US-CERT Vulnerability Summary for the Week of November 20, 2023
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infoadobe -- after_effectsAdobe After Effects version 24.0.2 (and earlier) and 23.6 (and...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infoadobe -- after_effectsAdobe After Effects version 24.0.2 (and earlier) and 23.6 (and...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NAME__________SimpleSAMLphp xml-security security bypassPlatforms Affected:SimpleSAMLphp xml-security 5.0.0-alpha.12 SimpleSAMLphp xml-security 1.6.11Risk Level:6.8Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________SimpleSAMLphp xml-security could allow a remote attacker to...
NAME__________Perl code executionPlatforms Affected:Perl Perl 5.34.0 Perl Perl 5.36.0 Perl Perl 5.38.0Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Perl could allow a local authenticated...
NAME__________Yokogawa STARDOM denial of servicePlatforms Affected:Yokogawa STARDOM FCN/FCJ R1.01 Yokogawa STARDOM FCN/FCJ R4.31Risk Level:5.3Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Yokogawa STARDOM is vulnerable...
NAME__________Pimcore Customer Management Framework cross-site request forgeryPlatforms Affected:Pimcore Customer Management Framework 4.0.4Risk Level:4.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Pimcore Customer Management Framework is vulnerable...
NAME__________Perl buffer overflowPlatforms Affected:Perl Perl 5.34.0 Perl Perl 5.36.0 Perl Perl 5.38.0Risk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Perl is vulnerable to a heap-based...
NAME__________Sentry Symbolicator server-side request forgeryPlatforms Affected:Sentry Symbolicator 0.3.3 Sentry Symbolicator 23.11.1Risk Level:4.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Sentry Symbolicator is vulnerable to server-side request...
NAME__________ASR ASR1803 and ASR1806 Chipsets code executionPlatforms Affected:ASR ASR1803 ASR ASR1806Risk Level:7.2Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________ASR ASR1803 and ASR1806 Chipsets could allow...
NAME__________Catalis CMS360 information disclosurePlatforms Affected:Risk Level:5.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Catalis CMS360 could allow a remote attacker to obtain sensitive information, caused by...
NAME__________Henschen & Associates court document management software information disclosurePlatforms Affected:Risk Level:5.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Henschen & Associates court document management software could...
NAME__________ASR ASR1803 and ASR1806 Chipsets code executionPlatforms Affected:ASR ASR1803 ASR ASR1806Risk Level:6.7Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________ASR ASR1803 and ASR1806 Chipsets are vulnerable...
NAME__________Schweitzer Engineering Laboratories SEL-411L information disclosurePlatforms Affected:Schweitzer Engineering Laboratories SEL-411LRisk Level:4.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Schweitzer Engineering Laboratories SEL-411L could allow a remote...
NAME__________ASR ASR1803 and ASR1806 Chipsets code executionPlatforms Affected:ASR ASR1803 ASR ASR1806Risk Level:6.7Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________ASR ASR1803 and ASR1806 Chipsets could allow...
NAME__________Schweitzer Engineering Laboratories SEL-411L clickjackingPlatforms Affected:Schweitzer Engineering Laboratories SEL-411LRisk Level:4.3Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Schweitzer Engineering Laboratories SEL-411L could allow a remote attacker...
NAME__________Schweitzer Engineering Laboratories SEL-411L cross-site scriptingPlatforms Affected:Schweitzer Engineering Laboratories SEL-411LRisk Level:4.3Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Schweitzer Engineering Laboratories SEL-411L is vulnerable to cross-site...
NAME__________PTC KEPServerEX, ThingWorx, and OPC-Aggregator information disclosurePlatforms Affected:PTC ThingWorx Kepware Server 8.0 PTC ThingWorx Industrial Connectivity 8.0 PTC OPC-Aggregator 6.14...
NAME__________Apple Safari, macOS Sonoma, iOS and iPadOS information disclosurePlatforms Affected:Apple Safari 17.1.1 Apple iOS 17.1.1 Apple iPadOS 17.1.1 Apple macOS...
NAME__________Schweitzer Engineering Laboratories SEL-411L code executionPlatforms Affected:Schweitzer Engineering Laboratories SEL-411LRisk Level:4Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Schweitzer Engineering Laboratories SEL-411L could allow a local...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...