![]() The router administrator can gain root access from this vulnerability. In Xiaomi router R3600 ROM version<1.0.66, filters in the set_WAN6 interface can be bypassed, causing remote code execution. Privilege Escalation vulnerability in McAfee Web Gateway (MWG) prior to 9.2.1 allows authenticated user interface user with low permissions to change the system's root password via improper access controls in the user interface. This also affects versions before 0.5.2 of the "Lemonldap::NG handler for Node.js" package. An attacker may bypass URL-based access control to protected Virtual Hosts by submitting a non-normalized URI. Jenkins Selection tasks Plugin 1.0 and earlier executes a user-specified program on the Jenkins controller, allowing attackers with Job/Configure permission to execute an arbitrary system command on the Jenkins controller as the OS user that the Jenkins process is running as.Īn issue was discovered in LemonLDAP::NG through 2.0.8, when NGINX is used. By sending specially-crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM Maximo Asset Management 7.6.0 and 7.6.1 could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an unsafe deserialization in Java. ![]() It allows SQL injection, as demonstrated by the TableName, ColumnName, Name, UserId, or Password parameter. It allows SQL injection, as demonstrated by TestConnection_LocalOrLinkedServer, CreateFilterFriendlyView, or AddWorkViewLinkedServer.Īn issue was discovered in Hyland OnBase through 18.0.0.32. It uses ASP.NET BinaryFormatter.Deserialize in a manner that allows attackers to transmit and execute bytecode in SOAP messages.Īn issue was discovered in Hyland OnBase through 18.0.0.32 and 19.x through 19. It uses XML deserialization libraries in an unsafe manner.Īn issue was discovered in Hyland OnBase through 18.0.0.32 and 19.x through 19. It allows remote attackers to execute arbitrary code because of unsafe JSON deserialization.Īn issue was discovered in Hyland OnBase through 18.0.0.32 and 19.x through 19. The LG ID is LVE-SMP-200020 (September 2020).Īn issue was discovered in Hyland OnBase through 18.0.0.32 and 19.x through 19. The lguicc software (for the LG Universal Integrated Circuit Card) allows attackers to bypass intended access restrictions on property values. The LG ID is LVE-SMP-200021 (September 2020).Īn issue was discovered on LG mobile devices with Android OS 10 software. BT manager allows attackers to bypass intended access restrictions on a certain mode. Please note that some of the information in the bulletin is compiled from external, open-source reports and is not a direct result of CISA analysis.Īpache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution.ĭ-Link COVR-2600R and COVR-3902 Kit before 1.01b05Beta01 use hardcoded credentials for telnet connection, which allows unauthenticated attackers to gain privileged access to the router, and to extract sensitive data or modify the configuration.Īn issue was discovered on LG mobile devices with Android OS 8.0, 8.1, 9.0, and 10 software. Patch information is provided when available. This information may include identifying information, values, definitions, and related links. Low: vulnerabilities with a CVSS base score of 0.0–3.9Įntries may include additional information provided by organizations and efforts sponsored by CISA.Medium: vulnerabilities with a CVSS base score of 4.0–6.9.High: vulnerabilities with a CVSS base score of 7.0–10.0.The division of high, medium, and low severities correspond to the following scores: Vulnerabilities are based on the Common Vulnerabilities and Exposures (CVE) vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available. In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores. The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |