Latest Vulnerabilities

Last week, a series of vulnerabilities were discovered across various platforms and software. Dell PowerEdge Server BIOS was found to have multiple vulnerabilities, while issues in VAPIX APIs and Node.js also surfaced. Additionally, black and livewire packages were reported to have security flaws, along with vulnerabilities in Fujian Kelixin Communication Command and Dispatch Platform. Speedy11CZ MCRPX and Devan-Kerman ARRP faced directory traversal weaknesses. OpenClinic GA had multiple issues, including XSS and file download vulnerabilities. Lastly, Shenzhen Libituo Technology Co., Ltd's LBT-T300-mini1 device was found to have a buffer overflow flaw. These discoveries highlight the importance of staying vigilant and updating systems promptly to protect against potential cyber threats.

Dell PowerEdge Server BIOS contains an Improper SMM communication buffer verification vulnerability. A physical high privileged attacker could potentially exploit this vulnerability leading to arbitra...
Dell PowerEdge Server BIOS contains a heap-based buffer overflow vulnerability. A local high privileged attacker could potentially exploit this vulnerability to write to otherwise unauthorized memory.
Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX APIs mediaclip.cgi and playclip.cgi was vulnerable for file globbing which could lead to a resource exhaustion attack. ...
Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX APIs local_list.cgi, create_overlay.cgi and irissetup.cgi was vulnerable for file globbing which could lead to a resour...
Versions of the package black before 24.3.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the lines_with_leading_tabs_expanded function in the strings.py file. An attacker could e...
Versions of the package livewire/livewire from 3.3.5 and before 3.4.9 are vulnerable to Cross-site Scripting (XSS) when a page uses [Url] for a property. An attacker can inject HTML code in the contex...
setuid() does not affect libuv's internal io_uring operations if initialized before the call to setuid(). This allows the process to perform privileged operations despite presumably having dropped suc...
A vulnerability in Node.js has been identified, allowing for a Denial of Service (DoS) attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The...
Fujian Kelixin Communication Command and Dispatch Platform editemedia.php sql injection
Fujian Kelixin Communication Command and Dispatch Platform pwd_update.php sql injection
Fujian Kelixin Communication Command and Dispatch Platform down_file.php sql injection
Important: kpatch-patch security update
Red Hat Red Hat Enterprise Linux for Power, little endian - Extended Update Support
Red Hat Red Hat Enterprise Linux for x86_64 - Extended Update Support
Red Hat Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions
redhat/kpatch-patch<4_18_0-477_27_1-1-3.el8_8
redhat/kpatch-patch<4_18_0-477_36_1-1-2.el8_8
redhat/kpatch-patch<4_18_0-477_43_1-1-1.el8_8
and 18 more
Important: kernel security and bug fix update
Red Hat Red Hat Enterprise Linux Server - AUS
Red Hat Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions
Red Hat Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions
redhat/kernel<4.18.0-305.125.1.el8_4
redhat/bpftool<4.18.0-305.125.1.el8_4
redhat/bpftool-debuginfo<4.18.0-305.125.1.el8_4
and 47 more
Directory Traversal vulnerability in Speedy11CZ MCRPX v.1.4.0 and before allows a local attacker to execute arbitrary code via a crafted file.
An issue was discovered in OpenClinic GA 5.247.01. A Reflected Cross-Site Scripting (XSS) vulnerability has been discovered in the login.jsp message parameter.
Directory Traversal vulnerability in Devan-Kerman ARRP v.0.8.1 and before allows a remote attacker to execute arbitrary code via the dumpDirect in RuntimeResourcePackImpl component.
An issue was discovered in OpenClinic GA 5.247.01. It allows retrieval of patient lists via queries such as findFirstname= to _common/search/searchByAjax/patientslistShow.jsp.
An issue was discovered in OpenClinic GA 5.247.01. An attacker can perform a directory path traversal via the Page parameter in a GET request to popup.jsp.
An issue was discovered in OpenClinic GA 5.247.01. An Unauthenticated File Download vulnerability has been discovered in pharmacy/exportFile.jsp.
Shenzhen Libituo Technology Co., Ltd LBT-T300-mini1 v1.2.9 was discovered to contain a buffer overflow via lan_ipaddr parameters at /apply.cgi.
An issue in the HistoryQosPolicy component of FastDDS v2.12.x, v2.11.x, v2.10.x, and v2.6.x leads to a SIGABRT (signal abort) upon receiving DataWriter's data.
Moderate: OpenShift Container Platform 4.15.3 bug fix and security update
Red Hat Red Hat OpenShift Container Platform for ARM 64
Red Hat Red Hat OpenShift Container Platform for IBM Z and LinuxONE
Red Hat Red Hat OpenShift Container Platform for Power
Red Hat Red Hat OpenShift Container Platform
Shenzhen Libituo Technology Co., Ltd LBT-T300-mini1 v1.2.9 was discovered to contain a buffer overflow via lan_netmask parameter at /apply.cgi.
RaspberryMatic Unauthenticated Remote Code Execution vulnerability through HMServer File Upload
LAM vulnerable to Authenticated Remote Code Execution
SourceCodester File Manager App update-file.php unrestricted upload
ClickHouse's Role-based Access Control is bypassed when query caching is enabled.
### Impact Vulnerability in **SecureProps** involves a regex failing to detect tags during decryption of encrypted data. This occurs when the encrypted data has been encoded with `NullEncoder` and ...
composer/ilicmiljan/secure-props>=1.2.0<1.2.2
[TagAwareCipher] - Decryption Failure (Regex Match)
composer/ilicmiljan/secure-props>=1.2.0<1.2.2
### Summary Nokogiri upgrades its dependency libxml2 as follows: - v1.15.6 upgrades libxml2 to 2.11.7 from 2.11.6 - v1.16.2 upgrades libxml2 to 2.12.5 from 2.12.4 libxml2 v2.11.7 and v2.12.5 address...
rubygems/nokogiri>=1.16.0<1.16.2
rubygems/nokogiri<1.15.6
Apache Hop Engine: ID isn't escaped when generating HTML
django-wiki denial of service via regular expression
pip/wiki<0.10.1
### Impact All historical installations of django-wiki are vulnerable to maliciously crafted article content, that can cause severe use of server CPU through a regular expression loop. ### Patches ...
pip/wiki<0.10.1
### Summary Symfony 1 has a gadget chain due to vulnerable Swift Mailer dependency that would enable an attacker to get remote code execution if a developer unserialize user input in his project. ###...
composer/friendsofsymfony1/symfony1>=1.3.0<1.5.13
### Impact ZITADEL uses Go templates to render the login UI. Due to a improper use of the `text/template` instead of the `html/template` package, the Login UI did not sanitize input parameters. An a...
go/github.com/zitadel/zitadel>=2.47.0<2.47.4
go/github.com/zitadel/zitadel=2.46.0
go/github.com/zitadel/zitadel=2.45.0
go/github.com/zitadel/zitadel>=2.44.0<2.44.3
go/github.com/zitadel/zitadel>=2.43.0<2.43.9
go/github.com/zitadel/zitadel>=2.42.0<2.42.15
and 1 more
ZITADEL vulnerable to improper HTML sanitization
go/github.com/zitadel/zitadel>=2.47.0<2.47.4
go/github.com/zitadel/zitadel=2.46.0
go/github.com/zitadel/zitadel=2.45.0
go/github.com/zitadel/zitadel>=2.44.0<2.44.3
go/github.com/zitadel/zitadel>=2.43.0<2.43.9
go/github.com/zitadel/zitadel>=2.42.0<2.42.15
and 1 more
Cilium has possible unencrypted traffic between nodes when using WireGuard and L7 policies
go/github.com/cilium/cilium>=1.15.0<1.15.2
go/github.com/cilium/cilium>=1.14.0<1.14.8
### Impact In Cilium clusters with WireGuard enabled and traffic matching Layer 7 policies: - Traffic that should be WireGuard-encrypted is sent unencrypted between a node's Envoy proxy and pods on ...
go/github.com/cilium/cilium>=1.15.0<1.15.2
go/github.com/cilium/cilium>=1.14.0<1.14.8
### Impact In Cilium clusters with IPsec enabled and traffic matching Layer 7 policies: - Traffic that should be IPsec-encrypted between a node's Envoy proxy and pods on other nodes is sent unencryp...
go/github.com/cilium/cilium>=1.15.0<1.15.2
go/github.com/cilium/cilium>=1.14.0<1.14.8
go/github.com/cilium/cilium<1.13.13
Cilium has possible unencrypted traffic between nodes when using IPsec and L7 policies
go/github.com/cilium/cilium>=1.15.0<1.15.2
go/github.com/cilium/cilium>=1.14.0<1.14.8
go/github.com/cilium/cilium<1.13.13
### Impact Cilium's [HTTP policies](https://docs.cilium.io/en/stable/security/policy/language/#http) are not consistently applied to all traffic in the scope of the policies, leading to HTTP traffic ...
go/github.com/cilium/cilium>=1.15.0<1.15.2
go/github.com/cilium/cilium>=1.14.0<1.14.8
go/github.com/cilium/cilium>=1.13.9<1.13.13
Cilium intermittent HTTP policy bypass
go/github.com/cilium/cilium>=1.15.0<1.15.2
go/github.com/cilium/cilium>=1.14.0<1.14.8
go/github.com/cilium/cilium>=1.13.9<1.13.13
### Impact OctoPrint versions up until and including 1.9.3 contain a vulnerability that allows malicious admins to configure or talk a victim with administrator rights into configuring a webcam snaps...
pip/OctoPrint<=1.9.3
OctoPrint XSS via the "Snapshot Test" feature in Classic Webcam plugin settings
pip/OctoPrint<=1.9.3
### Summary An attacker can effectively bypass the rate limit and brute force protections by exploiting the application's weak cache-based mechanism. This loophole in security can be combined with oth...
go/github.com/argoproj/argo-cd>=2.10.0<2.10.4
go/github.com/argoproj/argo-cd>=2.9.0<2.9.9
go/github.com/argoproj/argo-cd<2.8.13
### Summary An attacker can exploit a critical flaw in the application to initiate a Denial of Service (DoS) attack, rendering the application inoperable and affecting all users. The issue arises from...
go/github.com/argoproj/argo-cd>=2.10.0<2.10.4
go/github.com/argoproj/argo-cd>=2.9.0<2.9.9
go/github.com/argoproj/argo-cd<2.8.13
### Summary RCE due to improper input validation in TranformGraph().to_dot_graph function ### Details Due to improper input validation a malicious user can provide a command or a script file as a va...
pip/astropy<5.3.3
Backup Bolt <= 1.3.0 - Sensitive Data Exposure
Advanced Social Feeds Widget & Shortcode <= 1.7 - Admin+ Stored XSS
Buttons Shortcode and Widget <= 1.16 - Stored XSS via shortcode

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203