. An attacker could exploit some of these vulnerabilities to take control of an affected system.

  • Intel releases security updates (11 Feb 2020)

    Intel has released security updates to address vulnerabilities in multiple products. An attacker could exploit these vulnerabilities to gain escalation of privileges.

  • Microsoft releases February 2020 security updates (11 Feb 2020)

    Microsoft has released updates to address multiple vulnerabilities in Microsoft software. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.

  • Multiple vulnerabilities in Digi International's Equipment (11 Feb 2020)

    Unrestricted Upload of File with Dangerous Type and Cross-site Scripting vulnerabilities have been discovered in Digi International's Equipment- ConnectPort LTS 32 MEI. Successful exploitation of these vulnerabilities could limit system availability.

  • Multiple vulnerabilities in Siemens' Equipment (11 Feb 2020)

    Multiple vulnerabilities have been discovered in multiple products of Siemens. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.

  • Multiple vulnerabilities in Synergy Systems & Solutions' Equipment (11 Feb 2020)

    Improper Authentication and Improper Input Validation vulnerabilities have been discovered in Synergy Systems & Solutions' Equipment- HUSKY RTU. Successful exploitation of these vulnerabilities could allow an attacker to read sensitive information, execute arbitrary code, or cause a denial-of-service condition.

  • Vulnerability in spice-gtk (11 Feb 2020)

    The spice-gtk packages provide a GIMP Toolkit (GTK+) widget for Simple Protocol for Independent Computing Environments (SPICE) clients. Insufficient encoding checks for LZ can cause different integer/buffer overflows.

  • Multiple vulnerabilities in Yubico PIV Tool (11 Feb 2020)

    It has been discovered that libykpiv, a supporting library of the Yubico PIV Tool and YubiKey PIV Manager, mishandled specially crafted input. An attacker with a custom-made, malicious USB device could potentially execute arbitrary code on a computer running the Yubico PIV Tool or Yubikey PIV Manager.

  • Multiple vulnerabilities in libexif (11 Feb 2020)

    It has been discovered that libexif incorrectly handled certain files. An attacker could possibly exploit these vulnerabilities to access sensitive information, cause a denial of service or execute arbitrary code.

  • Vulnerability in Fortiguard products (10 Feb 2020)

    A system command injection vulnerability has been discovered in FortiAP. This vulnerability in FortiAP CLI admin console may allow unauthorized administrators to run arbitrary system level commands via specially crafted ifconfig commands.

  • Vulnerability Summary (10 Feb 2020)

    Summary of vulnerabilities for the week of Feb 03, 2020.

  • Multiple vulnerabilities in Qtbase (10 Feb 2020)

    It has been discovered that Qt incorrectly handled certain PPM images, text files and incorrectly searched for plugins and libraries in the current working directory. A remote attacker could exploit these vulnerabilities to cause a denial of service and execute arbitrary code on an affected system.

  • Vulnerability in libexif (10 Feb 2020)

    An out-of-bounds write vulnerability due to an integer overflow has been reported in libexif, a library to parse exif files. This flaw might be leveraged by remote attackers to cause denial of service, or potentially execute arbitrary code via crafted image files.

  • Multiple vulnerabilities in HPE Product (08 Feb 2020)

    It has been discovered that HPE Superdome Flex Server is vulnerable to multiple remote vulnerabilities via improper input validation of administrator commands. This vulnerability could allow an Administrator to bypass security restrictions and access multiple remote vulnerabilities including information disclosure, or denial of service.

  • Emotet evolves with new Wi-Fi Spreader (07 Feb 2020)

    A new loader type has been identified that takes advantage of the wlanAPI interface to enumerate all Wi-Fi networks in the area, and then attempts to spread to these networks, infecting all devices that it can access in the process.

  • Vulnerability in libxmlrpc3-java (06 Feb 2020)

    It has been reported that the XMLRPC client in libxmlrpc3-java, an XML-RPC implementation in Java, does perform deserialization of the server-side exception serialized in the faultCause attribute of XMLRPC error response messages. A malicious XMLRPC server can take advantage of this flaw to execute arbitrary code with the privileges of an application using the Apache XMLRPC client library.

  • Cisco Discovery Protocol (CDP) enabled devices are vulnerable to denial-of-service and remote code execution (05 Feb 2020)

    CDP supported devices are vulnerable to heap overflow in Cisco IP Cameras (CVE-2020-3110), stack overflow in Cisco VoIP devices (CVE-2020-3111), a format string stack overflow vulnerability (CVE-2020-3118), stack overflow and arbitrary write (CVE-2020-3119), and a resource exhaustion denial-of-service vulnerability (CVE-2020-3120) in Cisco NX-OS switches and Cisco IOS XR Routers, among others. These vulnerabilities could allow an attacker on the local network to execute code or cause a denial of service.

  • Multiple vulnerabilities in CA Unified Infrastructure Management (05 Feb 2020)

    Multiple vulnerabilities have been discovered in CA Unified Infrastructure Management (Nimsoft / UIM) of CA Technologies, a Broadcom Company. These vulnerabilities could allow an unauthenticated remote attacker to execute arbitrary code or commands, read from or write to systems, or conduct denial of service attacks.

  • Vulnerability in AutomationDirect's Equipment (04 Feb 2020)

    Insufficiently Protected Credentials vulnerability has been discovered in AutomationDirect's Equipment- C-More Touch Panels EA9 Series. Successful exploitation of this vulnerability may allow an attacker to get account information such as usernames and passwords, obscure or manipulate process data, and lock out access to the device.

  • Vulnerability in Python-Django (04 Feb 2020)

    It has been discovered that Django incorrectly handled input in the PostgreSQL module. A remote attacker could possibly use this to perform SQL injection attacks.

  • GraphicsMagick vulnerabilities (04 Feb 2020)

    It has been discovered that GraphicsMagick incorrectly handled certain image files. An attacker could possibly use this issue to cause a denial of service or other unspecified impact.

  • Multiple vulnerabilities in Symantec (03 Feb 2020)

    Symantec has released updates to address issues that were discovered in the Symantec Endpoint Protection (SEP), Symantec Endpoint Protection Manager (SEPM) and Symantec Endpoint Protection Small Business Edition (SEP SBE) products.

  • Slow HTTP DoS attacks mitigation in Fortiguard products (03 Feb 2020)

    An Uncontrolled Resource Consumption vulnerability has been discovered in multiple products of Fortiguard. This vulnerability could allow an attacker to cause web service portal denial of service (DoS) via handling special crafted HTTP requests/responses in pieces slowly.

  • Vulnerability Summary (03 Feb 2020)

    Summary of vulnerabilities for the week of Jan 27, 2020.

  • Vulnerability in Sudo (03 Feb 2020)

    Sudo incorrectly handled memory operations when the pwfeedback option is enabled. A local attacker could possibly use this issue to obtain unintended access to the administrator account.