For more information about these vulnerabilities, see the Details section of this advisory. Multiple vulnerabilities in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to execute arbitrary code or allow an authenticated, local attacker to gain escalated privileges on an affected system. Attackers might gain privileged access to the database over Port 2638/TCP.Ī remote code execution vulnerability exists in the WebAdmin of Sophos SG UTM before v9.705 MR5, v9.607 MR7, and v9.511 MR11 A factory account with hard-coded passwords is present in the SICAM PAS installations. Multiple integer overflows in libXpm before 3.5.12, when a program requests parsing XPM extensions on a 64-bit platform, allow remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via (1) the number of extensions or (2) their concatenated length in a crafted XPM file, which triggers a heap-based buffer overflow.Īn issue was discovered in Siemens SICAM PAS before 8.00. For BIG-IP system running in Appliance mode, a successful exploit can allow the attacker to cross a security boundary. \n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n\nĪ vulnerability in Siemens SICAM PAS (all versions before V8.09) could allow a remote attacker to cause a Denial of Service condition and potentially lead to unauthenticated remote code execution by sending specially crafted packets to port 19234/TCP. \nA directory traversal vulnerability exists in the BIG-IP Configuration Utility that may allow an authenticated attacker to execute commands on the BIG-IP system. The scope of the impact may extend to other components. NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where an unprivileged regular user on the network can cause an out-of-bounds write through a specially crafted shader, which may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. A sandboxed process may be able to circumvent sandbox restrictions. A sandboxed process may be able to circumvent sandbox restrictions.Ī permissions issue was addressed with additional restrictions. An access issue was addressed with additional sandbox restrictions.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |