This week is a moderately busy disclosure week. For Part 1 we have 13 vendor disclosures from Carrier (3), Dassault Systems (2), Eaton, Hitachi, Janitza, Mitsubishi, Moxa (3), and Splunk.
Advisories
Carrier Advisory #1 - Carrier published an
advisory that describes two vulnerabilities in the multiple Carrier and
Automated Logic products.
Carrier Advisory #2 - Carrier published an
advisory that describes an improper validation of array index vulnerability
in multiple Carrier and Automated Logic products.
Carrier Advisory #3 - Carrier published an
advisory that describes an improper input validation vulnerability in
Carrier and Automated Logic Zone Controllers.
Dassault Advisory #1 - Dassault published an
advisory that describes a cross-site scripting vulnerability in their ENOVIA
Product Manager.
Dassault Advisory #2 - Dassault published an
advisory that that describes a cross-site scripting vulnerability in their DELMIA
Service Process Engineer product.
Eaton Advisory - Eaton
published an
advisory that describes a path traversal vulnerability in their Galileo
Software.
Hitachi Advisory -
Hitachi published an
advisory that discusses three vulnerabilities in multiple Hitachi products.
Janitza Advisory -
CERT-VDE published an
advisory that describes an improper validation of specified type of input
vulnerability in the Janitza UMG 96-PA and UMG 96-PA-MID products.
Mitsubishi Advisory -
Mitsubishi published an
advisory that describes a cleartext storage of sensitive information
vulnerability in their GX Works2 product.
Moxa Advisory #1 - Moxa published an
advisory that describes a clickjacking vulnerability in their ioLogik E1200
Series and E 2200 series products.
Moxa Advisory #2 - Moxa published an
advisory that describes a password autocompletion vulnerability in their ioLogik
E1200 Series and E 2200 series products.
Moxa Advisory #3 - Moxa published an
advisory that describes a cleartext transmission of sensitive information
vulnerability in their ioLogik E1200 Series and E 2200 series products.
Splunk Advisory #1 - Splunk published an advisory
that describes an insertion of sensitive information into a log file
vulnerability in their Add-On for Palo Alto Networks.
Splunk Advisory #2 - Splunk published an advisory
that discusses three vulnerabilities (one with publicly available exploits) in
their SOAR product.
No comments:
Post a Comment