For Part 2 this week we have 13 additional vendor disclosures from Mitsubishi, Palo Alto Networks (5), Pheonix Contact (4), Rockwell Automation, and Ruckus. Part 3 is planned for Tuesday.
Advisories
Mitsubishi Advisory -
Mitsubishi published an
advisory that describes a two vulnerabilities in their EcoGuideTAB product.
Palo Alto Networks Advisory #1 - PAN published an advisory
that discusses 24 vulnerabilities in their PAN-OS products. These are
third-party vulnerabilities.
Palo Alto Networks Advisory #2 - PAN published an advisory
that discusses 8 vulnerabilities (one listed in CISA’s Known Exploited
Vulnerabilties catalog) in their Prisma Access Browser.
Palo Alto Networks Advisory #3 - PAN published an advisory that
describes an incorrect privilege assignment vulnerability in their Autonomous
Digital Experience Manager.
Palo Alto Networks Advisory #4 - PAN published an advisory that
describes an incorrect privilege assignment vulnerability in their GlobalProtect
App.
Palo Alto Networks Advisory #5 - PAN published an advisory that
describes an untrusted search path vulnerability in their GlobalProtect App.
Phoenix Contact Advisory #1 - Phoenix Contact published
an
advisory that describes four vulnerabilities in their PLCnext Firmware.
Phoenix Contact Advisory #2 - Phoenix Contact published
an
advisory that discusses 54 vulnerabilities in their PLCnext Firmware.
Phoenix Contact Advisory #3 - Phoenix Contact published
an
advisory that describes three vulnerabilities in their CHARX SEC-3xxx
charging controllers.
Phoenix Contact Advisory #4 - Phoenix Contact published
an
advisory that describes five vulnerabilities in their CHARX SEC-3xxx
charging controllers.
Rockwell Advisory -
Rockwell published an
advisory that describes two improper input validation vulnerabilities in
their Arena Simulation product.
Ruckus Advisory - Ruckus published an advisory that describes
nine vulnerabilities in their SmartZone and Network Director products.
No comments:
Post a Comment