OBS-Vigilance

TitleDescriptionDate
LibTIFF: buffer overflow via readSeparateStripsetoBuffer()open in new windowAn attacker can trigger a buffer overflow of LibTIFF, via readSeparateStripsetVisit link for details
Node.js tmp: directory traversal via Symbolic Link Dir Parameteropen in new windowAn attacker can traverse directories of Node.js tmp, via Symbolic Link Dir Parameter, in order to write a file outside the service root path...Visit link for details
Check Point Mobile Access SSL VPN: directory traversal via File Share Applicationopen in new windowAn attacker can traverse directories of Check Point Mobile Access SSL VPN, via File Share Application, in order to read a file outside the service root path...Visit link for details
Check Point: Man-in-the-Middle via Country Flags CSV Fileopen in new windowAn attacker can act as a Man-in-the-Middle on Check Point, via Country Flags CSV File, in order to read or write data in the session...Visit link for details
7-Zip: directory traversal via Symbolic Linksopen in new windowAn attacker can traverse directories of 7-Zip, via Symbolic Links, in order to write a file outside the service root path...Visit link for details
libxml2: overload via SGML Catalog Fileopen in new windowAn attacker can trigger an overload of libxml2, via SGML Catalog File, in order to trigger a denial of service...Visit link for details
iperf: buffer overflow via skip-rx-copyopen in new windowAn attacker can trigger a buffer overflow of iperf, via skip-rx-copy, in order to trigger a denial of service, and possibly to run code...Visit link for details
iperf: buffer overflow via iperf_authopen in new windowAn attacker can trigger a buffer overflow of iperf, via iperf_auth, in order to trigger a denial of service, and possibly to run code...Visit link for details
Incus: ingress filtrering bypass via ARP Filteringopen in new windowAn attacker can bypass filtering rules of Incus, via ARP Filtering, in order to send malicious data...Visit link for details
Incus: ingress filtrering bypass via DHCP Filteringopen in new windowAn attacker can bypass filtering rules of Incus, via DHCP Filtering, in order to send malicious data...Visit link for details