Vulnerability Detection Pipeline

Upcoming and New QIDs

Browse, filter by detection status, or search by CVE to get visibility into upcoming and new detections (QIDs) for all severities.

Disclaimer: The Vulnerability Detection Pipeline is intended to give users an early insight into some of the CVEs the Qualys Research Team is investigating. It may not show all the CVEs that are actively being investigated. Specific CVE feature requests filed via a Qualys Support case may or may not show up on this page. Please reach out to Qualys Support for status of such support cases.

Detection Status

  • Under investigation: We are researching a detection and will publish one if it is feasible.
  • In development: We are coding a detection and will typically publish it within a few days.
  • Recently published: We have published the detection on the date indicated, and it will typically be available in the KnowledgeBase on shared platforms within a day.

Non-Qualys customers can audit their network for all published vulnerabilities by signing up for a Qualys Free Trial or Qualys Community Edition.

Displaying QID development activity from through last updated:
482 results
CVE
Qualys ID
Title
Severity
  • CVE-2022-21824+
    QID: 181111
    In Development

    Debian Security Update for nodejs (DLA 3137-1)

    Severity
    Urgent5
    Qualys ID
    181111
    Vendor Reference
    DLA 3137-1
    CVE Reference
    CVE-2022-21824, CVE-2021-22930, CVE-2022-32212, CVE-2021-22939, CVE-2021-22940
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Debian has released a security update for nodejs to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory DLA 3137-1 for updates and patch information.
    Patches
    Debian DLA 3137-1
  • CVE-2022-2928+
    QID: 502519
    In Development

    Alpine Linux Security Update for dhcp

    Severity
    Critical4
    Qualys ID
    502519
    Vendor Reference
    dhcp
    CVE Reference
    CVE-2022-2928, CVE-2022-2929
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Alpine Linux has released a security update for dhcp to fix the vulnerabilities.

    Affected versions:
    Alpine Linux 3.16


    Affected Package versions prior to 4.4.3_p1-r0.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Alpine Linux advisory dhcp for updates and patch information.
    Patches
    Alpine Linux dhcp-4.4.3_p1-r0
  • CVE-2022-20837
    QID: 317235
    Under Investigation

    Cisco IOS XE Software DNS NAT Protocol Application Layer Gateway Denial of Service Vulnerability (cisco-sa-alg-dos-KU9Z8kFX)

    Severity
    Critical4
    Qualys ID
    317235
    Vendor Reference
    cisco-sa-alg-dos-KU9Z8kFX
    CVE Reference
    CVE-2022-20837
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    A vulnerability in the DNS application layer gateway (ALG) functionality that is used by Network Address Translation (NAT) in Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload.

    Affected Products
    This vulnerability affects the following Cisco devices if they are running a vulnerable release of Cisco IOS XE Software that is configured for NAT operation and has the DNS ALG for TCP feature enabled. The DNS ALG feature is enabled as soon as NAT is configured on the device.

    ASR 1000 Series Embedded Services Processors models ESP 100-X and ESP 200-X
    Catalyst 8500 Series Edge Platforms models C8500-12X4QC and C8500-12X

    QID Detection Logic (Authenticated):
    The check matches Cisco IOS XE version retrieved via Unix Auth using "show version" command.
    QID Detection Logic (Unauthenticated):
    The check matches Cisco IOS XE version retrieved via SNMP or TCP/IP Fingerprint or NTP or Telnet.

    Consequence
    A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition on the affected device.

    Solution

    Customers are advised to refer to cisco-sa-alg-dos-KU9Z8kFX for more information.

    Patches
    cisco-sa-alg-dos-KU9Z8kFX
  • CVE-2022-41556
    QID: 283176
    In Development

    Fedora Security Update for lighttpd (FEDORA-2022-c26b19568d)

    Severity
    Critical4
    Qualys ID
    283176
    Vendor Reference
    FEDORA-2022-c26b19568d
    CVE Reference
    CVE-2022-41556
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Fedora has released a security update for lighttpd to fix the vulnerabilities.

    Affected OS:
    Fedora 35


    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Refer to Fedora security advisory Fedora 35 for updates and patch information.
    Patches
    Fedora 35 FEDORA-2022-c26b19568d
  • CVE-2022-2928+
    QID: 198973
    In Development

    Ubuntu Security Notification for DHCP Vulnerabilities (USN-5658-1)

    Severity
    Critical4
    Qualys ID
    198973
    Vendor Reference
    USN-5658-1
    CVE Reference
    CVE-2022-2928, CVE-2022-2929
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Ubuntu has released a security update for dhcp to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Ubuntu security advisory USN-5658-1 for updates and patch information.
    Patches
    Ubuntu Linux USN-5658-1
  • CVE-2022-41318
    QID: 160129
    In Development

    Oracle Enterprise Linux Security Update for squid (ELSA-2022-6815)

    Severity
    Critical4
    Qualys ID
    160129
    Vendor Reference
    ELSA-2022-6815
    CVE Reference
    CVE-2022-41318
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Oracle Enterprise Linux has released a security update for squid to fix the vulnerabilities.
    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation allows an attacker to compromise the system.
    Solution
    To resolve this issue, upgrade to the latest packages which contain a patch.Refer to Oracle Enterprise Linux advisory below for updates and patch information:

    ELSA-2022-6815
    Patches
    Oracle Linux ELSA-2022-6815
  • CVE-2022-3172
    QID: 160128
    In Development

    Oracle Enterprise Linux Security Update for kubernetes (ELSA-2022-9854)

    Severity
    Critical4
    Qualys ID
    160128
    Vendor Reference
    ELSA-2022-9854
    CVE Reference
    CVE-2022-3172
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Oracle Enterprise Linux has released a security update for kubernetes to fix the vulnerabilities.
    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation allows an attacker to compromise the system.
    Solution
    To resolve this issue, upgrade to the latest packages which contain a patch.Refer to Oracle Enterprise Linux advisory below for updates and patch information:

    ELSA-2022-9854
    Patches
    Oracle Linux ELSA-2022-9854
  • CVE-2022-3172
    QID: 160127
    In Development

    Oracle Enterprise Linux Security Update for kubernetes (ELSA-2022-9853)

    Severity
    Critical4
    Qualys ID
    160127
    Vendor Reference
    ELSA-2022-9853
    CVE Reference
    CVE-2022-3172
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Oracle Enterprise Linux has released a security update for kubernetes to fix the vulnerabilities.
    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation allows an attacker to compromise the system.
    Solution
    To resolve this issue, upgrade to the latest packages which contain a patch.Refer to Oracle Enterprise Linux advisory below for updates and patch information:

    ELSA-2022-9853
    Patches
    Oracle Linux ELSA-2022-9853
  • CVE-2021-33655+
    QID: 198974
    In Development

    Ubuntu Security Notification for Linux kernel (GCP) Vulnerabilities (USN-5660-1)

    Severity
    Critical4
    Qualys ID
    198974
    Vendor Reference
    USN-5660-1
    CVE Reference
    CVE-2021-33655, CVE-2022-2503, CVE-2022-1729, CVE-2022-32296, CVE-2022-36946, CVE-2022-1012
    CVSS Scores
    Base 8.2 / Temporal 7.1
    Description
    Ubuntu has released a security update for linux to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Ubuntu security advisory USN-5660-1 for updates and patch information.
    Patches
    Ubuntu Linux USN-5660-1
  • CVE-2022-1259+
    QID: 240713
    In Development

    Red Hat Update for JBoss Enterprise Application Platform 7.4.7 (RHSA-2022:6821)

    Severity
    Critical4
    Qualys ID
    240713
    Vendor Reference
    RHSA-2022:6821
    CVE Reference
    CVE-2022-1259, CVE-2022-2053, CVE-2022-25857
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    Red hat jboss enterprise application platform 7 is a platform for java applications based on the wildfly application runtime.
    This release of Red Hat jboss enterprise application platform 7.4.7 serves as a replacement for Red Hat jboss enterprise application platform 7.4.6, and includes bug fixes and enhancements.
    See the Red Hat jboss enterprise application platform 7.4.7 release notes for information about the most significant bug fixes and enhancements included in this release...Security Fix(es):
      undertow: large ajp request may cause dos (cve-2022-2053).
      Undertow: potential security issue in flow control over http/2 may lead to dos.
      Incomplete fix for cve-2021-3629 (cve-2022-1259).
      Snakeyaml: denial of service due missing to nested depth limitation for collections. (
      Cve-2022-25857).
    Affected Products:
      jboss enterprise application platform 7.4 for rhel 7 x86_64.
    .

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Red Hat security advisory RHSA-2022:6821 for updates and patch information.
    Patches
    Red Hat Enterprise Linux RHSA-2022:6821
  • CVE-2022-1259+
    QID: 240712
    In Development

    Red Hat Update for JBoss Enterprise Application Platform 7.4.7 (RHSA-2022:6823)

    Severity
    Critical4
    Qualys ID
    240712
    Vendor Reference
    RHSA-2022:6823
    CVE Reference
    CVE-2022-1259, CVE-2022-2053, CVE-2022-25857
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    Red hat jboss enterprise application platform 7 is a platform for java applications based on the wildfly application runtime.
    This release of Red Hat jboss enterprise application platform 7.4.7 serves as a replacement for Red Hat jboss enterprise application platform 7.4.6, and includes bug fixes and enhancements.
    See the Red Hat jboss enterprise application platform 7.4.7 release notes for information about the most significant bug fixes and enhancements included in this release...Security Fix(es):
      undertow: large ajp request may cause dos (cve-2022-2053).
      Undertow: potential security issue in flow control over http/2 may lead to dos.
      Incomplete fix for cve-2021-3629 (cve-2022-1259).
      Snakeyaml: denial of service due missing to nested depth limitation for collections. (
      Cve-2022-25857).
    Affected Products:
      jboss enterprise application platform 7.4 for rhel 9 x86_64.
    .

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Red Hat security advisory RHSA-2022:6823 for updates and patch information.
    Patches
    Red Hat Enterprise Linux RHSA-2022:6823
  • CVE-2022-1259+
    QID: 240711
    In Development

    Red Hat Update for JBoss Enterprise Application Platform 7.4.7 (RHSA-2022:6822)

    Severity
    Critical4
    Qualys ID
    240711
    Vendor Reference
    RHSA-2022:6822
    CVE Reference
    CVE-2022-1259, CVE-2022-2053, CVE-2022-25857
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    Red hat jboss enterprise application platform 7 is a platform for java applications based on the wildfly application runtime.
    This release of Red Hat jboss enterprise application platform 7.4.7 serves as a replacement for Red Hat jboss enterprise application platform 7.4.6, and includes bug fixes and enhancements.
    See the Red Hat jboss enterprise application platform 7.4.7 release notes for information about the most significant bug fixes and enhancements included in this release...Security Fix(es):
      undertow: large ajp request may cause dos (cve-2022-2053).
      Undertow: potential security issue in flow control over http/2 may lead to dos.
      Incomplete fix for cve-2021-3629 (cve-2022-1259).
      Snakeyaml: denial of service due missing to nested depth limitation for collections. (
      Cve-2022-25857).
    Affected Products:
      jboss enterprise application platform 7.4 for rhel 8 x86_64.
    .

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Red Hat security advisory RHSA-2022:6822 for updates and patch information.
    Patches
    Red Hat Enterprise Linux RHSA-2022:6822
  • CVE-2022-2795+
    QID: 181112
    In Development

    Debian Security Update for bind9 (DLA 3138-1)

    Severity
    Critical4
    Qualys ID
    181112
    Vendor Reference
    DLA 3138-1
    CVE Reference
    CVE-2022-2795, CVE-2022-38178, CVE-2022-38177
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    Debian has released a security update for bind9 to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory DLA 3138-1 for updates and patch information.
    Patches
    Debian DLA 3138-1
  • CVE-2022-29869
    QID: 752657
    In Development

    SUSE Enterprise Linux Security Update for cifs-utils (SUSE-SU-2022:3525-1)

    Severity
    Serious3
    Qualys ID
    752657
    Vendor Reference
    SUSE-SU-2022:3525-1
    CVE Reference
    CVE-2022-29869
    CVSS Scores
    Base 5.3 / Temporal 4.6
    Description
    SUSE has released a security update for cifs-utils to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server Basesystem 15 SP4
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3525-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3525-1
  • CVE-2022-40674
    QID: 904082
    In Development

    Common Base Linux Mariner (CBL-Mariner) Security Update for expat (10944-1)

    Severity
    Urgent5
    Qualys ID
    904082
    Vendor Reference
    10944-1
    CVE Reference
    CVE-2022-40674
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has released a security update for expat to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    CBL-Mariner has issued updated packages to fix this vulnerability. For more information about the vulnerability and obtaining patches, refer to the following CBL-Mariner security advisories:https://github.com/microsoft/CBL-Mariner/releases

    Patches
    CBL-Mariner Linux 10944-1
  • CVE-2019-11068
    QID: 377615
    In Development

    F5 BIG-IP Open Java Development Toolkit (OpenJDK) vulnerability cve-2019-11068 (K30444545)

    Severity
    Urgent5
    Qualys ID
    377615
    Vendor Reference
    K30444545
    CVE Reference
    CVE-2019-11068
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is subsequently loaded.CVE-2019-11068

    Vulnerable Component: BIG-IP ASM,LTM,APM

    Affected Versions:
    16.1.0 - 16.1.3
    15.1.0 - 15.1.7
    14.1.0 - 14.1.5
    13.1.0 - 13.1.5

    QID Detection Logic(Authenticated):
    This QID checks for the vulnerable versions of F5 BIG-IP devices using the tmsh command.

    Consequence
    This vulnerability allows an unauthenticated attacker with network access from multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert, or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data and unauthorized ability to cause a partial denial-of-service (DoS) of Java SE.

    Solution
    For more information about patch details please refer to K30444545
    Patches
    K30444545
  • CVE-2022-36944
    QID: 283169
    In Development

    Fedora Security Update for scala (FEDORA-2022-07dd9375b2)

    Severity
    Urgent5
    Qualys ID
    283169
    Vendor Reference
    FEDORA-2022-07dd9375b2
    CVE Reference
    CVE-2022-36944
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Fedora has released a security update for scala to fix the vulnerabilities.

    Affected OS:
    Fedora 35


    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Refer to Fedora security advisory Fedora 35 for updates and patch information.
    Patches
    Fedora 35 FEDORA-2022-07dd9375b2
  • CVE-2022-36944
    QID: 283168
    In Development

    Fedora Security Update for scala (FEDORA-2022-34acf878fb)

    Severity
    Urgent5
    Qualys ID
    283168
    Vendor Reference
    FEDORA-2022-34acf878fb
    CVE Reference
    CVE-2022-36944
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Fedora has released a security update for scala to fix the vulnerabilities.

    Affected OS:
    Fedora 36


    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Refer to Fedora security advisory Fedora 36 for updates and patch information.
    Patches
    Fedora 36 FEDORA-2022-34acf878fb
  • CVE-2022-3041+
    QID: 283173
    In Development

    Fedora Security Update for chromium (FEDORA-2022-b49c9bc07a)

    Severity
    Urgent5
    Qualys ID
    283173
    Vendor Reference
    FEDORA-2022-b49c9bc07a
    CVE Reference
    CVE-2022-3041, CVE-2022-3071, CVE-2022-3058, CVE-2022-2608, CVE-2022-3042, CVE-2022-2008, CVE-2022-2612, CVE-2022-2623, CVE-2022-3054, CVE-2022-2007, CVE-2022-3057, CVE-2022-2859, CVE-2022-3196, CVE-2022-2615, CVE-2022-3038, CVE-2022-2613, CVE-2022-2609, CVE-2022-3047, CVE-2022-2624, CVE-2022-3075, CVE-2022-3056, CVE-2022-2858, CVE-2022-2604, CVE-2022-2621, CVE-2022-2607, CVE-2022-2617, CVE-2022-3045, CVE-2022-2605, CVE-2022-3039, CVE-2022-2861, CVE-2022-3050, CVE-2022-2856, CVE-2022-2854, CVE-2022-3199, CVE-2022-3043, CVE-2022-2011, CVE-2022-2622, CVE-2022-2610, CVE-2022-3046, CVE-2022-2614, CVE-2022-2616, CVE-2022-2620, CVE-2022-2611, CVE-2022-2606, CVE-2022-2619, CVE-2022-3049, CVE-2022-2603, CVE-2022-2852, CVE-2022-3195, CVE-2022-2618, CVE-2022-3197, CVE-2022-3044, CVE-2022-2860, CVE-2022-3053, CVE-2022-2010, CVE-2022-3052, CVE-2022-2857, CVE-2022-3040, CVE-2022-3055, CVE-2022-3200, CVE-2022-3051, CVE-2022-2855, CVE-2022-3048, CVE-2022-2853, CVE-2022-3201, CVE-2022-3198
    CVSS Scores
    Base 9.6 / Temporal 8.3
    Description
    Fedora has released a security update for chromium to fix the vulnerabilities.

    Affected OS:
    Fedora 36


    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Refer to Fedora security advisory Fedora 36 for updates and patch information.
    Patches
    Fedora 36 FEDORA-2022-b49c9bc07a
  • CVE-2022-3041+
    QID: 283172
    In Development

    Fedora Security Update for chromium (FEDORA-2022-3ca063941b)

    Severity
    Urgent5
    Qualys ID
    283172
    Vendor Reference
    FEDORA-2022-3ca063941b
    CVE Reference
    CVE-2022-3041, CVE-2022-3071, CVE-2022-3058, CVE-2022-2608, CVE-2022-3042, CVE-2022-2008, CVE-2022-2612, CVE-2022-2623, CVE-2022-3054, CVE-2022-2007, CVE-2022-3057, CVE-2022-2859, CVE-2022-3196, CVE-2022-2615, CVE-2022-3038, CVE-2022-2613, CVE-2022-2609, CVE-2022-3047, CVE-2022-2624, CVE-2022-3075, CVE-2022-3056, CVE-2022-2858, CVE-2022-2604, CVE-2022-2621, CVE-2022-2607, CVE-2022-2617, CVE-2022-3045, CVE-2022-2605, CVE-2022-3039, CVE-2022-2861, CVE-2022-3050, CVE-2022-2856, CVE-2022-2854, CVE-2022-3199, CVE-2022-3043, CVE-2022-2011, CVE-2022-2622, CVE-2022-2610, CVE-2022-3046, CVE-2022-2614, CVE-2022-2616, CVE-2022-2620, CVE-2022-2611, CVE-2022-2606, CVE-2022-2619, CVE-2022-3049, CVE-2022-2603, CVE-2022-2852, CVE-2022-3195, CVE-2022-2618, CVE-2022-3197, CVE-2022-3044, CVE-2022-2860, CVE-2022-3053, CVE-2022-2010, CVE-2022-3052, CVE-2022-2857, CVE-2022-3040, CVE-2022-3055, CVE-2022-3200, CVE-2022-3051, CVE-2022-2855, CVE-2022-3048, CVE-2022-2853, CVE-2022-3201, CVE-2022-3198
    CVSS Scores
    Base 9.6 / Temporal 8.3
    Description
    Fedora has released a security update for chromium to fix the vulnerabilities.

    Affected OS:
    Fedora 35


    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Refer to Fedora security advisory Fedora 35 for updates and patch information.
    Patches
    Fedora 35 FEDORA-2022-3ca063941b
  • CVE-2022-1043
    QID: 904101
    In Development

    Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (10796-1)

    Severity
    Critical4
    Qualys ID
    904101
    Vendor Reference
    10796-1
    CVE Reference
    CVE-2022-1043
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has released a security update for kernel to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    CBL-Mariner has issued updated packages to fix this vulnerability. For more information about the vulnerability and obtaining patches, refer to the following CBL-Mariner security advisories:https://github.com/microsoft/CBL-Mariner/releases

    Patches
    CBL-Mariner Linux 10796-1
  • CVE-2019-1352+
    QID: 752654
    Recently Published

    SUSE Enterprise Linux Security Update for libgit2 (SUSE-SU-2022:3495-1)

    Severity
    Critical4
    Qualys ID
    752654
    Date Published
    October 5, 2022
    Vendor Reference
    SUSE-SU-2022:3495-1
    CVE Reference
    CVE-2019-1352, CVE-2022-29187, CVE-2022-24765
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description
    SUSE has released a security update for libgit2 to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server for SAP Applications 15 SP2
    SUSE Linux Enterprise Server for SAP Applications 15 SP1
    SUSE Linux Enterprise Server for SAP Applications 15
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3495-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3495-1
  • CVE-2022-32912+
    QID: 752649
    Recently Published

    SUSE Enterprise Linux Security Update for webkit2gtk3 (SUSE-SU-2022:3502-1)

    Severity
    Critical4
    Qualys ID
    752649
    Date Published
    October 5, 2022
    Vendor Reference
    SUSE-SU-2022:3502-1
    CVE Reference
    CVE-2022-32912, CVE-2022-32886
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description
    SUSE has released a security update for webkit2gtk3 to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server for SAP Applications 15 SP1
    SUSE Linux Enterprise Server for SAP Applications 15
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3502-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3502-1
  • CVE-2022-2880+
    QID: 690952
    In Development

    Free Berkeley Software Distribution (FreeBSD) Security Update for go (854c2afb-4424-11ed-af97-adcabf310f9b)

    Severity
    Critical4
    Qualys ID
    690952
    Vendor Reference
    854c2afb-4424-11ed-af97-adcabf310f9b
    CVE Reference
    CVE-2022-2880, CVE-2022-41715, CVE-2022-2879
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    FreeBSD has released a security update for go to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to FreeBSD security advisory 854c2afb-4424-11ed-af97-adcabf310f9b for updates and patch information.
    Patches
    "FreeBSD" 854c2afb-4424-11ed-af97-adcabf310f9b
  • CVE-2022-41317+
    QID: 283171
    In Development

    Fedora Security Update for squid (FEDORA-2022-23e6ee1fb9)

    Severity
    Critical4
    Qualys ID
    283171
    Vendor Reference
    FEDORA-2022-23e6ee1fb9
    CVE Reference
    CVE-2022-41317, CVE-2022-41318
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Fedora has released a security update for squid to fix the vulnerabilities.

    Affected OS:
    Fedora 35


    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Refer to Fedora security advisory Fedora 35 for updates and patch information.
    Patches
    Fedora 35 FEDORA-2022-23e6ee1fb9
  • CVE-2022-41317+
    QID: 283170
    In Development

    Fedora Security Update for squid (FEDORA-2022-c8cad41c95)

    Severity
    Critical4
    Qualys ID
    283170
    Vendor Reference
    FEDORA-2022-c8cad41c95
    CVE Reference
    CVE-2022-41317, CVE-2022-41318
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Fedora has released a security update for squid to fix the vulnerabilities.

    Affected OS:
    Fedora 36


    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Refer to Fedora security advisory Fedora 36 for updates and patch information.
    Patches
    Fedora 36 FEDORA-2022-c8cad41c95
  • QID: 283167
    In Development

    Fedora Security Update for bash (FEDORA-2022-5b644a935b)

    Severity
    Critical4
    Qualys ID
    283167
    Vendor Reference
    FEDORA-2022-5b644a935b
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Fedora has released a security update for bash to fix the vulnerabilities.

    Affected OS:
    Fedora 35


    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Refer to Fedora security advisory Fedora 35 for updates and patch information.
    Patches
    Fedora 35 FEDORA-2022-5b644a935b
  • CVE-2022-41318
    QID: 240710
    In Development

    Red Hat Update for squid (RHSA-2022:6815)

    Severity
    Critical4
    Qualys ID
    240710
    Vendor Reference
    RHSA-2022:6815
    CVE Reference
    CVE-2022-41318
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Squid is a high-performance proxy caching server for web clients, supporting ftp, gopher, and http data objects...Security Fix(es):
      squid: buffer-over-read in sspi and smb authentication (cve-2022-41318).
    Affected Products:
      Red Hat enterprise linux server 7 x86_64.
      Red hat enterprise linux workstation 7 x86_64.
      Red hat enterprise linux for ibm z systems 7 s390x.
      Red hat enterprise linux for power, big endian 7 ppc64.
      Red hat enterprise linux for power, little endian 7 ppc64le.
    .

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Red Hat security advisory RHSA-2022:6815 for updates and patch information.
    Patches
    Red Hat Enterprise Linux RHSA-2022:6815
  • CVE-2022-41318
    QID: 240709
    In Development

    Red Hat Update for squid:4 (RHSA-2022:6777)

    Severity
    Critical4
    Qualys ID
    240709
    Vendor Reference
    RHSA-2022:6777
    CVE Reference
    CVE-2022-41318
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Squid is a high-performance proxy caching server for web clients, supporting ftp, gopher, and http data objects...Security Fix(es):
      squid: buffer-over-read in sspi and smb authentication (cve-2022-41318).
    Affected Products:
      Red Hat enterprise linux for x86_64 - extended update support 8.2 x86_64.
      Red hat enterprise linux server - aus 8.2 x86_64.
      Red hat enterprise linux for ibm z systems - extended update support 8.2 s390x.
      Red hat enterprise linux for power, little endian - extended update support 8.2 ppc64le.
      Red hat enterprise linux server - tus 8.2 x86_64.
      Red hat enterprise linux for arm 64 - extended update support 8.2 aarch64.
      Red hat enterprise linux server for power le - update services for sap solutions 8.2 ppc64le.
      Red hat enterprise linux for x86_64 - update services for sap solutions 8.2 x86_64.
    .

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Red Hat security advisory RHSA-2022:6777 for updates and patch information.
    Patches
    Red Hat Enterprise Linux RHSA-2022:6777
  • CVE-2022-41318
    QID: 240705
    In Development

    Red Hat Update for squid:4 (RHSA-2022:6776)

    Severity
    Critical4
    Qualys ID
    240705
    Vendor Reference
    RHSA-2022:6776
    CVE Reference
    CVE-2022-41318
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Squid is a high-performance proxy caching server for web clients, supporting ftp, gopher, and http data objects...Security Fix(es):
      squid: buffer-over-read in sspi and smb authentication (cve-2022-41318).
    Affected Products:
      Red Hat enterprise linux for x86_64 - extended update support 8.4 x86_64.
      Red hat enterprise linux server - aus 8.4 x86_64.
      Red hat enterprise linux for ibm z systems - extended update support 8.4 s390x.
      Red hat enterprise linux for power, little endian - extended update support 8.4 ppc64le.
      Red hat enterprise linux server - tus 8.4 x86_64.
      Red hat enterprise linux for arm 64 - extended update support 8.4 aarch64.
      Red hat enterprise linux server for power le - update services for sap solutions 8.4 ppc64le.
      Red hat enterprise linux for x86_64 - update services for sap solutions 8.4 x86_64.
    .

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Red Hat security advisory RHSA-2022:6776 for updates and patch information.
    Patches
    Red Hat Enterprise Linux RHSA-2022:6776
  • CVE-2022-41318
    QID: 240704
    In Development

    Red Hat Update for squid:4 (RHSA-2022:6775)

    Severity
    Critical4
    Qualys ID
    240704
    Vendor Reference
    RHSA-2022:6775
    CVE Reference
    CVE-2022-41318
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Squid is a high-performance proxy caching server for web clients, supporting ftp, gopher, and http data objects...Security Fix(es):
      squid: buffer-over-read in sspi and smb authentication (cve-2022-41318).
    Affected Products:
      Red Hat enterprise linux for x86_64 8 x86_64.
      Red hat enterprise linux for x86_64 - extended update support 8.6 x86_64.
      Red hat enterprise linux server - aus 8.6 x86_64.
      Red hat enterprise linux for ibm z systems 8 s390x.
      Red hat enterprise linux for ibm z systems - extended update support 8.6 s390x.
      Red hat enterprise linux for power, little endian 8 ppc64le.
      Red hat enterprise linux for power, little endian - extended update support 8.6 ppc64le.
      Red hat enterprise linux server - tus 8.6 x86_64.
      Red hat enterprise linux for arm 64 8 aarch64.
      Red hat enterprise linux for arm 64 - extended update support 8.6 aarch64.
      Red hat enterprise linux server for power le - update services for sap solutions 8.6 ppc64le.
      Red hat enterprise linux for x86_64 - update services for sap solutions 8.6 x86_64.
    .

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Red Hat security advisory RHSA-2022:6775 for updates and patch information.
    Patches
    Red Hat Enterprise Linux RHSA-2022:6775
  • CVE-2022-41323
    QID: 198971
    Recently Published

    Ubuntu Security Notification for Django Vulnerability (USN-5653-1)

    Severity
    Critical4
    Qualys ID
    198971
    Date Published
    October 5, 2022
    Vendor Reference
    USN-5653-1
    CVE Reference
    CVE-2022-41323
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Ubuntu has released a security update for django to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Ubuntu security advisory USN-5653-1 for updates and patch information.
    Patches
    Ubuntu Linux USN-5653-1
  • CVE-2022-3100
    QID: 181109
    In Development

    Debian Security Update for barbican (DSA 5247-1)

    Severity
    Critical4
    Qualys ID
    181109
    Vendor Reference
    DSA 5247-1
    CVE Reference
    CVE-2022-3100
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Debian has released a security update for barbican to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory DSA 5247-1 for updates and patch information.
    Patches
    Debian DSA 5247-1
  • CVE-2022-41318
    QID: 160124
    In Development

    Oracle Enterprise Linux Security Update for squid:4 (ELSA-2022-6775)

    Severity
    Critical4
    Qualys ID
    160124
    Vendor Reference
    ELSA-2022-6775
    CVE Reference
    CVE-2022-41318
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Oracle Enterprise Linux has released a security update for squid:4 to fix the vulnerabilities.
    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation allows an attacker to compromise the system.
    Solution
    To resolve this issue, upgrade to the latest packages which contain a patch.Refer to Oracle Enterprise Linux advisory below for updates and patch information:

    ELSA-2022-6775
    Patches
    Oracle Linux ELSA-2022-6775
  • CVE-2022-36946+
    QID: 198970
    Recently Published

    Ubuntu Security Notification for Linux kernel (GKE) Vulnerabilities (USN-5654-1)

    Severity
    Critical4
    Qualys ID
    198970
    Date Published
    October 5, 2022
    Vendor Reference
    USN-5654-1
    CVE Reference
    CVE-2022-36946, CVE-2022-1729, CVE-2022-1012, CVE-2022-2503, CVE-2021-33655, CVE-2022-32296
    CVSS Scores
    Base 8.2 / Temporal 7.1
    Description
    Ubuntu has released a security update for linux to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Ubuntu security advisory USN-5654-1 for updates and patch information.
    Patches
    Ubuntu Linux USN-5654-1
  • CVE-2021-41253
    QID: 690953
    In Development

    Free Berkeley Software Distribution (FreeBSD) Security Update for zydis (d487d4fc-43a8-11ed-8b01-b42e991fc52e)

    Severity
    Critical4
    Qualys ID
    690953
    Vendor Reference
    d487d4fc-43a8-11ed-8b01-b42e991fc52e
    CVE Reference
    CVE-2021-41253
    CVSS Scores
    Base 8.1 / Temporal 7.1
    Description
    FreeBSD has released a security update for zydis to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to FreeBSD security advisory d487d4fc-43a8-11ed-8b01-b42e991fc52e for updates and patch information.
    Patches
    "FreeBSD" d487d4fc-43a8-11ed-8b01-b42e991fc52e
  • CVE-2022-28202+
    QID: 181110
    Recently Published

    Debian Security Update for mediawiki (DSA 5246-1)

    Severity
    Critical4
    Qualys ID
    181110
    Date Published
    October 5, 2022
    Vendor Reference
    DSA 5246-1
    CVE Reference
    CVE-2022-28202, CVE-2022-41767, CVE-2021-44855, CVE-2022-34911, CVE-2022-28201, CVE-2022-31042, CVE-2022-29248, CVE-2022-34912, CVE-2022-41765, CVE-2021-44854, CVE-2021-44856, CVE-2022-31090, CVE-2022-31091, CVE-2022-28203, CVE-2022-31043
    CVSS Scores
    Base 8.1 / Temporal 7.1
    Description
    Debian has released a security update for mediawiki to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory DSA 5246-1 for updates and patch information.
    Patches
    Debian DSA 5246-1
  • CVE-2022-31197
    QID: 283175
    In Development

    Fedora Security Update for postgresql (FEDORA-2022-cdeabe1bc0)

    Severity
    Critical4
    Qualys ID
    283175
    Vendor Reference
    FEDORA-2022-cdeabe1bc0
    CVE Reference
    CVE-2022-31197
    CVSS Scores
    Base 8 / Temporal 7
    Description
    Fedora has released a security update for postgresql to fix the vulnerabilities.

    Affected OS:
    Fedora 35


    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Refer to Fedora security advisory Fedora 35 for updates and patch information.
    Patches
    Fedora 35 FEDORA-2022-cdeabe1bc0
  • CVE-2022-31197
    QID: 283174
    In Development

    Fedora Security Update for postgresql (FEDORA-2022-d7d49b2fac)

    Severity
    Critical4
    Qualys ID
    283174
    Vendor Reference
    FEDORA-2022-d7d49b2fac
    CVE Reference
    CVE-2022-31197
    CVSS Scores
    Base 8 / Temporal 7
    Description
    Fedora has released a security update for postgresql to fix the vulnerabilities.

    Affected OS:
    Fedora 36


    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Refer to Fedora security advisory Fedora 36 for updates and patch information.
    Patches
    Fedora 36 FEDORA-2022-d7d49b2fac
  • CVE-2022-3170
    QID: 904107
    In Development

    Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (10948-1)

    Severity
    Critical4
    Qualys ID
    904107
    Vendor Reference
    10948-1
    CVE Reference
    CVE-2022-3170
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has released a security update for kernel to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    CBL-Mariner has issued updated packages to fix this vulnerability. For more information about the vulnerability and obtaining patches, refer to the following CBL-Mariner security advisories:https://github.com/microsoft/CBL-Mariner/releases

    Patches
    CBL-Mariner Linux 10948-1
  • CVE-2022-3134
    QID: 904103
    In Development

    Common Base Linux Mariner (CBL-Mariner) Security Update for vim (10879-1)

    Severity
    Critical4
    Qualys ID
    904103
    Vendor Reference
    10879-1
    CVE Reference
    CVE-2022-3134
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has released a security update for vim to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    CBL-Mariner has issued updated packages to fix this vulnerability. For more information about the vulnerability and obtaining patches, refer to the following CBL-Mariner security advisories:https://github.com/microsoft/CBL-Mariner/releases

    Patches
    CBL-Mariner Linux 10879-1
  • CVE-2022-1976
    QID: 904102
    In Development

    Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (10813-1)

    Severity
    Critical4
    Qualys ID
    904102
    Vendor Reference
    10813-1
    CVE Reference
    CVE-2022-1976
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has released a security update for kernel to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    CBL-Mariner has issued updated packages to fix this vulnerability. For more information about the vulnerability and obtaining patches, refer to the following CBL-Mariner security advisories:https://github.com/microsoft/CBL-Mariner/releases

    Patches
    CBL-Mariner Linux 10813-1
  • CVE-2022-2977
    QID: 904092
    In Development

    Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (10946-1)

    Severity
    Critical4
    Qualys ID
    904092
    Vendor Reference
    10946-1
    CVE Reference
    CVE-2022-2977
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has released a security update for kernel to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    CBL-Mariner has issued updated packages to fix this vulnerability. For more information about the vulnerability and obtaining patches, refer to the following CBL-Mariner security advisories:https://github.com/microsoft/CBL-Mariner/releases

    Patches
    CBL-Mariner Linux 10946-1
  • CVE-2022-29187+
    QID: 752650
    Recently Published

    SUSE Enterprise Linux Security Update for libgit2 (SUSE-SU-2022:3494-1)

    Severity
    Critical4
    Qualys ID
    752650
    Date Published
    October 5, 2022
    Vendor Reference
    SUSE-SU-2022:3494-1
    CVE Reference
    CVE-2022-29187, CVE-2022-24765
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    SUSE has released a security update for libgit2 to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server for SAP Applications 15 SP2
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3494-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3494-1
  • CVE-2022-36946+
    QID: 198972
    Recently Published

    Ubuntu Security Notification for Linux kernel (Intel IoTG) Vulnerabilities (USN-5655-1)

    Severity
    Critical4
    Qualys ID
    198972
    Date Published
    October 5, 2022
    Vendor Reference
    USN-5655-1
    CVE Reference
    CVE-2022-36946, CVE-2022-33743, CVE-2022-26365, CVE-2022-2318, CVE-2022-34494, CVE-2022-33742, CVE-2022-34495, CVE-2021-33655, CVE-2022-33744, CVE-2022-33740, CVE-2022-33741
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    Ubuntu has released a security update for linux to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Ubuntu security advisory USN-5655-1 for updates and patch information.
    Patches
    Ubuntu Linux USN-5655-1
  • CVE-2021-30002+
    QID: 160123
    Recently Published

    Oracle Enterprise Linux Security Update for unbreakable enterprise kernel (ELSA-2022-9852)

    Severity
    Critical4
    Qualys ID
    160123
    Date Published
    October 5, 2022
    Vendor Reference
    ELSA-2022-9852
    CVE Reference
    CVE-2021-30002, CVE-2022-1184, CVE-2017-16537, CVE-2022-0850, CVE-2022-3028, CVE-2022-2964, CVE-2020-12770, CVE-2022-36879, CVE-2022-2503, CVE-2018-9422, CVE-2021-45486, CVE-2017-18270, CVE-2020-14390, CVE-2017-7472, CVE-2021-43976
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    Oracle Enterprise Linux has released a security update for unbreakable enterprise kernel to fix the vulnerabilities.
    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation allows an attacker to compromise the system.
    Solution
    To resolve this issue, upgrade to the latest packages which contain a patch.Refer to Oracle Enterprise Linux advisory below for updates and patch information:

    ELSA-2022-9852
    Patches
    Oracle Linux ELSA-2022-9852
  • CVE-2022-1199
    QID: 904096
    In Development

    Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (10798-1)

    Severity
    Critical4
    Qualys ID
    904096
    Vendor Reference
    10798-1
    CVE Reference
    CVE-2022-1199
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has released a security update for kernel to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    CBL-Mariner has issued updated packages to fix this vulnerability. For more information about the vulnerability and obtaining patches, refer to the following CBL-Mariner security advisories:https://github.com/microsoft/CBL-Mariner/releases

    Patches
    CBL-Mariner Linux 10798-1
  • CVE-2022-38178+
    QID: 752651
    Recently Published

    SUSE Enterprise Linux Security Update for bind (SUSE-SU-2022:3499-1)

    Severity
    Critical4
    Qualys ID
    752651
    Date Published
    October 5, 2022
    Vendor Reference
    SUSE-SU-2022:3499-1
    CVE Reference
    CVE-2022-38178, CVE-2022-38177, CVE-2022-2795
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    SUSE has released a security update for bind to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise (Desktop|Server) 12 SP5
    SUSE Linux Enterprise Server for SAP Applications 12 SP4
    SUSE Linux Enterprise Server 12 SP5
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3499-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3499-1
  • CVE-2021-42523
    QID: 752648
    Recently Published

    SUSE Enterprise Linux Security Update for colord (SUSE-SU-2022:3496-1)

    Severity
    Critical4
    Qualys ID
    752648
    Date Published
    October 5, 2022
    Vendor Reference
    SUSE-SU-2022:3496-1
    CVE Reference
    CVE-2021-42523
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    SUSE has released a security update for colord to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server Basesystem 15 SP4
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3496-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3496-1
  • CVE-2022-38177+
    QID: 240708
    Recently Published

    Red Hat Update for bind (RHSA-2022:6779)

    Severity
    Critical4
    Qualys ID
    240708
    Date Published
    October 5, 2022
    Vendor Reference
    RHSA-2022:6779
    CVE Reference
    CVE-2022-38177, CVE-2022-38178
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    The berkeley internet name domain (bind) is an implementation of the domain name system (dns) protocols.
    Bind includes a dns server (named); a resolver library (routines for applications to use when interfacing with dns); and tools for verifying that the dns server is operating correctly...Security Fix(es):
      bind: memory leak in ecdsa dnssec verification code (cve-2022-38177).
      Bind: memory leaks in eddsa dnssec verification code (cve-2022-38178).
    Affected Products:
      Red Hat enterprise linux for x86_64 - extended update support 8.4 x86_64.
      Red hat enterprise linux server - aus 8.4 x86_64.
      Red hat enterprise linux for ibm z systems - extended update support 8.4 s390x.
      Red hat enterprise linux for power, little endian - extended update support 8.4 ppc64le.
      Red hat enterprise linux server - tus 8.4 x86_64.
      Red hat enterprise linux for arm 64 - extended update support 8.4 aarch64.
      Red hat enterprise linux server for power le - update services for sap solutions 8.4 ppc64le.
      Red hat enterprise linux for x86_64 - update services for sap solutions 8.4 x86_64.
    .

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Red Hat security advisory RHSA-2022:6779 for updates and patch information.
    Patches
    Red Hat Enterprise Linux RHSA-2022:6779
  • CVE-2022-38177+
    QID: 240707
    Recently Published

    Red Hat Update for bind (RHSA-2022:6780)

    Severity
    Critical4
    Qualys ID
    240707
    Date Published
    October 5, 2022
    Vendor Reference
    RHSA-2022:6780
    CVE Reference
    CVE-2022-38177, CVE-2022-38178
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    The berkeley internet name domain (bind) is an implementation of the domain name system (dns) protocols.
    Bind includes a dns server (named); a resolver library (routines for applications to use when interfacing with dns); and tools for verifying that the dns server is operating correctly...Security Fix(es):
      bind: memory leak in ecdsa dnssec verification code (cve-2022-38177).
      Bind: memory leaks in eddsa dnssec verification code (cve-2022-38178).
    Affected Products:
      Red Hat enterprise linux for x86_64 - extended update support 8.2 x86_64.
      Red hat enterprise linux server - aus 8.2 x86_64.
      Red hat enterprise linux for ibm z systems - extended update support 8.2 s390x.
      Red hat enterprise linux for power, little endian - extended update support 8.2 ppc64le.
      Red hat enterprise linux server - tus 8.2 x86_64.
      Red hat enterprise linux for arm 64 - extended update support 8.2 aarch64.
      Red hat enterprise linux server for power le - update services for sap solutions 8.2 ppc64le.
      Red hat enterprise linux for x86_64 - update services for sap solutions 8.2 x86_64.
    .

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Red Hat security advisory RHSA-2022:6780 for updates and patch information.
    Patches
    Red Hat Enterprise Linux RHSA-2022:6780
  • CVE-2022-38177+
    QID: 240706
    Recently Published

    Red Hat Update for bind (RHSA-2022:6778)

    Severity
    Critical4
    Qualys ID
    240706
    Date Published
    October 5, 2022
    Vendor Reference
    RHSA-2022:6778
    CVE Reference
    CVE-2022-38177, CVE-2022-38178
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    The berkeley internet name domain (bind) is an implementation of the domain name system (dns) protocols.
    Bind includes a dns server (named); a resolver library (routines for applications to use when interfacing with dns); and tools for verifying that the dns server is operating correctly...Security Fix(es):
      bind: memory leak in ecdsa dnssec verification code (cve-2022-38177).
      Bind: memory leaks in eddsa dnssec verification code (cve-2022-38178).
    Affected Products:
      Red Hat enterprise linux for x86_64 8 x86_64.
      Red hat enterprise linux for x86_64 - extended update support 8.6 x86_64.
      Red hat enterprise linux server - aus 8.6 x86_64.
      Red hat enterprise linux for ibm z systems 8 s390x.
      Red hat enterprise linux for ibm z systems - extended update support 8.6 s390x.
      Red hat enterprise linux for power, little endian 8 ppc64le.
      Red hat enterprise linux for power, little endian - extended update support 8.6 ppc64le.
      Red hat enterprise linux server - tus 8.6 x86_64.
      Red hat enterprise linux for arm 64 8 aarch64.
      Red hat enterprise linux for arm 64 - extended update support 8.6 aarch64.
      Red hat enterprise linux server for power le - update services for sap solutions 8.6 ppc64le.
      Red hat enterprise linux for x86_64 - update services for sap solutions 8.6 x86_64.
    .

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Red Hat security advisory RHSA-2022:6778 for updates and patch information.
    Patches
    Red Hat Enterprise Linux RHSA-2022:6778
  • CVE-2022-3080+
    QID: 240703
    Recently Published

    Red Hat Update for bind9.16 (RHSA-2022:6781)

    Severity
    Critical4
    Qualys ID
    240703
    Date Published
    October 5, 2022
    Vendor Reference
    RHSA-2022:6781
    CVE Reference
    CVE-2022-3080, CVE-2022-38177, CVE-2022-38178
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    Red Hat has released a security update for bind9.16 to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Red Hat security advisory RHSA-2022:6781 for updates and patch information.
    Patches
    Red Hat Enterprise Linux RHSA-2022:6781
  • CVE-2022-3080+
    QID: 160126
    In Development

    Oracle Enterprise Linux Security Update for bind9.16 (ELSA-2022-6781)

    Severity
    Critical4
    Qualys ID
    160126
    Vendor Reference
    ELSA-2022-6781
    CVE Reference
    CVE-2022-3080, CVE-2022-38177, CVE-2022-38178
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    Oracle Enterprise Linux has released a security update for bind9.16 to fix the vulnerabilities.
    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation allows an attacker to compromise the system.
    Solution
    To resolve this issue, upgrade to the latest packages which contain a patch.Refer to Oracle Enterprise Linux advisory below for updates and patch information:

    ELSA-2022-6781
    Patches
    Oracle Linux ELSA-2022-6781
  • CVE-2022-38177+
    QID: 160125
    In Development

    Oracle Enterprise Linux Security Update for bind (ELSA-2022-6778)

    Severity
    Critical4
    Qualys ID
    160125
    Vendor Reference
    ELSA-2022-6778
    CVE Reference
    CVE-2022-38177, CVE-2022-38178
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    Oracle Enterprise Linux has released a security update for bind to fix the vulnerabilities.
    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation allows an attacker to compromise the system.
    Solution
    To resolve this issue, upgrade to the latest packages which contain a patch.Refer to Oracle Enterprise Linux advisory below for updates and patch information:

    ELSA-2022-6778
    Patches
    Oracle Linux ELSA-2022-6778
  • CVE-2021-28861
    QID: 752656
    Recently Published

    SUSE Enterprise Linux Security Update for python3 (SUSE-SU-2022:3511-1)

    Severity
    Critical4
    Qualys ID
    752656
    Date Published
    October 5, 2022
    Vendor Reference
    SUSE-SU-2022:3511-1
    CVE Reference
    CVE-2021-28861
    CVSS Scores
    Base 7.4 / Temporal 6.4
    Description
    SUSE has released a security update for python3 to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise (Desktop|Server) 12 SP5
    SUSE Linux Enterprise Server 12 SP5
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3511-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3511-1
  • CVE-2021-28861
    QID: 752652
    Recently Published

    SUSE Enterprise Linux Security Update for python (SUSE-SU-2022:3512-1)

    Severity
    Critical4
    Qualys ID
    752652
    Date Published
    October 5, 2022
    Vendor Reference
    SUSE-SU-2022:3512-1
    CVE Reference
    CVE-2021-28861
    CVSS Scores
    Base 7.4 / Temporal 6.4
    Description
    SUSE has released a security update for python to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server Basesystem 15 SP3
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3512-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3512-1
  • CVE-2022-3202
    QID: 904086
    In Development

    Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (10949-1)

    Severity
    Critical4
    Qualys ID
    904086
    Vendor Reference
    10949-1
    CVE Reference
    CVE-2022-3202
    CVSS Scores
    Base 7.1 / Temporal 6.2
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has released a security update for kernel to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    CBL-Mariner has issued updated packages to fix this vulnerability. For more information about the vulnerability and obtaining patches, refer to the following CBL-Mariner security advisories:https://github.com/microsoft/CBL-Mariner/releases

    Patches
    CBL-Mariner Linux 10949-1
  • CVE-2022-0850
    QID: 904084
    In Development

    Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (10795-1)

    Severity
    Critical4
    Qualys ID
    904084
    Vendor Reference
    10795-1
    CVE Reference
    CVE-2022-0850
    CVSS Scores
    Base 7.1 / Temporal 6.2
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has released a security update for kernel to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    CBL-Mariner has issued updated packages to fix this vulnerability. For more information about the vulnerability and obtaining patches, refer to the following CBL-Mariner security advisories:https://github.com/microsoft/CBL-Mariner/releases

    Patches
    CBL-Mariner Linux 10795-1
  • CVE-2020-12825
    QID: 752655
    Recently Published

    SUSE Enterprise Linux Security Update for libcroco (SUSE-SU-2022:3493-1)

    Severity
    Critical4
    Qualys ID
    752655
    Date Published
    October 5, 2022
    Vendor Reference
    SUSE-SU-2022:3493-1
    CVE Reference
    CVE-2020-12825
    CVSS Scores
    Base 7.1 / Temporal 6.2
    Description
    SUSE has released a security update for libcroco to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server for SAP Applications 15 SP1
    SUSE Linux Enterprise Server for SAP Applications 15
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3493-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3493-1
  • CVE-2022-3028
    QID: 904110
    In Development

    Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (10814-1)

    Severity
    Critical4
    Qualys ID
    904110
    Vendor Reference
    10814-1
    CVE Reference
    CVE-2022-3028
    CVSS Scores
    Base 7 / Temporal 6.1
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has released a security update for kernel to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    CBL-Mariner has issued updated packages to fix this vulnerability. For more information about the vulnerability and obtaining patches, refer to the following CBL-Mariner security advisories:https://github.com/microsoft/CBL-Mariner/releases

    Patches
    CBL-Mariner Linux 10814-1
  • CVE-2021-33655
    QID: 904104
    In Development

    Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (10621-1)

    Severity
    Serious3
    Qualys ID
    904104
    Vendor Reference
    10621-1
    CVE Reference
    CVE-2021-33655
    CVSS Scores
    Base 6.7 / Temporal 5.8
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has released a security update for kernel to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    CBL-Mariner has issued updated packages to fix this vulnerability. For more information about the vulnerability and obtaining patches, refer to the following CBL-Mariner security advisories:https://github.com/microsoft/CBL-Mariner/releases

    Patches
    CBL-Mariner Linux 10621-1
  • CVE-2022-1508
    QID: 904090
    In Development

    Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (10800-1)

    Severity
    Serious3
    Qualys ID
    904090
    Vendor Reference
    10800-1
    CVE Reference
    CVE-2022-1508
    CVSS Scores
    Base 6.1 / Temporal 5.3
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has released a security update for kernel to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    CBL-Mariner has issued updated packages to fix this vulnerability. For more information about the vulnerability and obtaining patches, refer to the following CBL-Mariner security advisories:https://github.com/microsoft/CBL-Mariner/releases

    Patches
    CBL-Mariner Linux 10800-1
  • CVE-2022-34716
    QID: 904081
    In Development

    Common Base Linux Mariner (CBL-Mariner) Security Update for powershell (10528-1)

    Severity
    Serious3
    Qualys ID
    904081
    Vendor Reference
    10528-1
    CVE Reference
    CVE-2022-34716
    CVSS Scores
    Base 5.9 / Temporal 5.2
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has released a security update for powershell to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    CBL-Mariner has issued updated packages to fix this vulnerability. For more information about the vulnerability and obtaining patches, refer to the following CBL-Mariner security advisories:https://github.com/microsoft/CBL-Mariner/releases

    Patches
    CBL-Mariner Linux 10528-1
  • CVE-2022-3077
    QID: 904109
    In Development

    Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (10947-1)

    Severity
    Serious3
    Qualys ID
    904109
    Vendor Reference
    10947-1
    CVE Reference
    CVE-2022-3077
    CVSS Scores
    Base 5.5 / Temporal 4.8
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has released a security update for kernel to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    CBL-Mariner has issued updated packages to fix this vulnerability. For more information about the vulnerability and obtaining patches, refer to the following CBL-Mariner security advisories:https://github.com/microsoft/CBL-Mariner/releases

    Patches
    CBL-Mariner Linux 10947-1
  • CVE-2022-3078
    QID: 904108
    In Development

    Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (10815-1)

    Severity
    Serious3
    Qualys ID
    904108
    Vendor Reference
    10815-1
    CVE Reference
    CVE-2022-3078
    CVSS Scores
    Base 5.5 / Temporal 4.8
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has released a security update for kernel to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    CBL-Mariner has issued updated packages to fix this vulnerability. For more information about the vulnerability and obtaining patches, refer to the following CBL-Mariner security advisories:https://github.com/microsoft/CBL-Mariner/releases

    Patches
    CBL-Mariner Linux 10815-1
  • CVE-2022-2905
    QID: 904100
    In Development

    Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (10945-1)

    Severity
    Serious3
    Qualys ID
    904100
    Vendor Reference
    10945-1
    CVE Reference
    CVE-2022-2905
    CVSS Scores
    Base 5.5 / Temporal 4.8
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has released a security update for kernel to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    CBL-Mariner has issued updated packages to fix this vulnerability. For more information about the vulnerability and obtaining patches, refer to the following CBL-Mariner security advisories:https://github.com/microsoft/CBL-Mariner/releases

    Patches
    CBL-Mariner Linux 10945-1
  • CVE-2022-1263
    QID: 904099
    In Development

    Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (10812-1)

    Severity
    Serious3
    Qualys ID
    904099
    Vendor Reference
    10812-1
    CVE Reference
    CVE-2022-1263
    CVSS Scores
    Base 5.5 / Temporal 4.8
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has released a security update for kernel to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    CBL-Mariner has issued updated packages to fix this vulnerability. For more information about the vulnerability and obtaining patches, refer to the following CBL-Mariner security advisories:https://github.com/microsoft/CBL-Mariner/releases

    Patches
    CBL-Mariner Linux 10812-1
  • CVE-2020-35538
    QID: 904098
    In Development

    Common Base Linux Mariner (CBL-Mariner) Security Update for libjpeg-turbo (10816-1)

    Severity
    Serious3
    Qualys ID
    904098
    Vendor Reference
    10816-1
    CVE Reference
    CVE-2020-35538
    CVSS Scores
    Base 5.5 / Temporal 4.8
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has released a security update for libjpeg-turbo to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    CBL-Mariner has issued updated packages to fix this vulnerability. For more information about the vulnerability and obtaining patches, refer to the following CBL-Mariner security advisories:https://github.com/microsoft/CBL-Mariner/releases

    Patches
    CBL-Mariner Linux 10816-1
  • CVE-2022-1198
    QID: 904097
    In Development

    Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (10797-1)

    Severity
    Serious3
    Qualys ID
    904097
    Vendor Reference
    10797-1
    CVE Reference
    CVE-2022-1198
    CVSS Scores
    Base 5.5 / Temporal 4.8
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has released a security update for kernel to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    CBL-Mariner has issued updated packages to fix this vulnerability. For more information about the vulnerability and obtaining patches, refer to the following CBL-Mariner security advisories:https://github.com/microsoft/CBL-Mariner/releases

    Patches
    CBL-Mariner Linux 10797-1
  • CVE-2022-39190
    QID: 904094
    In Development

    Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (10877-1)

    Severity
    Serious3
    Qualys ID
    904094
    Vendor Reference
    10877-1
    CVE Reference
    CVE-2022-39190
    CVSS Scores
    Base 5.5 / Temporal 4.8
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has released a security update for kernel to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    CBL-Mariner has issued updated packages to fix this vulnerability. For more information about the vulnerability and obtaining patches, refer to the following CBL-Mariner security advisories:https://github.com/microsoft/CBL-Mariner/releases

    Patches
    CBL-Mariner Linux 10877-1
  • CVE-2022-2153
    QID: 904088
    In Development

    Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (10801-1)

    Severity
    Serious3
    Qualys ID
    904088
    Vendor Reference
    10801-1
    CVE Reference
    CVE-2022-2153
    CVSS Scores
    Base 5.5 / Temporal 4.8
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has released a security update for kernel to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    CBL-Mariner has issued updated packages to fix this vulnerability. For more information about the vulnerability and obtaining patches, refer to the following CBL-Mariner security advisories:https://github.com/microsoft/CBL-Mariner/releases

    Patches
    CBL-Mariner Linux 10801-1
  • CVE-2022-40476
    QID: 904085
    In Development

    Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (10955-1)

    Severity
    Serious3
    Qualys ID
    904085
    Vendor Reference
    10955-1
    CVE Reference
    CVE-2022-40476
    CVSS Scores
    Base 5.5 / Temporal 4.8
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has released a security update for kernel to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    CBL-Mariner has issued updated packages to fix this vulnerability. For more information about the vulnerability and obtaining patches, refer to the following CBL-Mariner security advisories:https://github.com/microsoft/CBL-Mariner/releases

    Patches
    CBL-Mariner Linux 10955-1
  • CVE-2022-3153
    QID: 904083
    In Development

    Common Base Linux Mariner (CBL-Mariner) Security Update for vim (10965-1)

    Severity
    Serious3
    Qualys ID
    904083
    Vendor Reference
    10965-1
    CVE Reference
    CVE-2022-3153
    CVSS Scores
    Base 5.5 / Temporal 4.8
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has released a security update for vim to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    CBL-Mariner has issued updated packages to fix this vulnerability. For more information about the vulnerability and obtaining patches, refer to the following CBL-Mariner security advisories:https://github.com/microsoft/CBL-Mariner/releases

    Patches
    CBL-Mariner Linux 10965-1
  • CVE-2020-35538
    QID: 752653
    Recently Published

    SUSE Enterprise Linux Security Update for libjpeg-turbo (SUSE-SU-2022:3523-1)

    Severity
    Serious3
    Qualys ID
    752653
    Date Published
    October 5, 2022
    Vendor Reference
    SUSE-SU-2022:3523-1
    CVE Reference
    CVE-2020-35538
    CVSS Scores
    Base 5.5 / Temporal 4.8
    Description
    SUSE has released a security update for libjpeg-turbo to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server Basesystem 15 SP3
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3523-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3523-1
  • CVE-2022-41850
    QID: 904112
    In Development

    Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (11081)

    Severity
    Medium2
    Qualys ID
    904112
    Vendor Reference
    Mariner_2.0_11081
    CVE Reference
    CVE-2022-41850
    CVSS Scores
    Base 4.7 / Temporal 4.3
    Description
    CBL-Mariner 2.0 is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for kernel to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • CVE-2021-3521
    QID: 904106
    In Development

    Common Base Linux Mariner (CBL-Mariner) Security Update for rpm (10647-1)

    Severity
    Medium2
    Qualys ID
    904106
    Vendor Reference
    10647-1
    CVE Reference
    CVE-2021-3521
    CVSS Scores
    Base 4.7 / Temporal 4.1
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has released a security update for rpm to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    CBL-Mariner has issued updated packages to fix this vulnerability. For more information about the vulnerability and obtaining patches, refer to the following CBL-Mariner security advisories:https://github.com/microsoft/CBL-Mariner/releases

    Patches
    CBL-Mariner Linux 10647-1
  • CVE-2022-41222
    QID: 904105
    In Development

    Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (10987-1)

    Severity
    Medium2
    Qualys ID
    904105
    Vendor Reference
    10987-1
    CVE Reference
    CVE-2022-41222
    CVSS Scores
    Base 4.7 / Temporal 4.1
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has released a security update for kernel to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    CBL-Mariner has issued updated packages to fix this vulnerability. For more information about the vulnerability and obtaining patches, refer to the following CBL-Mariner security advisories:https://github.com/microsoft/CBL-Mariner/releases

    Patches
    CBL-Mariner Linux 10987-1
  • CVE-2022-40307
    QID: 904095
    In Development

    Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (10954-1)

    Severity
    Medium2
    Qualys ID
    904095
    Vendor Reference
    10954-1
    CVE Reference
    CVE-2022-40307
    CVSS Scores
    Base 4.7 / Temporal 4.1
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has released a security update for kernel to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    CBL-Mariner has issued updated packages to fix this vulnerability. For more information about the vulnerability and obtaining patches, refer to the following CBL-Mariner security advisories:https://github.com/microsoft/CBL-Mariner/releases

    Patches
    CBL-Mariner Linux 10954-1
  • CVE-2022-1205
    QID: 904093
    In Development

    Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (10799-1)

    Severity
    Medium2
    Qualys ID
    904093
    Vendor Reference
    10799-1
    CVE Reference
    CVE-2022-1205
    CVSS Scores
    Base 4.7 / Temporal 4.1
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has released a security update for kernel to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    CBL-Mariner has issued updated packages to fix this vulnerability. For more information about the vulnerability and obtaining patches, refer to the following CBL-Mariner security advisories:https://github.com/microsoft/CBL-Mariner/releases

    Patches
    CBL-Mariner Linux 10799-1
  • CVE-2022-41850
    QID: 904089
    In Development

    Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (11087)

    Severity
    Medium2
    Qualys ID
    904089
    Vendor Reference
    11087
    CVE Reference
    CVE-2022-41850
    CVSS Scores
    Base 4.7 / Temporal 4.3
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for kernel to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • CVE-2022-39188
    QID: 904080
    In Development

    Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (10875-1)

    Severity
    Medium2
    Qualys ID
    904080
    Vendor Reference
    10875-1
    CVE Reference
    CVE-2022-39188
    CVSS Scores
    Base 4.7 / Temporal 4.1
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has released a security update for kernel to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    CBL-Mariner has issued updated packages to fix this vulnerability. For more information about the vulnerability and obtaining patches, refer to the following CBL-Mariner security advisories:https://github.com/microsoft/CBL-Mariner/releases

    Patches
    CBL-Mariner Linux 10875-1
  • CVE-2022-41849
    QID: 904113
    In Development

    Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (11080)

    Severity
    Medium2
    Qualys ID
    904113
    Vendor Reference
    Mariner_2.0_11080
    CVE Reference
    CVE-2022-41849
    CVSS Scores
    Base 4.2 / Temporal 3.9
    Description
    CBL-Mariner 2.0 is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for kernel to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • CVE-2022-41848
    QID: 904111
    In Development

    Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (11079)

    Severity
    Medium2
    Qualys ID
    904111
    Vendor Reference
    Mariner_2.0_11079
    CVE Reference
    CVE-2022-41848
    CVSS Scores
    Base 4.2 / Temporal 3.9
    Description
    CBL-Mariner 2.0 is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for kernel to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • CVE-2022-41849
    QID: 904091
    In Development

    Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (11086)

    Severity
    Medium2
    Qualys ID
    904091
    Vendor Reference
    11086
    CVE Reference
    CVE-2022-41849
    CVSS Scores
    Base 4.2 / Temporal 3.9
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for kernel to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • CVE-2022-41848
    QID: 904087
    In Development

    Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (11085)

    Severity
    Medium2
    Qualys ID
    904087
    Vendor Reference
    11085
    CVE Reference
    CVE-2022-41848
    CVSS Scores
    Base 4.2 / Temporal 3.9
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for kernel to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • CVE-2021-22289
    QID: 591083
    In Development

    B and R Industrial Automation Automation Studio 4 Vulnerability (icsa-22-228-05)

    Severity
    Urgent5
    Qualys ID
    591083
    Vendor Reference
    icsa-22-228-05
    CVE Reference
    CVE-2021-22289
    CVSS Scores
    Base 9.8 / Temporal 8.7
    Description

    AFFECTED PRODUCTS
    B and R Automation reports the vulnerabilities affect the following versions of Automation Studio, a programmable logic controller (PLC) automation programming software: Automation Studio 4: All versions

    QID Detection Logic (Authenticated)
    QID checks for the Vulnerable version using windows registry keys

    Consequence
    An attacker could leverage this vulnerability to execute code within the context of the affected system, which may threaten the integrity and confidentiality of data or cause a denial-of-service condition
    Solution

    Customers are advised to refer to Schneider Electric MITIGATIONS section icsa-22-228-05 for affected packages and patching details.

  • CVE-2018-7243+
    QID: 591080
    In Development

    Schneider Electric MGE Network Management Card Transverse installed in MGE UPS and MGE STS Multiple Vulnerabilities (SEVD-2018-074-01)

    Severity
    Urgent5
    Qualys ID
    591080
    Vendor Reference
    SEVD-2018-074-01
    CVE Reference
    CVE-2018-7243, CVE-2018-7244, CVE-2018-7245, CVE-2018-7246
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description

    AFFECTED PRODUCTS
    MGE SNMP/Web Card Transverse
    MGE Network Management Card Transverse, part number: SF66074. All card versions affected, when installed in following products: MGE Galaxy 5000,MGE Galaxy 6000,MGE Galaxy 9000,MGE EPS 7000,MGE EPS 8000MGE EPS 6000,MGE Comet UPS,MGE Galaxy PW,MGE Galaxy 3000,MGE Galaxy 4000,STS (MGE Upsilon)

    QID Detection Logic (Authenticated):
    QID checks for the Vulnerable version of using passive scanning

    Consequence
    The vulnerabilities identified include: 1. Authorization Bypass 2. Information Exposure 3. Improper Authorization 4. Cleartext Transmission of Sensitive Information
    Solution

    Customers are advised to refer to CERT MITIGATIONS section SEVD-2018-074-01 for affected packages and patching details.

    Patches
    SEVD-2018-074-01
  • CVE-2021-44221+
    QID: 591082
    In Development

    Siemens SIMATIC eaSie Multiple Vulnerabilities (SSA-580125) (ICSA-22-195-15)

    Severity
    Urgent5
    Qualys ID
    591082
    Vendor Reference
    icsa-22-195-15
    CVE Reference
    CVE-2021-44221, CVE-2021-44222
    CVSS Scores
    Base 9.1 / Temporal 7.9
    Description

    AFFECTED PRODUCTS
    SIMATIC eaSie Core Package (6DL5424-0AX00-0AV8):All versions prior to V22.00

    QID Detection Logic (Authenticated)
    QID checks for the Vulnerable version using windows registry keys

    Consequence
    Successful exploitation of these vulnerabilities could allow an unauthenticated attacker to send arbitrary messages within the affected system or to crash attached applications.
    Solution

    Customers are advised to refer to Schneider Electric MITIGATIONS section ssa-580125 for affected packages and patching details.

    Patches
    icsa-22-195-15, ssa-580125
  • CVE-2022-34819+
    QID: 591081
    In Development

    Siemens SIMATIC CP Devices Multiple Vulnerabilities (SSA-517377) (ICSA-22-195-12)

    Severity
    Urgent5
    Qualys ID
    591081
    Vendor Reference
    ssa-517377
    CVE Reference
    CVE-2022-34819, CVE-2022-34820, CVE-2022-34821
    CVSS Scores
    Base 10 / Temporal 8.7
    Description

    AFFECTED PRODUCTS
    SIMATIC CP 1242-7 V2 (6GK7242-7KX31-0XE0): All versions prior to V3.3.46
    SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0): All versions prior to V3.3.46
    SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0): All versions prior to V3.3.46
    SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0): All versions prior to V3.3.46
    SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0): All versions prior to V3.3.46
    SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0): All versions v2.0 and later
    SIMATIC CP 1543-1 (6GK7543-1AX00-0XE0): All versions prior to v3.0.22
    SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0): All versions v2.0 and later
    SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0): All versions v2.0 and later
    SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0): All versions v2.0 and later
    SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0): All versions v2.0 and later
    SIPLUS NET CP 1242-7 V2 (6AG1242-7KX31-7XE0): All versions prior to V3.3.46
    SIPLUS NET CP 1543-1 (6AG1543-1AX00-2XE0): All versions prior to v3.0.22
    SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0): All versions prior to V3.3.46
    SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0): All versions prior to V3.3.46

    QID Detection Logic (Authenticated):
    QID checks for the Vulnerable version of using passive scanning

    Consequence
    These vulnerabilities, if successfully exploited when authorized personnel are using the SINEMA Remote Connect Server (SRCS) VPN feature, could allow an attacker to execute arbitrary code with elevated privileges under certain circumstances.
    Solution

    Customers are advised to refer to CERT MITIGATIONS section ssa-517377 for affected packages and patching details.

    Patches
    icsa-22-195-12, ssa-517377
  • CVE-2021-45341+
    QID: 283166
    In Development

    Fedora Security Update for libdxfrw (FEDORA-2022-3dd3274ae2)

    Severity
    Critical4
    Qualys ID
    283166
    Vendor Reference
    FEDORA-2022-3dd3274ae2
    CVE Reference
    CVE-2021-45341, CVE-2021-45342, CVE-2021-45343
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description
    Fedora has released a security update for libdxfrw to fix the vulnerabilities.

    Affected OS:
    Fedora 35


    Consequence
    This vulnerability could be exploited to gain remote access to sensitive information and execute commands.
    Solution
    Refer to Fedora security advisory Fedora 35 for updates and patch information.
    Patches
    Fedora 35 FEDORA-2022-3dd3274ae2
  • QID: 730619
    In Development

    WordPress Prior to 6.0.2 Multiple Vulnerabilities

    Severity
    Critical4
    Qualys ID
    730619
    Vendor Reference
    Wordpress 6.0.2
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    WordPress is software designed for everyone, emphasizing accessibility, performance, security, and ease of use.



    Affected Versions:
    WordPress versions Prior to 6.0.2

    QID Detection Logic:
    The QID checks for the version via the meta generator tag.

    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Customers are advised to upgrade to the fixed versions 6.0.2 to remediate these vulnerabilities:
    For more Information Please visit WordPress site
    Patches
    Wordpress 6.0.2
  • CVE-2022-20870
    QID: 317234
    In Development

    Cisco Internetwork Operating System (IOS) XE Software for Catalyst Switches MPLS Denial of Service Vulnerability (cisco-sa-iosxe-mpls-dos-Ab4OUL3)

    Severity
    Critical4
    Qualys ID
    317234
    Vendor Reference
    cisco-sa-iosxe-mpls-dos-Ab4OUL3
    CVE Reference
    CVE-2022-20870
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    A vulnerability in the egress MPLS packet processing function of Cisco IOS XE Software for Cisco Catalyst 3650, Catalyst 3850, and Catalyst 9000 Family Switches could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition.

    Affected Products:
    This vulnerability affects the following Cisco products if they are running a vulnerable release of Cisco IOS XE Software and have MPLS configured:
    Catalyst 3650 Series Switches
    Catalyst 3850 Series Switches
    Catalyst 9300 Series Switches
    Catalyst 9400 Series Switches
    Catalyst 9500 Series Switches
    Catalyst 9600 Series Switches
    QID Detection Logic (Authenticated): The check matches Cisco IOS XE version retrieved via Unix Auth using "show version" command. QID Detection Logic (Unauthenticated): The check matches Cisco IOS XE version retrieved via SNMP or TCP/IP Fingerprint or NTP or Telnet.

    Consequence
    A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

    Solution

    Customers are advised to refer to cisco-sa-iosxe-mpls-dos-Ab4OUL3 for more information.

    Patches
    cisco-sa-iosxe-mpls-dos-Ab4OUL3
  • CVE-2022-3100
    QID: 181104
    Recently Published

    Debian Security Update for barbican (DLA 3136-1)

    Severity
    Critical4
    Qualys ID
    181104
    Date Published
    October 5, 2022
    Vendor Reference
    DLA 3136-1
    CVE Reference
    CVE-2022-3100
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Debian has released a security update for barbican to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory DLA 3136-1 for updates and patch information.
    Patches
    Debian DLA 3136-1
  • CVE-2022-22515
    QID: 591078
    In Development

    3S-Smart CodeSYS V3 Multiple Vulnerabilities (Advisory 2022-02)

    Severity
    Critical4
    Qualys ID
    591078
    Vendor Reference
    Advisory 2022-02
    CVE Reference
    CVE-2022-22515
    CVSS Scores
    Base 8.1 / Temporal 7.1
    Description
    Multiple vulnerabilities were discovered in 3S-Smart CodeSYS V3.

    Affected Versions:
    versions prior to V3.5.17.40

    QID Detection Logic:
    The QID checks for App Paths\CODESYS.exe in HKLM in the windows registry to check the vulnerable version of the product.

    Consequence
    An attacker with low skills could exploit the vulnerability by the IEC code executed by the PLC
    Solution
    The vendor has released a patch version V3.5.17.40 and V3.5.18.0.
    Patches
    Advisory 2022-02
  • CVE-2021-21002
    QID: 591079
    In Development

    PHOENIX CONTACT FL COMSERVER UNI Vulnerability (VDE-2021-022)

    Severity
    Critical4
    Qualys ID
    591079
    Vendor Reference
    VDE-2021-022
    CVE Reference
    CVE-2021-21002
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description

    AFFECTED PRODUCTS
    Article no: 2313452, Article: FL COMSERVER UNI 232/422/485, Affected versions: prior to 2.40, Fixed version: 2.41
    Article no: 2904817, Article: FL COMSERVER UNI 232/422/485-T, Affected versions: prior to 2.40, Fixed version: 2.41

    QID Detection Logic (Authenticated):
    QID checks for the Vulnerable version of using passive scanning

    Consequence
    An attacker may use this vulnerability to execute a Denial of Service (DoS) attack.
    Solution

    Customers are advised to refer to CERT MITIGATIONS section VDE-2021-022 for affected packages and patching details.

    Patches
    CVE-2021-21002
  • CVE-2014-0224
    QID: 377614
    In Development

    Filezilla Server Information Disclosure Vulnerability (CVE-2014-0224)

    Severity
    Critical4
    Qualys ID
    377614
    Vendor Reference
    Filezilla server
    CVE Reference
    CVE-2014-0224
    CVSS Scores
    Base 7.4 / Temporal 6.4
    Description
    FileZilla is an FTP program for file uploading and downloading to and from your FTP site, server, or host.

    CVE-2014--0224: OpenSSL does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to hijack sessions or obtain sensitive information, via a crafted TLS handshake, also known as the "CCS Injection" vulnerability. Affected versions

    Filezilla server prior to 0.9.45

    QID detection logic
    It checks for the vulnerable version from the file FileZilla Server.exe

    Consequence
    It may impact the confidentiality and integrity.
    Solution
    Customers are advised to check for Filezilla 0.9.45 (2014-06-07) for more details
    Patches
    0.9.45 (2014-06-07)
  • CVE-2021-26110
    QID: 43917
    Under Investigation

    FortiOS Privilege Escalation Vulnerability (FG-IR-20-131)

    Severity
    Serious3
    Qualys ID
    43917
    Vendor Reference
    FG-IR-20-131
    CVE Reference
    CVE-2021-26110
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    An improper access control vulnerability [CWE-284] in FortiOS and FortiProxy autod daemon may allow an authenticated low-privileged attacker to escalate their privileges to super_admin via a specific crafted configuration of fabric automation CLI script and auto-script features.

    Affected Products:
    FortiOS version 7.0.0
    FortiOS versions 6.4.6 and below
    FortiOS versions 6.2.9 and below
    FortiOS versions 6.0.12 and below
    FortiOS versions 5.6.x
    FortiOS-6K7K version 6.4.2
    FortiOS-6K7K version 6.2.6 and below

    QID Detection Logic (Authenticated):
    Detection checks for vulnerable version of FortiOS.

    Consequence
    Vulnerable version of FortiOS may allow an authenticated low-privileged attacker to escalate their privileges to super_admin via a specific crafted configuration of fabric automation CLI script and auto-script features.

    Solution

    Vendor has released fixes to address this vulnerability
    For more details refer advisory FG-IR-20-131

    Patches
    FG-IR-20-131
  • CVE-2022-27491
    QID: 43919
    Under Investigation

    FortiOS Transmission Control Protocol (TCP) Middlebox Reflection Vulnerability (FG-IR-22-073)

    Severity
    Serious3
    Qualys ID
    43919
    Vendor Reference
    FG-IR-22-073
    CVE Reference
    CVE-2022-27491
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    An improper verification of source of a communication channel vulnerability [CWE-940] in FortiOS may allow a remote and unauthenticated attacker to trigger the sending of "blocked page" HTML data to an arbitrary victim via crafted TCP requests, potentially flooding the victim. This is possible only if at least a firewall policy has inspection mode set to flow-based (default), AND at least a Security Profile is enabled (Web Filter, AntiVirus, IPS, DLP, Application Control, SSL, File filter).

    Affected Products:
    FortiOS version 7.2.0
    FortiOS version 7.0.0 through 7.0.5
    FortiOS version 6.4.0 through 6.4.8
    FortiOS version 6.2.0 through 6.2.10
    FortiOS version 6.0.0 through 6.0.14

    QID Detection Logic (Authenticated):
    Detection checks for vulnerable version of FortiOS.

    Consequence
    Vulnerable version of FortiOSmay allow a remote and unauthenticated attacker to trigger the sending of "blocked page" HTML data to an arbitrary victim via crafted TCP requests, potentially flooding the victim.
    Solution

    Vendor has released fixes to address this vulnerability
    For more details refer advisory FG-IR-22-073

    Patches
    FG-IR-22-073
  • CVE-2022-39261
    QID: 154123
    In Development

    Drupal Core: Twig Template Path Traversal Vulnerability (CVE-2022-39261)

    Severity
    Serious3
    Qualys ID
    154123
    Vendor Reference
    SA-CORE-2022-016
    CVE Reference
    CVE-2022-39261
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    Drupal is a free and open source content management framework written in PHP and distributed under the GNU General Public License.

    Drupal uses the Twig third-party library for content templating and sanitization. Twig is vulnerable to path traversal. When using the filesystem loader to load templates for which the name is a user input, it is possible to use the source or include statement to read arbitrary files from outside the templates directory when using a namespace like @somewhere/../some.file (in such a case, validation is bypassed).

    Affected Versions:
    Drupal 8.0.0 to 9.3.22
    Drupal 9.4.0 to 9.4.7

    QID Detection Logic:(Unauthenticated)
    This QID checks for vulnerable version of Drupal installed on the target.

    Consequence
    Successful exploitation of the vulnerability may allow remote attackers to read sensitive files on the target server.

    Solution
    Customers are advised to install latest Drupal version.
    For more information visit Drupal security advisory SA-CORE-2022-016.
    Patches
    SA-CORE-2022-016
  • CVE-2022-20424
    QID: 181108
    In Development

    Debian Security Update for linux (CVE-2022-20424)

    Severity
    Serious3
    Qualys ID
    181108
    Vendor Reference
    CVE-2022-20424
    CVE Reference
    CVE-2022-20424
    CVSS Scores
    Base 5.5 / Temporal 4.8
    Description
    Debian has released a security update for linux to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory CVE-2022-20424 for updates and patch information.
    Patches
    Debian CVE-2022-20424
  • CVE-2022-20423
    QID: 181107
    Recently Published

    Debian Security Update for linux (CVE-2022-20423)

    Severity
    Serious3
    Qualys ID
    181107
    Date Published
    October 5, 2022
    Vendor Reference
    CVE-2022-20423
    CVE Reference
    CVE-2022-20423
    CVSS Scores
    Base 5.5 / Temporal 4.8
    Description
    Debian has released a security update for linux to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory CVE-2022-20423 for updates and patch information.
    Patches
    Debian CVE-2022-20423
  • CVE-2022-20422
    QID: 181106
    Recently Published

    Debian Security Update for linux (CVE-2022-20422)

    Severity
    Serious3
    Qualys ID
    181106
    Date Published
    October 5, 2022
    Vendor Reference
    CVE-2022-20422
    CVE Reference
    CVE-2022-20422
    CVSS Scores
    Base 5.5 / Temporal 4.8
    Description
    Debian has released a security update for linux to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory CVE-2022-20422 for updates and patch information.
    Patches
    Debian CVE-2022-20422
  • CVE-2022-20421
    QID: 181105
    Recently Published

    Debian Security Update for linux (CVE-2022-20421)

    Severity
    Serious3
    Qualys ID
    181105
    Date Published
    October 5, 2022
    Vendor Reference
    CVE-2022-20421
    CVE Reference
    CVE-2022-20421
    CVSS Scores
    Base 5.5 / Temporal 4.8
    Description
    Debian has released a security update for linux to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory CVE-2022-20421 for updates and patch information.
    Patches
    Debian CVE-2022-20421
  • CVE-2022-29053
    QID: 43918
    Under Investigation

    FortiOS Flaws Over krb Keytab Encryption Scheme (FG-IR-22-158)

    Severity
    Medium2
    Qualys ID
    43918
    Vendor Reference
    FG-IR-22-158
    CVE Reference
    CVE-2022-29053
    CVSS Scores
    Base 3.3 / Temporal 2.9
    Description
    A missing cryptographic steps vulnerability [CWE-325] in the functions that encrypt the keytab files in FortiOS may allow an attacker in possession of the encrypted file to decipher it.

    Affected Products:
    FortiOS version 7.2.0
    FortiOS version 7.0.0 through 7.0.5
    FortiOS version 6.4.0 through 6.4.10
    FortiOS version 6.2.0 through 6.2.11
    FortiOS version 6.0.0 through 6.0.15

    QID Detection Logic (Authenticated):
    Detection checks for vulnerable version of FortiOS.

    Consequence
    Vulnerable version of FortiOS may allow an attacker in possession of the encrypted file to decipher it.
    Solution

    Vendor has released fixes to address this vulnerability
    For more details refer advisory FG-IR-22-158

    Patches
    FG-IR-22-158
  • CVE-2015-0978
    QID: 591077
    Under Investigation

    Elipse Software Elipse E3 Process Control Vulnerability (ICSA-15-069-04A)

    Severity
    Critical4
    Qualys ID
    591077
    Vendor Reference
    ICSA-15-069-04A
    CVE Reference
    CVE-2015-0978
    CVSS Scores
    Base 8.1 / Temporal 7.1
    Description

    AFFECTED PRODUCTS
    The following Elipse E3 versions are affected: Elipse E3, Versions 4.5.232-4.6.161,

    QID Detection Logic (Authenticated)
    QID checks for the Vulnerable version using windows registry keys

    Consequence
    Successful exploitation of this vulnerability would require the victim to install and execute malicious code that could result in arbitrary code execution
    Solution

    Customers are advised to refer to Schneider Electric MITIGATIONS section ICSA-15-069-04A for affected packages and patching details.

    Patches
    ICSA-15-069-04A
  • CVE-2022-20855
    QID: 317233
    Under Investigation

    Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst Access Points Privilege Escalation Vulnerability (cisco-sa-ewc-priv-esc-nderYLtK)

    Severity
    Critical4
    Qualys ID
    317233
    Vendor Reference
    cisco-sa-ewc-priv-esc-nderYLtK
    CVE Reference
    CVE-2022-20855
    CVSS Scores
    Base 6.7 / Temporal 5.8
    Description
    A vulnerability in the self-healing functionality of Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst Access Points could allow an authenticated, local attacker to escape the restricted controller shell and execute arbitrary commands on the underlying operating system of the access point.
    Affected Products
    Cisco Embedded Wireless Controllers on Catalyst Access Points if they are running a vulnerable release of Cisco IOS XE Software.
    Note: No support for Catalyst 9800-CL Wireless Controllers for Cloud

    QID Detection Logic (Authenticated):
    The check matches Cisco IOS XE SDWAN version retrieved via Unix Auth using "show version" command.
    QID Detection Logic (Unauthenticated):
    The check matches Cisco IOS XE version retrieved via SNMP or TCP/IP Fingerprint or NTP or Telnet.

    Consequence
    To successfully exploit this vulnerability, an attacker would need valid credentials for a privilege level 15 user of the wireless controller.

    Solution

    Customers are advised to refer to cisco-sa-ewc-priv-esc-nderYLtK for more information.

    Patches
    cisco-sa-ewc-priv-esc-nderYLtK
  • QID: 150572
    Recently Published

    JWT token in Authorization header uses symmetric algorithm.

    Severity
    Minimal1
    Qualys ID
    150572
    Date Published
    October 5, 2022
    CVSS Scores
    Base 7.3 / Temporal 7.1
    Description
    During the WAS scan , it was observed that JWT token is used in Authorization header contains symmetric algorithm.
    Consequence
    If the server is expecting RSA but is sent HMAC-SHA with RSA's public key, the server will think the public key is actually an HMAC private key. This could be used to forge any data an attacker wants.
    Symmetric algorithm uses a secret key to sign and verify messages. If the key is not strong it will be possible to break it using a brute-force or dictionary attack.
    Solution
    Review the JWT token set in Authorization header to use only one selected signature algorithm.
  • QID: 150571
    Recently Published

    JWT token in Authorization header uses "none" algorithm.

    Severity
    Minimal1
    Qualys ID
    150571
    Date Published
    October 5, 2022
    CVSS Scores
    Base 7.3 / Temporal 7.1
    Description
    During the WAS scan , it was observed that JWT token is used in Authorization header contains "none" algorithm.
    Consequence
    Vulnerability in JWTDecoder.decode can result in an incorrect signature validation of a JWT token. This attack can be exploitable when an attacker crafts a JWT token with a valid header using 'none' as algorithm and a body to requests it be validated.
    Solution
    Review the JWT token set in Authorization header to use the signing algorithms, such as HMAC SHA256 or RSA.
  • QID: 150546
    Recently Published

    First Link Crawled Response Code Information

    Severity
    Minimal1
    Qualys ID
    150546
    Date Published
    October 5, 2022
    CVSS Scores
    Base / Temporal
    Description
    The Web server returned the following information from where the Web application scanning engine initiated. Information reported includes First Link Crawled, response Code, response Header, and response Body (first 500 characters). The first link crawled is the "Web Application URL (or Swagger file URL)" set in the Web Application profile.
    Consequence
    An erroneous response might be indicative of a problem in the Web server, or the scan configuration.
    Solution
    Review the information to check if this is in line with the expected scan configuration. Refer to the output of QIDs 150009, 150019, 150021, 150042 and 150528 (if present) for additional details.
  • QID: 150528
    Recently Published

    Server Returns HTTP 4XX Error Code During Scanning

    Severity
    Minimal1
    Qualys ID
    150528
    Date Published
    October 5, 2022
    CVSS Scores
    Base / Temporal
    Description
    During the WAS scan, links with HTTP 4xx response code were observed and these are listed in the Results section. The HTTP 4xx message indicates a client error. The list of supported 4xx response code are as below:

    400 - Bad Request
    401 - Unauthorized
    403 - Forbidden
    404 - Not Found
    405 - Method Not Allowed
    407 - Proxy Authentication Required
    408 - Request Timeout
    413 - Payload Too Large
    414 - URI Too Long

    Consequence
    The presence of a HTTP 4xx error during the crawl phase indicates that some problem exists on the website that will be encountered during normal usage of the Web application. Note WAS depends on responses to detect many vulnerabilities if the link does not respond with an expected response then any vulnerabilities present on such links may not be detected.
    Solution
    Review each link to determine why the client encountered an error while requesting the link. Review and investigate the results of QID 150042 which lists 5xx errors and QID 150019 which lists unexpected response codes.
  • CVE-2015-20107+
    QID: 240700
    Recently Published

    Red Hat Update for rh-python38-python (RHSA-2022:6766)

    Severity
    Urgent5
    Qualys ID
    240700
    Date Published
    October 4, 2022
    Vendor Reference
    RHSA-2022:6766
    CVE Reference
    CVE-2015-20107, CVE-2020-10735, CVE-2021-28861
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing.
    Python supports interfaces to many system calls and libraries, as well as to various windowing systems...Security Fix(es):
      python(mailcap): findmatch() function does not sanitise the second argument (cve-2015-20107).
      Python: int() type in pylong_fromstring() does not limit amount of digits converting text to int leading to dos (cve-2020-10735).
      Python: an open redirection vulnerability in lib/http/server.py may lead to information disclosure (cve-2021-28861).
    Affected Products:
      Red Hat software collections (for rhel server) 1 for rhel 7 x86_64.
      Red hat software collections (for rhel server for system z) 1 for rhel 7 s390x.
      Red hat software collections (for rhel server for ibm power le) 1 for rhel 7 ppc64le.
      Red hat software collections (for rhel workstation) 1 for rhel 7 x86_64.
    .

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Red Hat security advisory RHSA-2022:6766 for updates and patch information.
    Patches
    Red Hat Enterprise Linux RHSA-2022:6766
  • CVE-2022-32912+
    QID: 752647
    Recently Published

    SUSE Enterprise Linux Security Update for webkit2gtk3 (SUSE-SU-2022:3492-1)

    Severity
    Critical4
    Qualys ID
    752647
    Date Published
    October 4, 2022
    Vendor Reference
    SUSE-SU-2022:3492-1
    CVE Reference
    CVE-2022-32912, CVE-2022-32886
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description
    SUSE has released a security update for webkit2gtk3 to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise (Desktop|Server) 12 SP5
    SUSE Linux Enterprise Server for SAP Applications 12 SP4
    SUSE Linux Enterprise Server 12 SP5
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3492-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3492-1
  • CVE-2022-3307+
    QID: 377613
    Recently Published

    Microsoft Edge Based on Chromium Prior to 106.0.1370.34 Multiple Vulnerabilities

    Severity
    Critical4
    Qualys ID
    377613
    Date Published
    October 4, 2022
    Vendor Reference
    Edge (chromium based) 106.0.1370.34
    CVE Reference
    CVE-2022-3307, CVE-2022-3304, CVE-2022-41035, CVE-2022-3315, CVE-2022-3310, CVE-2022-3311, CVE-2022-3308, CVE-2022-3313, CVE-2022-3316, CVE-2022-3317
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    EdgeChromium has released security update for Mac and Windows to fix the vulnerabilities.
    QID Detection Logic: (Authenticated).
    It checks package versions to check for the vulnerable packages.


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Customers are advised to upgrade to version 106.0.1370.34 or later
    Patches
    Edge (chromium based) 106.0.1370.34
  • CVE-2022-40617
    QID: 198969
    Recently Published

    Ubuntu Security Notification for strongSwan Vulnerability (USN-5651-1)

    Severity
    Critical4
    Qualys ID
    198969
    Date Published
    October 4, 2022
    Vendor Reference
    USN-5651-1
    CVE Reference
    CVE-2022-40617
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Ubuntu has released a security update for strongswan to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Ubuntu security advisory USN-5651-1 for updates and patch information.
    Patches
    Ubuntu Linux USN-5651-1
  • CVE-2022-3172
    QID: 160121
    Recently Published

    Oracle Enterprise Linux Security Update for kubernetes (ELSA-2022-9855)

    Severity
    Critical4
    Qualys ID
    160121
    Date Published
    October 4, 2022
    Vendor Reference
    ELSA-2022-9855
    CVE Reference
    CVE-2022-3172
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Oracle Enterprise Linux has released a security update for kubernetes to fix the vulnerabilities.
    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation allows an attacker to compromise the system.
    Solution
    To resolve this issue, upgrade to the latest packages which contain a patch.Refer to Oracle Enterprise Linux advisory below for updates and patch information:

    ELSA-2022-9855
    Patches
    Oracle Linux ELSA-2022-9855
  • CVE-2022-3172
    QID: 160120
    Recently Published

    Oracle Enterprise Linux Security Update for kubernetes (ELSA-2022-9856)

    Severity
    Critical4
    Qualys ID
    160120
    Date Published
    October 4, 2022
    Vendor Reference
    ELSA-2022-9856
    CVE Reference
    CVE-2022-3172
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Oracle Enterprise Linux has released a security update for kubernetes to fix the vulnerabilities.
    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation allows an attacker to compromise the system.
    Solution
    To resolve this issue, upgrade to the latest packages which contain a patch.Refer to Oracle Enterprise Linux advisory below for updates and patch information:

    ELSA-2022-9856
    Patches
    Oracle Linux ELSA-2022-9856
  • CVE-2022-3080+
    QID: 240702
    Recently Published

    Red Hat Update for bind (RHSA-2022:6763)

    Severity
    Critical4
    Qualys ID
    240702
    Date Published
    October 4, 2022
    Vendor Reference
    RHSA-2022:6763
    CVE Reference
    CVE-2022-3080, CVE-2022-38177, CVE-2022-38178
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    Red Hat has released a security update for bind to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Red Hat security advisory RHSA-2022:6763 for updates and patch information.
    Patches
    Red Hat Enterprise Linux RHSA-2022:6763
  • CVE-2022-38177+
    QID: 240701
    Recently Published

    Red Hat Update for bind (RHSA-2022:6765)

    Severity
    Critical4
    Qualys ID
    240701
    Date Published
    October 4, 2022
    Vendor Reference
    RHSA-2022:6765
    CVE Reference
    CVE-2022-38177, CVE-2022-38178
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    The berkeley internet name domain (bind) is an implementation of the domain name system (dns) protocols.
    Bind includes a dns server (named); a resolver library (routines for applications to use when interfacing with dns); and tools for verifying that the dns server is operating correctly...Security Fix(es):
      bind: memory leak in ecdsa dnssec verification code (cve-2022-38177).
      Bind: memory leaks in eddsa dnssec verification code (cve-2022-38178).
    Affected Products:
      Red Hat enterprise linux server 7 x86_64.
      Red hat enterprise linux workstation 7 x86_64.
      Red hat enterprise linux desktop 7 x86_64.
      Red hat enterprise linux for ibm z systems 7 s390x.
      Red hat enterprise linux for power, big endian 7 ppc64.
      Red hat enterprise linux for scientific computing 7 x86_64.
      Red hat enterprise linux for power, little endian 7 ppc64le.
    .

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Red Hat security advisory RHSA-2022:6765 for updates and patch information.
    Patches
    Red Hat Enterprise Linux RHSA-2022:6765
  • CVE-2022-38177+
    QID: 160122
    Recently Published

    Oracle Enterprise Linux Security Update for bind (ELSA-2022-6765)

    Severity
    Critical4
    Qualys ID
    160122
    Date Published
    October 4, 2022
    Vendor Reference
    ELSA-2022-6765
    CVE Reference
    CVE-2022-38177, CVE-2022-38178
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    Oracle Enterprise Linux has released a security update for bind to fix the vulnerabilities.
    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation allows an attacker to compromise the system.
    Solution
    To resolve this issue, upgrade to the latest packages which contain a patch.Refer to Oracle Enterprise Linux advisory below for updates and patch information:

    ELSA-2022-6765
    Patches
    Oracle Linux ELSA-2022-6765
  • CVE-2022-3080+
    QID: 160119
    Recently Published

    Oracle Enterprise Linux Security Update for bind (ELSA-2022-6763)

    Severity
    Critical4
    Qualys ID
    160119
    Date Published
    October 4, 2022
    Vendor Reference
    ELSA-2022-6763
    CVE Reference
    CVE-2022-3080, CVE-2022-38177, CVE-2022-38178
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    Oracle Enterprise Linux has released a security update for bind to fix the vulnerabilities.
    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation allows an attacker to compromise the system.
    Solution
    To resolve this issue, upgrade to the latest packages which contain a patch.Refer to Oracle Enterprise Linux advisory below for updates and patch information:

    ELSA-2022-6763
    Patches
    Oracle Linux ELSA-2022-6763
  • CVE-2022-32886
    QID: 181099
    Recently Published

    Debian Security Update for webkit2gtk (DLA 3124-1)

    Severity
    Critical4
    Qualys ID
    181099
    Date Published
    October 4, 2022
    Vendor Reference
    DLA 3124-1
    CVE Reference
    CVE-2022-32886
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description
    Debian has released a security update for webkit2gtk to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory DLA 3124-1 for updates and patch information.
    Patches
    Debian DLA 3124-1
  • CVE-2022-37706
    QID: 283165
    Recently Published

    Fedora Security Update for efl (FEDORA-2022-0cc77b384a)

    Severity
    Critical4
    Qualys ID
    283165
    Date Published
    October 4, 2022
    Vendor Reference
    FEDORA-2022-0cc77b384a
    CVE Reference
    CVE-2022-37706
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Fedora has released a security update for efl to fix the vulnerabilities.

    Affected OS:
    Fedora 36


    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Refer to Fedora security advisory Fedora 36 for updates and patch information.
    Patches
    Fedora 36 FEDORA-2022-0cc77b384a
  • CVE-2022-37706
    QID: 283164
    Recently Published

    Fedora Security Update for efl (FEDORA-2022-bafb72fdc0)

    Severity
    Critical4
    Qualys ID
    283164
    Date Published
    October 4, 2022
    Vendor Reference
    FEDORA-2022-bafb72fdc0
    CVE Reference
    CVE-2022-37706
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Fedora has released a security update for efl to fix the vulnerabilities.

    Affected OS:
    Fedora 35


    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Refer to Fedora security advisory Fedora 35 for updates and patch information.
    Patches
    Fedora 35 FEDORA-2022-bafb72fdc0
  • CVE-2022-24810+
    QID: 181094
    Recently Published

    Debian Security Update for net-snmp (DLA 3088-1)

    Severity
    Critical4
    Qualys ID
    181094
    Date Published
    October 4, 2022
    Vendor Reference
    DLA 3088-1
    CVE Reference
    CVE-2022-24810, CVE-2022-24806, CVE-2022-24808, CVE-2022-24807, CVE-2022-24809, CVE-2022-24805
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Debian has released a security update for net-snmp to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory DLA 3088-1 for updates and patch information.
    Patches
    Debian DLA 3088-1
  • CVE-2021-4156
    QID: 181101
    Recently Published

    Debian Security Update for libsndfile (DLA 3126-1)

    Severity
    Critical4
    Qualys ID
    181101
    Date Published
    October 4, 2022
    Vendor Reference
    DLA 3126-1
    CVE Reference
    CVE-2021-4156
    CVSS Scores
    Base 8.1 / Temporal 7.1
    Description
    Debian has released a security update for libsndfile to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory DLA 3126-1 for updates and patch information.
    Patches
    Debian DLA 3126-1
  • CVE-2022-37797
    QID: 181100
    Recently Published

    Debian Security Update for lighttpd (DLA 3133-1)

    Severity
    Critical4
    Qualys ID
    181100
    Date Published
    October 4, 2022
    Vendor Reference
    DLA 3133-1
    CVE Reference
    CVE-2022-37797
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    Debian has released a security update for lighttpd to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory DLA 3133-1 for updates and patch information.
    Patches
    Debian DLA 3133-1
  • CVE-2020-29260+
    QID: 181098
    Recently Published

    Debian Security Update for libvncserver (DLA 3125-1)

    Severity
    Critical4
    Qualys ID
    181098
    Date Published
    October 4, 2022
    Vendor Reference
    DLA 3125-1
    CVE Reference
    CVE-2020-29260, CVE-2020-25708
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    Debian has released a security update for libvncserver to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory DLA 3125-1 for updates and patch information.
    Patches
    Debian DLA 3125-1
  • CVE-2022-27380+
    QID: 181097
    Recently Published

    Debian Security Update for mariadb-10.3 (DLA 3114-1)

    Severity
    Critical4
    Qualys ID
    181097
    Date Published
    October 4, 2022
    Vendor Reference
    DLA 3114-1
    CVE Reference
    CVE-2022-27380, CVE-2022-27381, CVE-2022-27456, CVE-2022-27376, CVE-2022-27379, CVE-2022-27448, CVE-2022-27449, CVE-2022-32085, CVE-2022-32087, CVE-2022-27386, CVE-2022-27445, CVE-2022-27384, CVE-2022-27383, CVE-2022-32088, CVE-2022-32091, CVE-2022-27378, CVE-2022-27452, CVE-2018-25032, CVE-2022-27447, CVE-2022-32083, CVE-2022-32084, CVE-2022-27458, CVE-2021-46669, CVE-2022-27387, CVE-2022-21427, CVE-2022-27377
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    Debian has released a security update for mariadb-10.3 to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory DLA 3114-1 for updates and patch information.
    Patches
    Debian DLA 3114-1
  • CVE-2022-2255
    QID: 181096
    Recently Published

    Debian Security Update for mod-wsgi (DLA 3111-1)

    Severity
    Critical4
    Qualys ID
    181096
    Date Published
    October 4, 2022
    Vendor Reference
    DLA 3111-1
    CVE Reference
    CVE-2022-2255
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    Debian has released a security update for mod-wsgi to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory DLA 3111-1 for updates and patch information.
    Patches
    Debian DLA 3111-1
  • CVE-2022-25857+
    QID: 181092
    Recently Published

    Debian Security Update for snakeyaml (DLA 3132-1)

    Severity
    Critical4
    Qualys ID
    181092
    Date Published
    October 4, 2022
    Vendor Reference
    DLA 3132-1
    CVE Reference
    CVE-2022-25857, CVE-2022-38749, CVE-2022-38751, CVE-2022-38750
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    Debian has released a security update for snakeyaml to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory DLA 3132-1 for updates and patch information.
    Patches
    Debian DLA 3132-1
  • CVE-2022-20915
    QID: 317232
    Recently Published

    Cisco Internetwork Operating System (IOS) XE Software Internet Protocol (IPv6) Virtual Private Network (VPN) over MPLS Denial of Service (DoS) Vulnerability (cisco-sa-iosxe-6vpe-dos-tJBtf5Zv)

    Severity
    Critical4
    Qualys ID
    317232
    Date Published
    October 4, 2022
    Vendor Reference
    cisco-sa-iosxe-6vpe-dos-tJBtf5Zv
    CVE Reference
    CVE-2022-20915
    CVSS Scores
    Base 7.4 / Temporal 6.4
    Description
    A vulnerability in the implementation of IPv6 VPN over MPLS (6VPE) with Zone-Based Firewall (ZBFW) of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.

    Affected Products:
    This vulnerability affects Cisco devices if they are running a vulnerable release of Cisco IOS XE Software and have both 6VPE and ZBFW features enabled.

    QID Detection Logic (Authenticated):
    The check matches Cisco IOS XE version retrieved via Unix Auth using "show version" command.
    QID Detection Logic (Unauthenticated):
    The check matches Cisco IOS XE version retrieved via SNMP or TCP/IP Fingerprint or NTP or Telnet.
    Note: This QID does not checks for the workaround hence kept as practice

    Consequence
    A successful exploit could allow the attacker to reload the device, resulting in a DoS condition.

    Solution

    Customers are advised to refer to cisco-sa-iosxe-6vpe-dos-tJBtf5Zv for more information.

    Patches
    cisco-sa-iosxe-6vpe-dos-tJBtf5Zv
  • QID: 181102
    Recently Published

    Debian Security Update for tzdata (DLA 3134-1)

    Severity
    Serious3
    Qualys ID
    181102
    Date Published
    October 4, 2022
    Vendor Reference
    DLA 3134-1
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Debian has released a security update for tzdata to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory DLA 3134-1 for updates and patch information.
    Patches
    Debian DLA 3134-1
  • QID: 181095
    Recently Published

    Debian Security Update for libdatetime-timezone-perl (DLA 3135-1)

    Severity
    Serious3
    Qualys ID
    181095
    Date Published
    October 4, 2022
    Vendor Reference
    DLA 3135-1
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Debian has released a security update for libdatetime-timezone-perl to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory DLA 3135-1 for updates and patch information.
    Patches
    Debian DLA 3135-1
  • CVE-2022-31081
    QID: 181103
    Recently Published

    Debian Security Update for libhttp-daemon-perl (DLA 3127-1)

    Severity
    Serious3
    Qualys ID
    181103
    Date Published
    October 4, 2022
    Vendor Reference
    DLA 3127-1
    CVE Reference
    CVE-2022-31081
    CVSS Scores
    Base 6.5 / Temporal 5.7
    Description
    Debian has released a security update for libhttp-daemon-perl to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory DLA 3127-1 for updates and patch information.
    Patches
    Debian DLA 3127-1
  • CVE-2022-31629+
    QID: 150578
    In Development

    PHP Multiple Vulnerabilities (CVE-2022-31629,CVE-2022-31628)

    Severity
    Serious3
    Qualys ID
    150578
    Vendor Reference
    Sec Bug 81726, Sec Bug 81727
    CVE Reference
    CVE-2022-31629, CVE-2022-31628
    CVSS Scores
    Base 6.5 / Temporal 5.9
    Description
    PHP is a programming language originally designed for use in web-based applications with HTML content. PHP supports a wide variety of platforms and is used by numerous web-based software applications.

    Affected versions of PHP has multiple vulnerabilities:
    CVE-2022-31628 : The vulnerability exists due to infinite loop within the phar uncompressor code when processing "quines" gzip files. A remote attacker can pass a specially crafted archive to the application, consume all available system resources and cause denial of service conditions.

    CVE-2022-31629: The vulnerability exists due to the way PHP handles HTTP variable names. A remote attacker can set a standard insecure cookie in the victim's browser which is treated as a '__Host-' or '__Secure-' cookie by PHP applications.

    Affected Versions:
    PHP versions before 7.4.31
    PHP versions 8.0.0 prior to 8.0.24
    PHP versions 8.1.0 prior to 8.1.11

    QID Detection Logic (Unauthenticated):
    This QID checks the HTTP Server header to see if the server is running a vulnerable version of PHP.

    Consequence
    The vulnerability allows a remote attacker to perform a denial of service (DoS) attack or bypass implemented security restrictions.

    Solution
    Customers are advised to upgrade to the latest version of PHP.
    For more information please refer to Sec Bug 81726 and Sec Bug 81727 .

    Patches
    Sec Bug 81726, Sec Bug 81727
  • CVE-2021-43980
    QID: 150579
    In Development

    Apache Tomcat Information Disclosure Vulnerability (CVE-2021-43980)

    Severity
    Serious3
    Qualys ID
    150579
    Vendor Reference
    Apache Tomcat
    CVE Reference
    CVE-2021-43980
    CVSS Scores
    Base 3.7 / Temporal 3.2
    Description
    Apache Tomcat is an open source web server and servlet container developed by the Apache Software Foundation.

    The simplified implementation of blocking reads and writes exposed a long standing (but extremely hard to trigger) concurrency bug in Apache Tomcat that could cause client connections to share an Http11Processor instance resulting in responses, or part responses, to be received by the wrong client.

    Affected Versions:
    Apache Tomcat 10.1.0-M1 to 10.1.0-M12
    Apache Tomcat 10.0.0-M1 to 10.0.18
    Apache Tomcat 9.0.0-M1 to 9.0.60
    Apache Tomcat 8.5.0 to 8.5.77

    QID Detection Logic (Unauthenticated):
    This QID sends a HTTP GET request to a invalid URL and based on the response confirms the vulnerable instance of Apache Tomcat running on the host.

    Consequence
    Successful exploitation of this vulnerability could reveal sensitive information to an unauthorized attacker.

    Solution
    Customers are advised to upgrade Apache Tomcat to new version to remediate this vulnerability. For more information please refer to Apache Tomcat Security Advisory.

    Patches
    Apache Tomcat
  • CVE-2022-3204
    QID: 904059
    Recently Published

    Common Base Linux Mariner (CBL-Mariner) Security Update for unbound (11041)

    Severity
    Critical4
    Qualys ID
    904059
    Date Published
    October 4, 2022
    Vendor Reference
    11041
    CVE Reference
    CVE-2022-3204
    CVSS Scores
    Base 7.5 / Temporal 6.9
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for unbound to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • CVE-2022-20847
    QID: 317223
    Recently Published

    Cisco Internetwork Operating System (IOS) XE Wireless Controller Software for the Catalyst 9000 Family DHCP Processing Denial of Service (DoS) Vulnerability (cisco-sa-wlc-dhcp-dos-76pCjPxK)

    Severity
    Critical4
    Qualys ID
    317223
    Date Published
    October 4, 2022
    Vendor Reference
    cisco-sa-wlc-dhcp-dos-76pCjPxK
    CVE Reference
    CVE-2022-20847
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    A vulnerability in the DHCP processing functionality of Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.

    Affected Products
    This vulnerability affects the following Cisco products if they are running a vulnerable release of Cisco IOS XE Software and they have the DHCP TLV caching feature enabled:
    Catalyst 9800-CL Wireless Controllers for Cloud
    Catalyst 9800 Series Wireless Controllers
    Note: This QID does not check if DHCP TLV caching feature is enabled.

    Consequence
    A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

    Solution

    Customers are advised to refer to cisco-sa-wlc-dhcp-dos-76pCjPxK for more information.

    Patches
    cisco-sa-wlc-dhcp-dos-76pCjPxK
  • CVE-2022-0778
    QID: 87523
    Recently Published

    Apache Httpd Server Open Secure Sockets Layer (OpenSSL) Denial of Service (DoS) Vulnerability

    Severity
    Critical4
    Qualys ID
    87523
    Date Published
    October 4, 2022
    Vendor Reference
    Apache httpd 2.4.52
    CVE Reference
    CVE-2022-0778
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    Apache HTTP Server is an HTTP web server application.

    Apache HTTP Server is exposed to the following vulnerability.
    Affected Version:- Apache httpd 2.4.52

    QID Detection Logic (Unauthenticated):
    This QID matches vulnerable versions based on the exposed banner information under the HTTP service.

    Consequence
    Successfully exploiting of this Vulnerability Could allow a remote attacker to cause denial of service.

    Solution
    These vulnerabilities have been patched in Apache. Refer to Apache httpd 2.4.52 or your Linux distro for further details.

    Patches
    Apache httpd 2.4.52
  • CVE-2022-35957
    QID: 150576
    Recently Published

    Grafana Authentication Bypass Vulnerability (CVE-2022-35957)

    Severity
    Serious3
    Qualys ID
    150576
    Date Published
    October 4, 2022
    Vendor Reference
    Github
    CVE Reference
    CVE-2022-35957
    CVSS Scores
    Base 6.6 / Temporal 5.8
    Description

    Grafana is a multi-platform open source analytics and interactive visualization web application. It provides charts, graphs, and alerts for the web when connected to supported data sources.

    Affected versions of Grafana is vulnerable to an escalation from admin to server admin when auth proxy is used, allowing an admin to take over the server admin account and gain full control of the grafana instance.

    Affected Versions:
    Grafana versions before 8.5.13
    Grafana versions from 9.0.0 to 9.0.9
    Grafana versions from 9.1.0 to 9.1.6

    QID Detection Logic :
    This QID sends an HTTP GET request and retrieves a vulnerable version of a Grafana running on the target application.

    Consequence
    Successful exploitation could allow an attacker to take over the server admin account and gain full control of the grafana instance.

    Solution
    Customers are advised to upgrade to Grafana to later version to remediate this vulnerability. For more information regarding this vulnerability please refer Github Advisory.
    Patches
    Github
  • CVE-2022-2639
    QID: 377597
    Recently Published

    Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX2-SA-2022:0040)

    Severity
    Critical4
    Qualys ID
    377597
    Date Published
    October 4, 2022
    Vendor Reference
    ALINUX2-SA-2022:0040
    CVE Reference
    CVE-2022-2639
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    Alibaba Cloud Linux has released a security update for cloud-kernel to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect confidentiality, integrity, and availability.
    Solution
    Refer to Alibaba Cloud Linux security advisory ALINUX2-SA-2022:0040 for updates and patch information.
    Patches
    Alibaba Cloud Linux ALINUX2-SA-2022:0040
  • CVE-2022-22536
    QID: 150561
    Recently Published

    SAP NetWeaver Request Smuggling and Request Concatenation Vulnerability

    Severity
    Urgent5
    Qualys ID
    150561
    Date Published
    October 4, 2022
    Vendor Reference
    SAP Security Blog
    CVE Reference
    CVE-2022-22536
    CVSS Scores
    Base 10 / Temporal 9
    Description
    SAP NetWeaver Application Server or SAP Web Application Server is a component of SAP NetWeaver which works as a web application server for SAP products.

    SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server 7.53 and SAP Web Dispatcher are vulnerable for request smuggling and request concatenation. An unauthenticated attacker can prepend a victim's request with arbitrary data. This way, the attacker can execute functions impersonating the victim or poison intermediary Web caches. A successful attack could result in complete compromise of Confidentiality, Integrity and Availability of the system.

    Affected Versions:
    Product - SAP NetWeaver Application Server Java, Versions - KRNL64NUC 7.22, 7.22EXT, 7.49, KRNL64UC, 7.22, 7.22EXT, 7.49, 7.53, KERNEL 7.22, 7.49, 7.53

    QID Detection Logic :
    This QID sends an HTTP GET request and determines version based on the Server Header.

    Consequence
    Exploitation of the vulnerability could lead to HTTP request smuggling attack.

    Solution
    Customers are advised to upgrade latest version to remediate this vulnerability. For more information regarding this vulnerability please refer SAP Security Blog.
    Patches
    SAP Security Blog
  • CVE-2021-46162+
    QID: 590801
    Recently Published

    Siemens Simcenter Femap Multiple Vulnerabilities (ICSA-22-069-10,SSA-94918)

    Severity
    Critical4
    Qualys ID
    590801
    Date Published
    October 4, 2022
    Vendor Reference
    ICSA-22-069-10, SSA-949188
    CVE Reference
    CVE-2021-46162, CVE-2021-46699
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description

    AFFECTED PRODUCTS
    Siemens reports these vulnerabilities affect the following Simcenter Femap simulation applications:
    Simcenter Femap: All versions prior to v2022.1

    QID Detection Logic (Authenticated):
    QID checks for the Vulnerable version of Siemens using registry "HKLM\SOFTWARE\Siemens"

    Consequence
    Successful exploitation of these vulnerabilities could allow an attacker to leverage the vulnerabilities to leak information or perform remote code execution in the context of the current process.
    Solution

    Customers are advised to refer to CERT MITIGATIONS section ICSA-22-069-10 or SSA-94918 for affected packages and patching details.

    Patches
    ICSA-22-069-10, SSA-949188
  • CVE-2022-3373+
    QID: 181093
    Recently Published

    Debian Security Update for chromium (DSA 5245-1)

    Severity
    Critical4
    Qualys ID
    181093
    Date Published
    October 3, 2022
    Vendor Reference
    DSA 5245-1
    CVE Reference
    CVE-2022-3373, CVE-2022-3370
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Debian has released a security update for chromium to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory DSA 5245-1 for updates and patch information.
    Patches
    Debian DSA 5245-1
  • CVE-2022-39188+
    QID: 181091
    Recently Published

    Debian Security Update for linux (DLA 3131-1)

    Severity
    Critical4
    Qualys ID
    181091
    Date Published
    October 3, 2022
    Vendor Reference
    DLA 3131-1
    CVE Reference
    CVE-2022-39188, CVE-2022-40307, CVE-2022-1679, CVE-2022-2588, CVE-2022-33742, CVE-2022-33741, CVE-2022-3028, CVE-2022-2663, CVE-2021-33656, CVE-2022-2318, CVE-2021-4159, CVE-2022-26373, CVE-2022-33740, CVE-2022-26365, CVE-2021-33655, CVE-2022-36879, CVE-2022-2153, CVE-2022-33744, CVE-2022-2586, CVE-2022-36946, CVE-2022-39842, CVE-2022-1462
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    Debian has released a security update for linux to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory DLA 3131-1 for updates and patch information.
    Patches
    Debian DLA 3131-1
  • CVE-2022-40674
    QID: 752644
    Recently Published

    SUSE Enterprise Linux Security Update for expat (SUSE-SU-2022:3489-1)

    Severity
    Urgent5
    Qualys ID
    752644
    Date Published
    October 3, 2022
    Vendor Reference
    SUSE-SU-2022:3489-1
    CVE Reference
    CVE-2022-40674
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    SUSE has released a security update for expat to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server Basesystem 15 SP4
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3489-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3489-1
  • CVE-2022-32886+
    QID: 752646
    Recently Published

    SUSE Enterprise Linux Security Update for webkit2gtk3 (SUSE-SU-2022:3488-1)

    Severity
    Critical4
    Qualys ID
    752646
    Date Published
    October 3, 2022
    Vendor Reference
    SUSE-SU-2022:3488-1
    CVE Reference
    CVE-2022-32886, CVE-2022-32912
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description
    SUSE has released a security update for webkit2gtk3 to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server Basesystem 15 SP4
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3488-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3488-1
  • CVE-2022-31625+
    QID: 502517
    Recently Published

    Alpine Linux Security Update for php8

    Severity
    Critical4
    Qualys ID
    502517
    Date Published
    October 3, 2022
    Vendor Reference
    php8
    CVE Reference
    CVE-2022-31625, CVE-2022-31626, CVE-2022-31628, CVE-2022-31629
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description
    Alpine Linux has released a security update for php8 to fix the vulnerabilities.

    Affected versions:
    Alpine Linux 3.16


    Affected Package versions prior to 8.0.24-r0.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Alpine Linux advisory php8 for updates and patch information.
    Patches
    Alpine Linux php8-8.0.24-r0
  • CVE-2022-41766+
    QID: 690951
    Recently Published

    Free Berkeley Software Distribution (FreeBSD) Security Update for mediawiki (67057b48-41f4-11ed-86c3-080027881239)

    Severity
    Critical4
    Qualys ID
    690951
    Date Published
    October 3, 2022
    Vendor Reference
    67057b48-41f4-11ed-86c3-080027881239
    CVE Reference
    CVE-2022-41766, CVE-2022-41767, CVE-2022-41765
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    FreeBSD has released a security update for mediawiki to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to FreeBSD security advisory 67057b48-41f4-11ed-86c3-080027881239 for updates and patch information.
    Patches
    "FreeBSD" 67057b48-41f4-11ed-86c3-080027881239
  • CVE-2022-41322
    QID: 283163
    Recently Published

    Fedora Security Update for kitty (FEDORA-2022-d718af66d1)

    Severity
    Critical4
    Qualys ID
    283163
    Date Published
    October 3, 2022
    Vendor Reference
    FEDORA-2022-d718af66d1
    CVE Reference
    CVE-2022-41322
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    Fedora has released a security update for kitty to fix the vulnerabilities.

    Affected OS:
    Fedora 36


    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Refer to Fedora security advisory Fedora 36 for updates and patch information.
    Patches
    Fedora 36 FEDORA-2022-d718af66d1
  • CVE-2020-10735+
    QID: 752643
    Recently Published

    SUSE Enterprise Linux Security Update for python39 (SUSE-SU-2022:3485-1)

    Severity
    Critical4
    Qualys ID
    752643
    Date Published
    October 3, 2022
    Vendor Reference
    SUSE-SU-2022:3485-1
    CVE Reference
    CVE-2020-10735, CVE-2021-28861
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    SUSE has released a security update for python39 to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server Basesystem 15 SP3
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3485-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3485-1
  • CVE-2022-31628+
    QID: 502518
    Recently Published

    Alpine Linux Security Update for php81

    Severity
    Serious3
    Qualys ID
    502518
    Date Published
    October 3, 2022
    Vendor Reference
    php81
    CVE Reference
    CVE-2022-31628, CVE-2022-31629
    CVSS Scores
    Base 6.5 / Temporal 5.7
    Description
    Alpine Linux has released a security update for php81 to fix the vulnerabilities.

    Affected versions:
    Alpine Linux 3.16


    Affected Package versions prior to 8.1.11-r0.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Alpine Linux advisory php81 for updates and patch information.
    Patches
    Alpine Linux php81-8.1.11-r0
  • CVE-2022-36056
    QID: 752645
    Recently Published

    SUSE Enterprise Linux Security Update for cosign (SUSE-SU-2022:3486-1)

    Severity
    Serious3
    Qualys ID
    752645
    Date Published
    October 3, 2022
    Vendor Reference
    SUSE-SU-2022:3486-1
    CVE Reference
    CVE-2022-36056
    CVSS Scores
    Base 5.5 / Temporal 4.8
    Description
    SUSE has released a security update for cosign to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server Basesystem 15 SP4
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3486-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3486-1
  • CVE-2019-17545+
    QID: 181087
    Recently Published

    Debian Security Update for gdal (DLA 3129-1)

    Severity
    Urgent5
    Qualys ID
    181087
    Date Published
    October 3, 2022
    Vendor Reference
    DLA 3129-1
    CVE Reference
    CVE-2019-17545, CVE-2021-45943
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Debian has released a security update for gdal to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory DLA 3129-1 for updates and patch information.
    Patches
    Debian DLA 3129-1
  • CVE-2020-7677
    QID: 181086
    Recently Published

    Debian Security Update for node-thenify (DLA 3128-1)

    Severity
    Urgent5
    Qualys ID
    181086
    Date Published
    October 3, 2022
    Vendor Reference
    DLA 3128-1
    CVE Reference
    CVE-2020-7677
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Debian has released a security update for node-thenify to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory DLA 3128-1 for updates and patch information.
    Patches
    Debian DLA 3128-1
  • CVE-2019-12520+
    QID: 160118
    Recently Published

    Oracle Enterprise Linux Security Update for squid (ELSA-2022-22254)

    Severity
    Urgent5
    Qualys ID
    160118
    Date Published
    October 3, 2022
    Vendor Reference
    ELSA-2022-22254
    CVE Reference
    CVE-2019-12520, CVE-2019-12524, CVE-2019-12523
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Oracle Enterprise Linux has released a security update for squid to fix the vulnerabilities.
    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation allows an attacker to compromise the system.
    Solution
    To resolve this issue, upgrade to the latest packages which contain a patch.Refer to Oracle Enterprise Linux advisory below for updates and patch information:

    ELSA-2022-22254
    Patches
    Oracle Linux ELSA-2022-22254
  • CVE-2020-10696+
    QID: 752641
    Recently Published

    SUSE Enterprise Linux Security Update for buildah (SUSE-SU-2022:3480-1)

    Severity
    Critical4
    Qualys ID
    752641
    Date Published
    October 3, 2022
    Vendor Reference
    SUSE-SU-2022:3480-1
    CVE Reference
    CVE-2020-10696, CVE-2022-27651, CVE-2021-20206
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description
    SUSE has released a security update for buildah to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server for SAP Applications 15 SP2
    SUSE Linux Enterprise Server for SAP Applications 15 SP1
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3480-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3480-1
  • CVE-2022-3018+
    QID: 690950
    Recently Published

    Free Berkeley Software Distribution (FreeBSD) Security Update for gitlab (04422df1-40d8-11ed-9be7-454b1dd82c64)

    Severity
    Critical4
    Qualys ID
    690950
    Date Published
    October 3, 2022
    Vendor Reference
    04422df1-40d8-11ed-9be7-454b1dd82c64
    CVE Reference
    CVE-2022-3018, CVE-2022-3283, CVE-2022-3293, CVE-2022-3067, CVE-2022-3330, CVE-2022-3288, CVE-2022-3066, CVE-2022-3286, CVE-2022-3060, CVE-2022-3325, CVE-2022-2882, CVE-2022-3291, CVE-2022-3351, CVE-2022-3285, CVE-2022-3279, CVE-2022-2904
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    FreeBSD has released a security update for gitlab to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to FreeBSD security advisory 04422df1-40d8-11ed-9be7-454b1dd82c64 for updates and patch information.
    Patches
    "FreeBSD" 04422df1-40d8-11ed-9be7-454b1dd82c64
  • CVE-2022-3373+
    QID: 690949
    Recently Published

    Free Berkeley Software Distribution (FreeBSD) Security Update for chromium (d459c914-4100-11ed-9bc7-3065ec8fd3ec)

    Severity
    Critical4
    Qualys ID
    690949
    Date Published
    October 3, 2022
    Vendor Reference
    d459c914-4100-11ed-9bc7-3065ec8fd3ec
    CVE Reference
    CVE-2022-3373, CVE-2022-3370
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    FreeBSD has released a security update for chromium to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to FreeBSD security advisory d459c914-4100-11ed-9bc7-3065ec8fd3ec for updates and patch information.
    Patches
    "FreeBSD" d459c914-4100-11ed-9bc7-3065ec8fd3ec
  • QID: 283157
    Recently Published

    Fedora Security Update for thunderbird (FEDORA-2022-df4ffc6551)

    Severity
    Critical4
    Qualys ID
    283157
    Date Published
    October 3, 2022
    Vendor Reference
    FEDORA-2022-df4ffc6551
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Fedora has released a security update for thunderbird to fix the vulnerabilities.

    Affected OS:
    Fedora 36


    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Refer to Fedora security advisory Fedora 36 for updates and patch information.
    Patches
    Fedora 36 FEDORA-2022-df4ffc6551
  • CVE-2022-40959+
    QID: 198968
    Recently Published

    Ubuntu Security Notification for Firefox Vulnerabilities (USN-5649-1)

    Severity
    Critical4
    Qualys ID
    198968
    Date Published
    October 3, 2022
    Vendor Reference
    USN-5649-1
    CVE Reference
    CVE-2022-40959, CVE-2022-40958, CVE-2022-40960, CVE-2022-40956, CVE-2022-40957, CVE-2022-3266, CVE-2022-40962
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Ubuntu has released a security update for firefox to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Ubuntu security advisory USN-5649-1 for updates and patch information.
    Patches
    Ubuntu Linux USN-5649-1
  • CVE-2022-3352
    QID: 904076
    Recently Published

    Common Base Linux Mariner (CBL-Mariner) Security Update for vim (11062)

    Severity
    Critical4
    Qualys ID
    904076
    Date Published
    October 3, 2022
    Vendor Reference
    Mariner_2.0_11062
    CVE Reference
    CVE-2022-3352
    CVSS Scores
    Base 7.8 / Temporal 7.1
    Description
    CBL-Mariner 2.0 is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for vim to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • CVE-2022-3352
    QID: 904072
    Recently Published

    Common Base Linux Mariner (CBL-Mariner) Security Update for vim (11075)

    Severity
    Critical4
    Qualys ID
    904072
    Date Published
    October 3, 2022
    Vendor Reference
    11075
    CVE Reference
    CVE-2022-3352
    CVSS Scores
    Base 7.8 / Temporal 7.1
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for vim to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • CVE-2022-33741+
    QID: 198967
    Recently Published

    Ubuntu Security Notification for Linux kernel (GKE) Vulnerabilities (USN-5648-1)

    Severity
    Critical4
    Qualys ID
    198967
    Date Published
    October 3, 2022
    Vendor Reference
    USN-5648-1
    CVE Reference
    CVE-2022-33741, CVE-2022-26365, CVE-2022-34494, CVE-2021-33655, CVE-2022-33742, CVE-2022-36946, CVE-2022-33744, CVE-2022-33740, CVE-2022-2318, CVE-2022-34495, CVE-2022-33743
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    Ubuntu has released a security update for linux to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Ubuntu security advisory USN-5648-1 for updates and patch information.
    Patches
    Ubuntu Linux USN-5648-1
  • CVE-2022-40188
    QID: 283162
    Recently Published

    Fedora Security Update for knot (FEDORA-2022-357cc1a81b)

    Severity
    Critical4
    Qualys ID
    283162
    Date Published
    October 3, 2022
    Vendor Reference
    FEDORA-2022-357cc1a81b
    CVE Reference
    CVE-2022-40188
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    Fedora has released a security update for knot to fix the vulnerabilities.

    Affected OS:
    Fedora 35


    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Refer to Fedora security advisory Fedora 35 for updates and patch information.
    Patches
    Fedora 35 FEDORA-2022-357cc1a81b
  • CVE-2022-40188
    QID: 283161
    Recently Published

    Fedora Security Update for knot (FEDORA-2022-2a4ca7b18d)

    Severity
    Critical4
    Qualys ID
    283161
    Date Published
    October 3, 2022
    Vendor Reference
    FEDORA-2022-2a4ca7b18d
    CVE Reference
    CVE-2022-40188
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    Fedora has released a security update for knot to fix the vulnerabilities.

    Affected OS:
    Fedora 36


    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Refer to Fedora security advisory Fedora 36 for updates and patch information.
    Patches
    Fedora 36 FEDORA-2022-2a4ca7b18d
  • CVE-2022-38178+
    QID: 283158
    Recently Published

    Fedora Security Update for bind (FEDORA-2022-b197d64471)

    Severity
    Critical4
    Qualys ID
    283158
    Date Published
    October 3, 2022
    Vendor Reference
    FEDORA-2022-b197d64471
    CVE Reference
    CVE-2022-38178, CVE-2022-38177, CVE-2022-2795, CVE-2022-3080
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    Fedora has released a security update for bind to fix the vulnerabilities.

    Affected OS:
    Fedora 35


    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Refer to Fedora security advisory Fedora 35 for updates and patch information.
    Patches
    Fedora 35 FEDORA-2022-b197d64471
  • CVE-2021-42260
    QID: 181089
    Recently Published

    Debian Security Update for tinyxml (DLA 3130-1)

    Severity
    Critical4
    Qualys ID
    181089
    Date Published
    October 3, 2022
    Vendor Reference
    DLA 3130-1
    CVE Reference
    CVE-2021-42260
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    Debian has released a security update for tinyxml to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory DLA 3130-1 for updates and patch information.
    Patches
    Debian DLA 3130-1
  • CVE-2021-28861
    QID: 752642
    Recently Published

    SUSE Enterprise Linux Security Update for python36 (SUSE-SU-2022:3483-1)

    Severity
    Critical4
    Qualys ID
    752642
    Date Published
    October 3, 2022
    Vendor Reference
    SUSE-SU-2022:3483-1
    CVE Reference
    CVE-2021-28861
    CVSS Scores
    Base 7.4 / Temporal 6.4
    Description
    SUSE has released a security update for python36 to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise (Desktop|Server) 12 SP5
    SUSE Linux Enterprise Server 12 SP5
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3483-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3483-1
  • CVE-2021-28861
    QID: 283160
    Recently Published

    Fedora Security Update for python3.6 (FEDORA-2022-a2be4bd5d8)

    Severity
    Critical4
    Qualys ID
    283160
    Date Published
    October 3, 2022
    Vendor Reference
    FEDORA-2022-a2be4bd5d8
    CVE Reference
    CVE-2021-28861
    CVSS Scores
    Base 7.4 / Temporal 6.4
    Description
    Fedora has released a security update for python3.6 to fix the vulnerabilities.

    Affected OS:
    Fedora 36


    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Refer to Fedora security advisory Fedora 36 for updates and patch information.
    Patches
    Fedora 36 FEDORA-2022-a2be4bd5d8
  • CVE-2021-28861
    QID: 283159
    Recently Published

    Fedora Security Update for python3.6 (FEDORA-2022-a27e239f5a)

    Severity
    Critical4
    Qualys ID
    283159
    Date Published
    October 3, 2022
    Vendor Reference
    FEDORA-2022-a27e239f5a
    CVE Reference
    CVE-2021-28861
    CVSS Scores
    Base 7.4 / Temporal 6.4
    Description
    Fedora has released a security update for python3.6 to fix the vulnerabilities.

    Affected OS:
    Fedora 35


    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Refer to Fedora security advisory Fedora 35 for updates and patch information.
    Patches
    Fedora 35 FEDORA-2022-a27e239f5a
  • QID: 181088
    Recently Published

    Debian Security Update for mariadb-10.3 (DLA 3114-2)

    Severity
    Serious3
    Qualys ID
    181088
    Date Published
    October 3, 2022
    Vendor Reference
    DLA 3114-2
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Debian has released a security update for mariadb-10.3 to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory DLA 3114-2 for updates and patch information.
    Patches
    Debian DLA 3114-2
  • CVE-2022-31629
    QID: 904079
    Recently Published

    Common Base Linux Mariner (CBL-Mariner) Security Update for Hypertext Preprocessor (PHP) (11070)

    Severity
    Serious3
    Qualys ID
    904079
    Date Published
    October 3, 2022
    Vendor Reference
    Mariner_2.0_11070
    CVE Reference
    CVE-2022-31629
    CVSS Scores
    Base 6.5 / Temporal 6
    Description
    CBL-Mariner 2.0 is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for php to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • CVE-2022-31628
    QID: 904078
    Recently Published

    Common Base Linux Mariner (CBL-Mariner) Security Update for Hypertext Preprocessor (PHP) (11069)

    Severity
    Serious3
    Qualys ID
    904078
    Date Published
    October 3, 2022
    Vendor Reference
    Mariner_2.0_11069
    CVE Reference
    CVE-2022-31628
    CVSS Scores
    Base 5.5 / Temporal 5.1
    Description
    CBL-Mariner 2.0 is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for php to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • CVE-2022-38128
    QID: 904077
    Recently Published

    Common Base Linux Mariner (CBL-Mariner) Security Update for binutils (11058)

    Severity
    Serious3
    Qualys ID
    904077
    Date Published
    October 3, 2022
    Vendor Reference
    Mariner_2.0_11058
    CVE Reference
    CVE-2022-38128
    CVSS Scores
    Base 5.5 / Temporal 5.1
    Description
    CBL-Mariner 2.0 is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for binutils to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • CVE-2022-38127
    QID: 904075
    Recently Published

    Common Base Linux Mariner (CBL-Mariner) Security Update for binutils (11057)

    Severity
    Serious3
    Qualys ID
    904075
    Date Published
    October 3, 2022
    Vendor Reference
    Mariner_2.0_11057
    CVE Reference
    CVE-2022-38127
    CVSS Scores
    Base 5.5 / Temporal 5.1
    Description
    CBL-Mariner 2.0 is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for binutils to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • CVE-2022-38126
    QID: 904074
    Recently Published

    Common Base Linux Mariner (CBL-Mariner) Security Update for binutils (11056)

    Severity
    Serious3
    Qualys ID
    904074
    Date Published
    October 3, 2022
    Vendor Reference
    Mariner_2.0_11056
    CVE Reference
    CVE-2022-38126
    CVSS Scores
    Base 5.5 / Temporal 5.1
    Description
    CBL-Mariner 2.0 is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for binutils to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • CVE-2022-38128
    QID: 904073
    Recently Published

    Common Base Linux Mariner (CBL-Mariner) Security Update for binutils (11073)

    Severity
    Serious3
    Qualys ID
    904073
    Date Published
    October 3, 2022
    Vendor Reference
    11073
    CVE Reference
    CVE-2022-38128
    CVSS Scores
    Base 5.5 / Temporal 5.1
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for binutils to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • CVE-2022-38127
    QID: 904071
    Recently Published

    Common Base Linux Mariner (CBL-Mariner) Security Update for binutils (11072)

    Severity
    Serious3
    Qualys ID
    904071
    Date Published
    October 3, 2022
    Vendor Reference
    11072
    CVE Reference
    CVE-2022-38127
    CVSS Scores
    Base 5.5 / Temporal 5.1
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for binutils to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • CVE-2022-38126
    QID: 904070
    Recently Published

    Common Base Linux Mariner (CBL-Mariner) Security Update for binutils (11071)

    Severity
    Serious3
    Qualys ID
    904070
    Date Published
    October 3, 2022
    Vendor Reference
    11071
    CVE Reference
    CVE-2022-38126
    CVSS Scores
    Base 5.5 / Temporal 5.1
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for binutils to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • CVE-2020-35538
    QID: 752640
    Recently Published

    SUSE Enterprise Linux Security Update for libjpeg-turbo (SUSE-SU-2022:3475-1)

    Severity
    Serious3
    Qualys ID
    752640
    Date Published
    October 3, 2022
    Vendor Reference
    SUSE-SU-2022:3475-1
    CVE Reference
    CVE-2020-35538
    CVSS Scores
    Base 5.5 / Temporal 4.8
    Description
    SUSE has released a security update for libjpeg-turbo to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise (Desktop|Server) 12 SP5
    SUSE Linux Enterprise Server 12 SP5
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3475-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3475-1
  • CVE-2022-3172
    QID: 181090
    Recently Published

    Debian Security Update for kubernetes (CVE-2022-3172)

    Severity
    Serious3
    Qualys ID
    181090
    Date Published
    October 3, 2022
    Vendor Reference
    CVE-2022-3172
    CVE Reference
    CVE-2022-3172
    CVSS Scores
    Base 5.5 / Temporal 4.8
    Description
    Debian has released a security update for kubernetes to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory CVE-2022-3172 for updates and patch information.
    Patches
    Debian CVE-2022-3172
  • CVE-2022-40674
    QID: 752638
    Recently Published

    SUSE Enterprise Linux Security Update for expat (SUSE-SU-2022:3466-1)

    Severity
    Urgent5
    Qualys ID
    752638
    Date Published
    October 3, 2022
    Vendor Reference
    SUSE-SU-2022:3466-1
    CVE Reference
    CVE-2022-40674
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    SUSE has released a security update for expat to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server for SAP Applications 12 SP4
    SUSE Linux Enterprise Server 12 SP5
    SUSE Linux Enterprise (Desktop|Server) 12 SP5
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3466-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3466-1
  • CVE-2022-31627+
    QID: 710633
    Recently Published

    Gentoo Linux Hypertext Preprocessor (PHP) Multiple Vulnerabilities (GLSA 202209-20)

    Severity
    Urgent5
    Qualys ID
    710633
    Date Published
    October 3, 2022
    Vendor Reference
    GLSA 202209-20
    CVE Reference
    CVE-2022-31627, CVE-2021-21703, CVE-2022-31626, CVE-2021-21704, CVE-2021-21705, CVE-2022-31625, CVE-2021-21708
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Gentoo has released a security update for php to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Gentoo security advisory GLSA 202209-20 for updates and patch information.
    Patches
    Gentoo GLSA 202209-20
  • CVE-2022-27664+
    QID: 710627
    Recently Published

    Gentoo Linux Go Multiple Vulnerabilities (GLSA 202209-26)

    Severity
    Urgent5
    Qualys ID
    710627
    Date Published
    October 3, 2022
    Vendor Reference
    GLSA 202209-26
    CVE Reference
    CVE-2022-27664, CVE-2022-32190
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Gentoo has released a security update for go to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Gentoo security advisory GLSA 202209-26 for updates and patch information.
    Patches
    Gentoo GLSA 202209-26
  • CVE-2021-45960+
    QID: 710626
    Recently Published

    Gentoo Linux Expat Multiple Vulnerabilities (GLSA 202209-24)

    Severity
    Urgent5
    Qualys ID
    710626
    Date Published
    October 3, 2022
    Vendor Reference
    GLSA 202209-24
    CVE Reference
    CVE-2021-45960, CVE-2022-22824, CVE-2022-22826, CVE-2022-22825, CVE-2022-25235, CVE-2022-25314, CVE-2022-22823, CVE-2022-25315, CVE-2022-23852, CVE-2022-40674, CVE-2022-22827, CVE-2022-22822, CVE-2022-25236, CVE-2021-46143, CVE-2022-23990, CVE-2022-25313
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Gentoo has released a security update for expat to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Gentoo security advisory GLSA 202209-24 for updates and patch information.
    Patches
    Gentoo GLSA 202209-24
  • CVE-2021-32628+
    QID: 710625
    Recently Published

    Gentoo Linux Redis Multiple Vulnerabilities (GLSA 202209-17)

    Severity
    Urgent5
    Qualys ID
    710625
    Date Published
    October 3, 2022
    Vendor Reference
    GLSA 202209-17
    CVE Reference
    CVE-2021-32628, CVE-2022-35951, CVE-2021-32675, CVE-2022-31144, CVE-2021-32687, CVE-2022-24736, CVE-2021-32627, CVE-2021-32761, CVE-2021-32626, CVE-2022-24735, CVE-2021-32672, CVE-2022-33105, CVE-2021-41099, CVE-2021-32762
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Gentoo has released a security update for redis to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Gentoo security advisory GLSA 202209-17 for updates and patch information.
    Patches
    Gentoo GLSA 202209-17
  • CVE-2022-41138
    QID: 710624
    Recently Published

    Gentoo Linux Zutty Arbitrary Code Execution Vulnerability (GLSA 202209-25)

    Severity
    Urgent5
    Qualys ID
    710624
    Date Published
    October 3, 2022
    Vendor Reference
    GLSA 202209-25
    CVE Reference
    CVE-2022-41138
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Gentoo has released a security update for zutty to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Gentoo security advisory GLSA 202209-25 for updates and patch information.
    Patches
    Gentoo GLSA 202209-25
  • CVE-2022-0730
    QID: 354070
    Recently Published

    Amazon Linux Security Advisory for cacti : ALAS-2022-1634

    Severity
    Urgent5
    Qualys ID
    354070
    Date Published
    October 3, 2022
    Vendor Reference
    ALAS-2022-1634
    CVE Reference
    CVE-2022-0730
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description

    Under certain ldap conditions, cacti authentication can be bypassed with certain credential types. (
    ( CVE-2022-0730)



    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.
    Solution
    Please refer to Amazon advisory: ALAS-2022-1634 for affected packages and patching details, or update with your package manager.
    Patches
    Amazon Linux ALAS-2022-1634
  • CVE-2021-33193+
    QID: 240698
    Recently Published

    Red Hat Update for httpd24-httpd (RHSA-2022:6753)

    Severity
    Urgent5
    Qualys ID
    240698
    Date Published
    October 3, 2022
    Vendor Reference
    RHSA-2022:6753
    CVE Reference
    CVE-2021-33193, CVE-2021-34798, CVE-2021-36160, CVE-2021-39275, CVE-2021-44224, CVE-2022-22719, CVE-2022-22721, CVE-2022-23943, CVE-2022-26377, CVE-2022-28614, CVE-2022-28615, CVE-2022-29404, CVE-2022-30522, CVE-2022-30556, CVE-2022-31813
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    The httpd packages provide the apache http server, a powerful, efficient, and extensible web server...Security Fix(es):
      httpd: mod_sed: read/write beyond bounds (cve-2022-23943).
      Httpd: request splitting via http/2 method injection and mod_proxy (cve-2021-33193).
      Httpd: null pointer dereference via malformed requests (cve-2021-34798).
      Httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path (cve-2021-36160).
      Httpd: out-of-bounds write in ap_escape_quotes() via malicious input (cve-2021-39275).
      Httpd: possible null dereference or ssrf in forward proxy configurations (cve-2021-44224).
      Httpd: mod_lua: use of uninitialized value of in r:parsebody (cve-2022-22719).
      Httpd: core: possible buffer overflow with very large or unlimited limitxmlrequestbody (cve-2022-22721).
      Httpd: mod_proxy_ajp: possible request smuggling (cve-2022-26377).
      Httpd: mod_lua: dos in r:parsebody (cve-2022-29404).
      Httpd: mod_sed: dos vulnerability (cve-2022-30522).
      Httpd: mod_proxy: x-forwarded-for dropped by hop-by-hop mechanism (cve-2022-31813).
      Httpd: out-of-bounds read via ap_rwrite() (cve-2022-28614).
      Httpd: out-of-bounds read in ap_strcmp_match() (cve-2022-28615).
      Httpd: mod_lua: information disclosure with websockets (cve-2022-30556).
    Affected Products:
      Red Hat software collections (for rhel server) 1 for rhel 7 x86_64.
      Red hat software collections (for rhel server for system z) 1 for rhel 7 s390x.
      Red hat software collections (for rhel server for ibm power le) 1 for rhel 7 ppc64le.
      Red hat software collections (for rhel workstation) 1 for rhel 7 x86_64.
    .

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Red Hat security advisory RHSA-2022:6753 for updates and patch information.
    Patches
    Red Hat Enterprise Linux RHSA-2022:6753
  • CVE-2022-30633+
    QID: 354069
    Recently Published

    Amazon Linux Security Advisory for golang : ALAS-2022-1635

    Severity
    Urgent5
    Qualys ID
    354069
    Date Published
    October 3, 2022
    Vendor Reference
    ALAS-2022-1635
    CVE Reference
    CVE-2022-30633, CVE-2022-24675, CVE-2022-30635, CVE-2022-1996, CVE-2022-28327, CVE-2022-30629, CVE-2022-28131, CVE-2022-30630, CVE-2022-30631, CVE-2022-1962, CVE-2022-1705, CVE-2022-30632, CVE-2022-32148, CVE-2022-29526, CVE-2022-27191
    CVSS Scores
    Base 9.1 / Temporal 7.9
    Description

    a flaw was found in golang.
    The http/1 client accepted invalid transfer-encoding headers indicating "chunked" encoding.
    This issue could allow request smuggling, but only if combined with an intermediate server that also improperly accepts the header as invalid. (
    ( CVE-2022-1705) a flaw was found in the golang standard library, go/parser.
    When calling any parse functions on the go source code, which contains deeply nested types or declarations, a panic can occur due to stack exhaustion.
    This issue allows an attacker to impact system availability. (
    ( CVE-2022-1962) authorization bypass through user-controlled key in github repository emicklei/go-restful prior to v3.8.0. (
    ( CVE-2022-1996) a buffer overflow flaw was found in golangs library encoding/pem.
    This flaw allows an attacker to use a large pem input (more than 5 mb) ), causing a stack overflow in decode, which leads to a loss of availability. (
    ( CVE-2022-24675) a broken cryptographic algorithm flaw was found in golang.org/x/crypto/ssh.
    This issue causes a client to fail authentification with rsa keys to servers that reject signature algorithms based on sha-2, enabling an attacker to crash the server, resulting in a loss of availability. (
    ( CVE-2022-27191) a flaw was found in golang encoding/xml.
    When calling decoder.
    Skip while parsing a deeply nested xml document, a panic can occur due to stack exhaustion and allows an attacker to impact system availability.

    Consequence
    Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.
    Solution
    Please refer to Amazon advisory: ALAS-2022-1635 for affected packages and patching details, or update with your package manager.
    Patches
    Amazon Linux ALAS-2022-1635
  • CVE-2022-3040+
    QID: 710634
    Recently Published

    Gentoo Linux Chromium, Google Chrome, Microsoft Edge Multiple Vulnerabilities (GLSA 202209-23)

    Severity
    Critical4
    Qualys ID
    710634
    Date Published
    October 3, 2022
    Vendor Reference
    GLSA 202209-23
    CVE Reference
    CVE-2022-3040, CVE-2022-3057, CVE-2022-3075, CVE-2022-3058, CVE-2022-3050, CVE-2022-3195, CVE-2022-3045, CVE-2022-3039, CVE-2022-3196, CVE-2022-3071, CVE-2022-3056, CVE-2022-3198, CVE-2022-3201, CVE-2022-3041, CVE-2022-3052, CVE-2022-3048, CVE-2022-3043, CVE-2022-3042, CVE-2022-3044, CVE-2022-3049, CVE-2022-3200, CVE-2022-3053, CVE-2022-38012, CVE-2022-3197, CVE-2022-3199, CVE-2022-3046, CVE-2022-3055, CVE-2022-3054, CVE-2022-3047, CVE-2022-3038, CVE-2022-3051
    CVSS Scores
    Base 9.6 / Temporal 8.3
    Description
    Gentoo has released a security update for chromium, google chrome, microsoft edge to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Gentoo security advisory GLSA 202209-23 for updates and patch information.
    Patches
    Gentoo GLSA 202209-23
  • CVE-2022-0204+
    QID: 710631
    Recently Published

    Gentoo Linux BlueZ Multiple Vulnerabilities (GLSA 202209-16)

    Severity
    Critical4
    Qualys ID
    710631
    Date Published
    October 3, 2022
    Vendor Reference
    GLSA 202209-16
    CVE Reference
    CVE-2022-0204, CVE-2021-0129, CVE-2020-26558, CVE-2021-3588
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description
    Gentoo has released a security update for bluez to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Gentoo security advisory GLSA 202209-16 for updates and patch information.
    Patches
    Gentoo GLSA 202209-16
  • CVE-2015-6468+
    QID: 591076
    Recently Published

    Resource Data Management Data Manager Privilege Escalation Vulnerability (ICSA-15-265-01)

    Severity
    Critical4
    Qualys ID
    591076
    Date Published
    October 3, 2022
    Vendor Reference
    ICSA-15-265-01
    CVE Reference
    CVE-2015-6468, CVE-2015-6470
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description
    Multiple vulnerabilities were discovered in Resource Data Management's Data Manager Application.

    Affected Versions: Versions prior to 2.2

    QID Detection Logic (Authenticated)
    QID checks for the Vulnerable version using windows registry keys

    Consequence
    Privilege escalation allows an attacker to gain elevated access to resources that are normally protected from an application or user. This includes altering logs and parameters.
    Solution

    Customers are advised to refer to CERT MITIGATIONS section ICSA-15-265-01 for affected packages and patching details.

    Patches
    ICSA-15-265-01
  • CVE-2022-31625+
    QID: 502516
    Recently Published

    Alpine Linux Security Update for php7

    Severity
    Critical4
    Qualys ID
    502516
    Date Published
    October 3, 2022
    Vendor Reference
    php7
    CVE Reference
    CVE-2022-31625, CVE-2022-31626, CVE-2022-31628, CVE-2022-31629
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description
    Alpine Linux has released a security update for php7 to fix the vulnerabilities.

    Affected versions:
    Alpine Linux 3.15


    Affected Package versions prior to 7.4.32-r0.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Alpine Linux advisory php7 for updates and patch information.
    Patches
    Alpine Linux php7-7.4.32-r0
  • CVE-2022-40956+
    QID: 710635
    Recently Published

    Gentoo Linux Mozilla Thunderbird Multiple Vulnerabilities (GLSA 202209-18)

    Severity
    Critical4
    Qualys ID
    710635
    Date Published
    October 3, 2022
    Vendor Reference
    GLSA 202209-18
    CVE Reference
    CVE-2022-40956, CVE-2022-40958, CVE-2022-40960, CVE-2022-40959, CVE-2022-40957, CVE-2022-40962, CVE-2022-3155
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Gentoo has released a security update for mozilla thunderbird to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Gentoo security advisory GLSA 202209-18 for updates and patch information.
    Patches
    Gentoo GLSA 202209-18
  • CVE-2022-40956+
    QID: 710629
    In Development

    Gentoo Linux Mozilla Firefox Multiple Vulnerabilities (GLSA 202209-27)

    Severity
    Critical4
    Qualys ID
    710629
    Vendor Reference
    GLSA 202209-27
    CVE Reference
    CVE-2022-40956, CVE-2022-40958, CVE-2022-40960, CVE-2022-40959, CVE-2022-40957, CVE-2022-40962
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Gentoo has released a security update for mozilla firefox to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Gentoo security advisory GLSA 202209-27 for updates and patch information.
    Patches
    Gentoo GLSA 202209-27
  • QID: 283156
    Recently Published

    Fedora Security Update for bash (FEDORA-2022-4ff296fe8e)

    Severity
    Critical4
    Qualys ID
    283156
    Date Published
    October 3, 2022
    Vendor Reference
    FEDORA-2022-4ff296fe8e
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Fedora has released a security update for bash to fix the vulnerabilities.

    Affected OS:
    Fedora 36


    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Refer to Fedora security advisory Fedora 36 for updates and patch information.
    Patches
    Fedora 36 FEDORA-2022-4ff296fe8e
  • CVE-2022-3324
    QID: 904069
    Recently Published

    Common Base Linux Mariner (CBL-Mariner) Security Update for vim (11049)

    Severity
    Critical4
    Qualys ID
    904069
    Date Published
    October 3, 2022
    Vendor Reference
    Mariner_2.0_11049
    CVE Reference
    CVE-2022-3324
    CVSS Scores
    Base 7.8 / Temporal 7.1
    Description
    CBL-Mariner 2.0 is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for vim to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • CVE-2022-3324
    QID: 904065
    Recently Published

    Common Base Linux Mariner (CBL-Mariner) Security Update for vim (11055)

    Severity
    Critical4
    Qualys ID
    904065
    Date Published
    October 3, 2022
    Vendor Reference
    11055
    CVE Reference
    CVE-2022-3324
    CVSS Scores
    Base 7.8 / Temporal 7.1
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for vim to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • CVE-2022-41322
    QID: 710632
    Recently Published

    Gentoo Linux Kitty Arbitrary Code Execution Vulnerability (GLSA 202209-22)

    Severity
    Critical4
    Qualys ID
    710632
    Date Published
    October 3, 2022
    Vendor Reference
    GLSA 202209-22
    CVE Reference
    CVE-2022-41322
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    Gentoo has released a security update for kitty to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Gentoo security advisory GLSA 202209-22 for updates and patch information.
    Patches
    Gentoo GLSA 202209-22
  • CVE-2020-12672+
    QID: 710630
    Recently Published

    Gentoo Linux GraphicsMagick Multiple Vulnerabilities (GLSA 202209-19)

    Severity
    Critical4
    Qualys ID
    710630
    Date Published
    October 3, 2022
    Vendor Reference
    GLSA 202209-19
    CVE Reference
    CVE-2020-12672, CVE-2022-1270
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    Gentoo has released a security update for graphicsmagick to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Gentoo security advisory GLSA 202209-19 for updates and patch information.
    Patches
    Gentoo GLSA 202209-19
  • CVE-2021-30860+
    QID: 710628
    Recently Published

    Gentoo Linux Poppler Arbitrary Code Execution Vulnerability (GLSA 202209-21)

    Severity
    Critical4
    Qualys ID
    710628
    Date Published
    October 3, 2022
    Vendor Reference
    GLSA 202209-21
    CVE Reference
    CVE-2021-30860, CVE-2022-38784
    CVSS Scores
    Base 7.8 / Temporal 7.2
    Description
    Gentoo has released a security update for poppler to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Gentoo security advisory GLSA 202209-21 for updates and patch information.
    Patches
    Gentoo GLSA 202209-21
  • CVE-2022-20920
    QID: 317229
    In Development

    Cisco Internetwork Operating System (IOS) and IOS XE Software SSH Denial of Service (DoS) Vulnerability (cisco-sa-ssh-excpt-dos-FzOBQTnk)

    Severity
    Critical4
    Qualys ID
    317229
    Vendor Reference
    cisco-sa-ssh-excpt-dos-FzOBQTnk
    CVE Reference
    CVE-2022-20920
    CVSS Scores
    Base 7.7 / Temporal 6.7
    Description
    A vulnerability in the SSH implementation of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause an affected device to reload.

    Affected Products
    This vulnerability affects Cisco devices if they are running a vulnerable release of Cisco IOS or IOS XE Software and are configured to accept SSH connections.

    QID Detection Logic (Authenticated): The check matches Cisco IOS XE version retrieved via Unix Auth using "show version" command. QID Detection Logic (Unauthenticated): The check matches Cisco IOS XE version retrieved via SNMP or TCP/IP Fingerprint or NTP or Telnet.

    Consequence
    A successful exploit could allow the attacker to cause the affected device to reload.

    Solution

    Customers are advised to refer to cisco-sa-ssh-excpt-dos-FzOBQTnk for more information.

    Patches
    cisco-sa-ssh-excpt-dos-FzOBQTnk
  • CVE-2022-39028
    QID: 752639
    Recently Published

    SUSE Enterprise Linux Security Update for krb5-appl (SUSE-SU-2022:3471-1)

    Severity
    Critical4
    Qualys ID
    752639
    Date Published
    October 3, 2022
    Vendor Reference
    SUSE-SU-2022:3471-1
    CVE Reference
    CVE-2022-39028
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    SUSE has released a security update for krb5-appl to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server for SAP Applications 12 SP4
    SUSE Linux Enterprise Server 12 SP5
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3471-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3471-1
  • CVE-2022-39249+
    QID: 377612
    Recently Published

    Mozilla Thunderbird Multiple Vulnerabilities (MFSA2022-43)

    Severity
    Critical4
    Qualys ID
    377612
    Date Published
    October 3, 2022
    Vendor Reference
    MFSA2022-43
    CVE Reference
    CVE-2022-39249, CVE-2022-39250, CVE-2022-39236, CVE-2022-39251
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    Thunderbird is a free and open-source cross-platform email client developed for Windows, OS X, and Linux, with a mobile version for Android.

    Mozilla Thunderbird is prone to
    CVE-2022-39249: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack by malicious server administrators
    CVE-2022-39250: Matrix SDK bundled with Thunderbird vulnerable to a device verification attack
    CVE-2022-39251: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack
    CVE-2022-39236: Matrix SDK bundled with Thunderbird vulnerable to a data corruption issue

    Affected Products:
    Prior to Mozilla Thunderbird 102.3.1

    QID Detection Logic (Authenticated) :
    This checks for vulnerable version of Thunderbird.


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Vendor has released fix to address these vulnerabilities. Refer to MFSA2022-43 or later
    Patches
    MFSA2022-43
  • CVE-2022-20919
    QID: 317230
    In Development

    Cisco Internetwork Operating System (IOS) and Internetwork Operating System (IOS) XE Software Common Industrial Protocol Request Denial of Service (DoS) Vulnerability (cisco-sa-iosxe-cip-dos-9rTbKLt9)

    Severity
    Critical4
    Qualys ID
    317230
    Vendor Reference
    cisco-sa-iosxe-cip-dos-9rTbKLt9
    CVE Reference
    CVE-2022-20919
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    A vulnerability in the processing of malformed Common Industrial Protocol (CIP) packets that are sent to Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to unexpectedly reload, resulting in a denial of service (DoS) condition.

    Affected Products
    Cisco products if they are running a vulnerable release of Cisco IOS or Cisco IOS XE Software and have CIP protocol enabled.

    QID Detection Logic (Authenticated):
    The check matches Cisco IOS XE version retrieved via Unix Auth using "show version" command.
    QID Detection Logic (Unauthenticated):
    The check matches Cisco IOS XE version retrieved via SNMP or TCP/IP Fingerprint or NTP or Telnet.

    Consequence
    A successful exploit could allow the attacker to cause the affected device to unexpectedly reload, resulting in a DoS condition.

    Solution

    Customers are advised to refer to cisco-sa-iosxe-cip-dos-9rTbKLt9 for more information.

    Patches
    cisco-sa-iosxe-cip-dos-9rTbKLt9
  • CVE-2022-20851
    QID: 317231
    In Development

    Cisco Internetwork Operating System (IOS) XE Software Web UI Command Injection Vulnerability (cisco-sa-webui-cmdinj-Gje47EMn)

    Severity
    Serious3
    Qualys ID
    317231
    Vendor Reference
    cisco-sa-webui-cmdinj-Gje47EMn
    CVE Reference
    CVE-2022-20851
    CVSS Scores
    Base 7.2 / Temporal 6.3
    Description
    A vulnerability in the web UI feature of Cisco IOS XE Software could allow an authenticated, remote attacker to perform an injection attack against an affected device.

    QID Detection Logic (Authenticated):
    The check matches Cisco IOS XE version retrieved via Unix Auth using "show version" command.
    QID Detection Logic (Unauthenticated):
    The check matches Cisco IOS XE version retrieved via SNMP or TCP/IP Fingerprint or NTP or Telnet.

    Consequence
    A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges.

    Solution

    Customers are advised to refer to cisco-sa-webui-cmdinj-Gje47EMn for more information.

    Patches
    cisco-sa-webui-cmdinj-Gje47EMn
  • CVE-2020-27783
    QID: 752637
    Recently Published

    SUSE Enterprise Linux Security Update for python3-lxml (SUSE-SU-2022:3461-1)

    Severity
    Serious3
    Qualys ID
    752637
    Date Published
    October 3, 2022
    Vendor Reference
    SUSE-SU-2022:3461-1
    CVE Reference
    CVE-2020-27783
    CVSS Scores
    Base 6.1 / Temporal 5.3
    Description
    SUSE has released a security update for python3-lxml to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server 12 SP5
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3461-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3461-1
  • CVE-2021-2163
    QID: 240699
    Recently Published

    Red Hat Update for java-1.8.0-ibm (RHSA-2022:6756)

    Severity
    Serious3
    Qualys ID
    240699
    Date Published
    October 3, 2022
    Vendor Reference
    RHSA-2022:6756
    CVE Reference
    CVE-2021-2163
    CVSS Scores
    Base 5.3 / Temporal 4.6
    Description
    Ibm java se version 8 includes the ibm java runtime environment and the ibm java software development kit...Security Fix(es):
      openjdk: incomplete enforcement of jar signing disabled algorithms (libraries, 8249906) (cve-2021-2163).
    Affected Products:
      Red Hat enterprise linux server 7 x86_64.
      Red hat enterprise linux workstation 7 x86_64.
      Red hat enterprise linux desktop 7 x86_64.
      Red hat enterprise linux for ibm z systems 7 s390x.
      Red hat enterprise linux for power, big endian 7 ppc64.
      Red hat enterprise linux for scientific computing 7 x86_64.
      Red hat enterprise linux for power, little endian 7 ppc64le.
    .

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Red Hat security advisory RHSA-2022:6756 for updates and patch information.
    Patches
    Red Hat Enterprise Linux RHSA-2022:6756
  • CVE-2021-2163
    QID: 240697
    Recently Published

    Red Hat Update for java-1.7.1-ibm (RHSA-2022:6755)

    Severity
    Serious3
    Qualys ID
    240697
    Date Published
    October 3, 2022
    Vendor Reference
    RHSA-2022:6755
    CVE Reference
    CVE-2021-2163
    CVSS Scores
    Base 5.3 / Temporal 4.6
    Description
    Ibm java se version 7 release 1 includes the ibm java runtime environment and the ibm java software development kit...Security Fix(es):
      openjdk: incomplete enforcement of jar signing disabled algorithms (libraries, 8249906) (cve-2021-2163).
    Affected Products:
      Red Hat enterprise linux server 7 x86_64.
      Red hat enterprise linux workstation 7 x86_64.
      Red hat enterprise linux desktop 7 x86_64.
      Red hat enterprise linux for ibm z systems 7 s390x.
      Red hat enterprise linux for power, big endian 7 ppc64.
      Red hat enterprise linux for scientific computing 7 x86_64.
      Red hat enterprise linux for power, little endian 7 ppc64le.
    .

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Red Hat security advisory RHSA-2022:6755 for updates and patch information.
    Patches
    Red Hat Enterprise Linux RHSA-2022:6755
  • CVE-2022-3303
    QID: 904067
    Recently Published

    Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (11048)

    Severity
    Medium2
    Qualys ID
    904067
    Date Published
    October 3, 2022
    Vendor Reference
    Mariner_2.0_11048
    CVE Reference
    CVE-2022-3303
    CVSS Scores
    Base 4.7 / Temporal 4.3
    Description
    CBL-Mariner 2.0 is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for kernel to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • CVE-2022-3303
    QID: 904064
    Recently Published

    Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (11054)

    Severity
    Medium2
    Qualys ID
    904064
    Date Published
    October 3, 2022
    Vendor Reference
    11054
    CVE Reference
    CVE-2022-3303
    CVSS Scores
    Base 4.7 / Temporal 4.3
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for kernel to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • CVE-2022-35252
    QID: 904068
    Recently Published

    Common Base Linux Mariner (CBL-Mariner) Security Update for curl (11046)

    Severity
    Medium2
    Qualys ID
    904068
    Date Published
    October 3, 2022
    Vendor Reference
    Mariner_2.0_11046
    CVE Reference
    CVE-2022-35252
    CVSS Scores
    Base 3.7 / Temporal 3.4
    Description
    CBL-Mariner 2.0 is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for curl to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • CVE-2022-35252
    QID: 904066
    Recently Published

    Common Base Linux Mariner (CBL-Mariner) Security Update for curl (11053)

    Severity
    Medium2
    Qualys ID
    904066
    Date Published
    October 3, 2022
    Vendor Reference
    11053
    CVE Reference
    CVE-2022-35252
    CVSS Scores
    Base 3.7 / Temporal 3.4
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for curl to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • CVE-2022-39227
    QID: 904061
    Recently Published

    Common Base Linux Mariner (CBL-Mariner) Security Update for python-jwt (11032)

    Severity
    Urgent5
    Qualys ID
    904061
    Date Published
    October 3, 2022
    Vendor Reference
    Mariner_2.0_11032
    CVE Reference
    CVE-2022-39227
    CVSS Scores
    Base 9.1 / Temporal 8.3
    Description
    CBL-Mariner 2.0 is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for python-jwt to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • CVE-2022-39227
    QID: 904058
    Recently Published

    Common Base Linux Mariner (CBL-Mariner) Security Update for python-jwt (11037)

    Severity
    Urgent5
    Qualys ID
    904058
    Date Published
    October 3, 2022
    Vendor Reference
    11037
    CVE Reference
    CVE-2022-39227
    CVSS Scores
    Base 9.1 / Temporal 8.3
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for python-jwt to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • QID: 283155
    Recently Published

    Fedora Security Update for libofx (FEDORA-2022-c9028047bf)

    Severity
    Critical4
    Qualys ID
    283155
    Date Published
    October 3, 2022
    Vendor Reference
    FEDORA-2022-c9028047bf
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Fedora has released a security update for libofx to fix the vulnerabilities.

    Affected OS:
    Fedora 35


    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Refer to Fedora security advisory Fedora 35 for updates and patch information.
    Patches
    Fedora 35 FEDORA-2022-c9028047bf
  • QID: 283154
    Recently Published

    Fedora Security Update for gajim (FEDORA-2022-b60ea83571)

    Severity
    Critical4
    Qualys ID
    283154
    Date Published
    October 3, 2022
    Vendor Reference
    FEDORA-2022-b60ea83571
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Fedora has released a security update for gajim to fix the vulnerabilities.

    Affected OS:
    Fedora 36


    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Refer to Fedora security advisory Fedora 36 for updates and patch information.
    Patches
    Fedora 36 FEDORA-2022-b60ea83571
  • QID: 283153
    Recently Published

    Fedora Security Update for firefox (FEDORA-2022-1f8312716f)

    Severity
    Critical4
    Qualys ID
    283153
    Date Published
    October 3, 2022
    Vendor Reference
    FEDORA-2022-1f8312716f
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Fedora has released a security update for firefox to fix the vulnerabilities.

    Affected OS:
    Fedora 35


    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Refer to Fedora security advisory Fedora 35 for updates and patch information.
    Patches
    Fedora 35 FEDORA-2022-1f8312716f
  • CVE-2022-3297
    QID: 904062
    Recently Published

    Common Base Linux Mariner (CBL-Mariner) Security Update for vim (11035)

    Severity
    Critical4
    Qualys ID
    904062
    Date Published
    October 3, 2022
    Vendor Reference
    Mariner_2.0_11035
    CVE Reference
    CVE-2022-3297
    CVSS Scores
    Base 7.8 / Temporal 7.1
    Description
    CBL-Mariner 2.0 is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for vim to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • CVE-2022-3296
    QID: 904060
    Recently Published

    Common Base Linux Mariner (CBL-Mariner) Security Update for vim (11034)

    Severity
    Critical4
    Qualys ID
    904060
    Date Published
    October 3, 2022
    Vendor Reference
    Mariner_2.0_11034
    CVE Reference
    CVE-2022-3296
    CVSS Scores
    Base 7.8 / Temporal 7.1
    Description
    CBL-Mariner 2.0 is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for vim to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • CVE-2022-3297
    QID: 904057
    Recently Published

    Common Base Linux Mariner (CBL-Mariner) Security Update for vim (11043)

    Severity
    Critical4
    Qualys ID
    904057
    Date Published
    October 3, 2022
    Vendor Reference
    11043
    CVE Reference
    CVE-2022-3297
    CVSS Scores
    Base 7.8 / Temporal 7.1
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for vim to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • CVE-2022-3296
    QID: 904056
    Recently Published

    Common Base Linux Mariner (CBL-Mariner) Security Update for vim (11042)

    Severity
    Critical4
    Qualys ID
    904056
    Date Published
    October 3, 2022
    Vendor Reference
    11042
    CVE Reference
    CVE-2022-3296
    CVSS Scores
    Base 7.8 / Temporal 7.1
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for vim to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • CVE-2022-20775+
    QID: 317224
    Recently Published

    Cisco SD-WAN Software Privilege Escalation Vulnerability (cisco-sa-sd-wan-priv-E6e8tEdF)

    Severity
    Critical4
    Qualys ID
    317224
    Date Published
    October 3, 2022
    Vendor Reference
    cisco-sa-sd-wan-priv-E6e8tEdF
    CVE Reference
    CVE-2022-20775, CVE-2022-20818
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description

    Multiple vulnerabilities in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges.

    Affected Products
    Following Cisco products if they were running the vulnerable release:
    SD-WAN vEdge Cloud Routers
    SD-WAN vEdge Routers
    SD-WAN vManage Software
    Note: Support only for SD-WAN vManage and vedge-100-M.

    QID detection logic:
    The QID checks for Cisco SD WAN version retrieved via Unix Auth using "show system status" command

    Consequence
    A successful exploit could allow the attacker to execute arbitrary commands as the root user.

    Solution

    Customers are advised to refer to cisco-sa-sd-wan-priv-E6e8tEdF for more information.

    Patches
    cisco-sa-sd-wan-priv-E6e8tEdF
  • CVE-2022-3204
    QID: 904063
    Recently Published

    Common Base Linux Mariner (CBL-Mariner) Security Update for unbound (11033)

    Severity
    Critical4
    Qualys ID
    904063
    Date Published
    October 3, 2022
    Vendor Reference
    Mariner_2.0_11033
    CVE Reference
    CVE-2022-3204
    CVSS Scores
    Base 7.5 / Temporal 6.9
    Description
    CBL-Mariner 2.0 is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for unbound to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • CVE-2022-3204
    QID: 690948
    Recently Published

    Free Berkeley Software Distribution (FreeBSD) Security Update for unbound (5a1c2e06-3fb7-11ed-a402-b42e991fc52e)

    Severity
    Critical4
    Qualys ID
    690948
    Date Published
    October 3, 2022
    Vendor Reference
    5a1c2e06-3fb7-11ed-a402-b42e991fc52e
    CVE Reference
    CVE-2022-3204
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    FreeBSD has released a security update for unbound to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to FreeBSD security advisory 5a1c2e06-3fb7-11ed-a402-b42e991fc52e for updates and patch information.
    Patches
    "FreeBSD" 5a1c2e06-3fb7-11ed-a402-b42e991fc52e
  • CVE-2022-39236+
    QID: 502515
    Recently Published

    Alpine Linux Security Update for riot-web

    Severity
    Critical4
    Qualys ID
    502515
    Date Published
    October 3, 2022
    Vendor Reference
    riot-web
    CVE Reference
    CVE-2022-39236, CVE-2022-39249, CVE-2022-39250, CVE-2022-39251
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    Alpine Linux has released a security update for riot-web to fix the vulnerabilities.

    Affected versions:
    Alpine Linux 3.16


    Affected Package versions prior to 1.11.7-r0.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Alpine Linux advisory riot-web for updates and patch information.
    Patches
    Alpine Linux riot-web-1.11.7-r0
  • CVE-2022-20769
    QID: 317225
    Under Investigation

    Cisco Wireless LAN Controller AireOS Software FIPS Mode Denial of Service (DoS) Vulnerability (cisco-sa-wlc-dos-mKGRrsCB)

    Severity
    Critical4
    Qualys ID
    317225
    Vendor Reference
    cisco-sa-wlc-dos-mKGRrsCB
    CVE Reference
    CVE-2022-20769
    CVSS Scores
    Base 6.5 / Temporal 5.7
    Description
    A vulnerability in the authentication functionality of Cisco Wireless LAN Controller (WLC) AireOS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.

    Affected Products:
    1) Cisco WLC AireOS Software and they have FIPS mode enabled. Note: Support only for Cisco WLC Software QID Detection Logic (Authenticated):
    The check matches affected versions retrieved via SNMP.

    Consequence
    A successful exploit could allow the attacker to cause the wireless LAN controller to crash, resulting in a DoS condition.

    Solution

    Customers are advised to refer to cisco-sa-wlc-dos-mKGRrsCB for more information.

    Patches
    cisco-sa-wlc-dos-mKGRrsCB
  • CVE-2022-20850
    QID: 317228
    Recently Published

    Cisco SD-WAN Arbitrary File Deletion Vulnerability (cisco-sa-arb-file-delete-VB2rVcQv)

    Severity
    Serious3
    Qualys ID
    317228
    Date Published
    October 3, 2022
    Vendor Reference
    cisco-sa-arb-file-delete-VB2rVcQv
    CVE Reference
    CVE-2022-20850
    CVSS Scores
    Base 7.1 / Temporal 6.2
    Description
    A vulnerability in the CLI of stand-alone Cisco IOS XE SD-WAN Software and Cisco SD-WAN Software could allow an authenticated, local attacker to delete arbitrary files from the file system of an affected device.

    Affected Products
    Cisco products if they are running a vulnerable release of Cisco SD-WAN software:
    SD-WAN vEdge Routers
    SD-WAN vManage Software

    Cisco SD-WAN Software releases :
    Prior to 18.4.5
    Note: Support only for SD-WAN vManage and vedge-100-M.

    QID detection logic:
    The QID checks for Cisco SD WAN version retrieved via Unix Auth using "show system status" command

    Consequence
    A successful exploit could allow the attacker to delete arbitrary files from the file system of the affected device.

    Solution

    Customers are advised to refer to cisco-sa-arb-file-delete-VB2rVcQv for more information.

    Patches
    cisco-sa-arb-file-delete-VB2rVcQv
  • CVE-2022-20930
    QID: 317227
    Recently Published

    Cisco SD-WAN Software Arbitrary File Corruption and Denial of Service (DoS) Vulnerability (cisco-sa-sdwan-privesc-cli-xkGwmqKu)

    Severity
    Serious3
    Qualys ID
    317227
    Date Published
    October 3, 2022
    Vendor Reference
    cisco-sa-sdwan-privesc-cli-xkGwmqKu
    CVE Reference
    CVE-2022-20930
    CVSS Scores
    Base 6.7 / Temporal 5.8
    Description

    A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to overwrite and possibly corrupt files on an affected system.

    Affected Products
    Cisco products if they are running a vulnerable release of Cisco SD-WAN software:
    SD-WAN vEdge Routers
    SD-WAN vManage Software

    Cisco SD-WAN Software releases :
    Prior to 20.6.2
    From 20.8 Prior to 20.8.1
    From 20.9 Prior to 20.9.1
    Note: Support only for SD-WAN vManage and vedge-100-M.

    QID detection logic:
    The QID checks for Cisco SD WAN version retrieved via Unix Auth using "show system status" command

    Consequence
    A successful exploit could allow the attacker to overwrite arbitrary system files, which could result in a denial of service (DoS) condition.

    Solution

    Customers are advised to refer to cisco-sa-sdwan-privesc-cli-xkGwmqKu for more information.

    Patches
    cisco-sa-sdwan-privesc-cli-xkGwmqKu
  • CVE-2016-4929
    QID: 43916
    In Development

    Juniper Junos Space Command injection vulnerability (JSA10760)

    Severity
    Critical4
    Qualys ID
    43916
    Vendor Reference
    JSA10760
    CVE Reference
    CVE-2016-4929
    CVSS Scores
    Base 8.8 / Temporal 7.9
    Description
    Juniper Junos is the network operating system used in Juniper Networks hardware systems.

    Command injection vulnerability in Junos Space may allow unprivileged users to execute code as root user on the device.

    Affected releases are Junos OS:
    Juniper Junos Space before version 15.2R2 allows attackers to execute arbitrary code as a root user. QID detection logic: (Authenticated)
    It checks for vulnerable Junos OS version.

    Consequence
    An attacker can exploit this issue and execute arbitrary code as a root user.
    Solution
    Users need to update the Junos Space to latest version.
    Patches
    JSA10760
  • CVE-2022-3144
    QID: 150577
    Recently Published

    WordPress Wordfence Security - Firewall and Malware Scan Plugin: Stored Cross-Site Scripting (XSS) Vulnerability (CVE-2022-3144)

    Severity
    Serious3
    Qualys ID
    150577
    Date Published
    October 3, 2022
    Vendor Reference
    Wordfence Advisory
    CVE Reference
    CVE-2022-3144
    CVSS Scores
    Base 4.8 / Temporal 4.2
    Description
    Wordfence Security is a WordPress plugin which includes an endpoint firewall and malware scanner that were built from the ground up to protect WordPress sites.

    Affected versions of Wordfence Security - Firewall and Malware Scan plugin is vulnerable to Stored Cross-Site Scripting via a setting on the options page due to insufficient escaping on the stored value which makes it possible for authenticated users, with administrative privileges, to inject malicious web scripts.

    Affected versions:
    Wordfence Security prior to version 7.6.1

    QID Detection Logic (Unauthenticated):
    This QID sends a HTTP GET request and checks for vulnerable version of Wordfence plugin running on the target WordPress application.

    Consequence
    Successful exploitation could allow an attacker to execute arbitrary JavaScript code in the context of the interface or allow the attacker to access sensitive, browser-based information.

    Solution
    Customers are advised to upgrade to Wordfence Security 7.6.1 to remediate this vulnerability. For more information regarding this vulnerability please refer Wordfence Advisory
    Patches
    CVE-2022-3144
  • CVE-2022-21123+
    QID: 216292
    Recently Published

    VMware ESXi 6.7 Patch Release ESXi670-202206101-SG Missing (VMSA-2022-0016)

    Severity
    Serious3
    Qualys ID
    216292
    Date Published
    October 3, 2022
    Vendor Reference
    VMSA-2022-0016
    CVE Reference
    CVE-2022-21123, CVE-2022-21125, CVE-2022-21166
    CVSS Scores
    Base 5.5 / Temporal 4.8
    Description
    VMware ESXi is an enterprise level computer virtualization product.

    Affected Versions:
    VMware ESXi 6.7.x before build 19898906

    QID Detection Logic (Unauthenticated):
    This QID checks for vulnerable versions of VMware ESXi with build version using web service present on target.

    Consequence
    A malicious actor with administrative access to a virtual machine that has an attached DirectPath I/O (PCI-Passthrough) device can take advantage of a flaw in memory-mapped I/O (MMIO) fill buffers that may leak information stored in physical memory about the hypervisor or other virtual machines that reside on the same ESXi host if the host utilizes Intel processors.

    Solution

    Refer to VMware advisory VMSA-2022-0016 for more information.

    Patches
    VMSA-2022-0016
  • CVE-2022-21123+
    QID: 216291
    Recently Published

    VMware ESXi 6.5 Patch Release ESXi670-202206101-SG Missing (VMSA-2022-0016)

    Severity
    Serious3
    Qualys ID
    216291
    Date Published
    October 3, 2022
    Vendor Reference
    VMSA-2022-0016
    CVE Reference
    CVE-2022-21123, CVE-2022-21125, CVE-2022-21166
    CVSS Scores
    Base 5.5 / Temporal 4.8
    Description
    VMware ESXi is an enterprise level computer virtualization product.

    Affected Versions:
    VMware ESXi 6.5.x

    QID Detection Logic (Unauthenticated):
    This QID checks for vulnerable versions of VMware ESXi with build version using web service present on target.

    Consequence
    A malicious actor with administrative access to a virtual machine that has an attached DirectPath I/O (PCI-Passthrough) device can take advantage of a flaw in memory-mapped I/O (MMIO) fill buffers that may leak information stored in physical memory about the hypervisor or other virtual machines that reside on the same ESXi host if the host utilizes Intel processors.

    Solution

    Refer to VMware advisory VMSA-2022-0016 for more information.

    Patches
    VMSA-2022-0016
  • CVE-2022-41040+
    QID: 50122
    Recently Published

    Microsoft Exchange Server Multiple Vulnerabilities (Zero Day)(ProxyNotShell)

    Severity
    Urgent5
    Qualys ID
    50122
    Date Published
    September 30, 2022
    Vendor Reference
    Microsoft Security Advisory
    CVE Reference
    CVE-2022-41040, CVE-2022-41082
    CVSS Scores
    Base 8.8 / Temporal 8.3
    Description
    Microsoft Exchange Server 2013, 2016, and 2019 are affected by two zero-day vulnerabilities. The first vulnerability, identified as CVE-2022-41040, is a Server-Side Request Forgery (SSRF) vulnerability, while the second, identified as CVE-2022-41082, allows remote code execution (RCE) when PowerShell is accessible to the attacker.

    QID Detection Logic (Authenticated):
    This QID checks for vulnerable versions of MS Exchange Server and checks if the temporary mitigations have been applied.

    Consequence
    Successful exploitation of the vulnerability may allow remote code execution.

    Solution
    There are no patches yet, however, Microsoft advised users to apply temporary mitigations. For more information please refer to Microsoft Security Advisory

  • CVE-2018-7842
    QID: 591075
    Recently Published

    Schneider Electric Modicon M580 UMAS Improper Authentication Vulnerability (TALOS-2018-0741)

    Severity
    Urgent5
    Qualys ID
    591075
    Date Published
    September 30, 2022
    Vendor Reference
    TALOS-2018-0741
    CVE Reference
    CVE-2018-7842
    CVSS Scores
    Base 9.8 / Temporal 9
    Description

    AFFECTED PRODUCTS
    Schneider Electric Modicon M580 BMEP582040 SV2.70

    QID Detection Logic (Authenticated):
    QID checks for the Vulnerable version of using passive scanning

    Consequence
    An exploitable improper authentication vulnerability exists in the UMAS PLC reservation function of the Schneider Electric Modicon M580 Programmable Automation Controller, firmware version SV2.70. A specially crafted UMAS command can allow an attacker to masquerade as an authenticated user, resulting in the ability to bypass password protections in place on the device. An attacker can send unauthenticated commands to trigger this vulnerability.
    Solution

    Customers are advised to refer to CERT MITIGATIONS section TALOS-2018-0741 for affected packages and patching details.

  • CVE-2020-25767+
    QID: 591068
    Recently Published

    Rockwell Automation Products INFRA:HALT Interniche Multiple Vulnerabilities (PN1575)

    Severity
    Urgent5
    Qualys ID
    591068
    Date Published
    September 30, 2022
    Vendor Reference
    PN1575
    CVE Reference
    CVE-2020-25767, CVE-2020-25928, CVE-2020-25927, CVE-2020-25926, CVE-2020-27565, CVE-2020-35683, CVE-2020-35684, CVE-2020-35685, CVE-2021-31400, CVE-2021-31401, CVE-2021-31226, CVE-2021-31227, CVE-2021-31228, CVE-2021-36762
    CVSS Scores
    Base 9.8 / Temporal 9
    Description

    AFFECTED PRODUCTS
    20-COMM-ER All Versions
    ArmorStart 28xE All Versions
    1715-AENTR All Versions
    AADvance Safety Controller All Versions
    AADvance Eurocard Controllers All Versions

    QID Detection Logic (Authenticated):
    QID checks for the Vulnerable version of using passive scanning

    Consequence
    If successfully exploited, these vulnerabilities may result in the products faulting and/or ceasing communications, requiring the power to be cycled to the product to recover.
    Solution

    Customers are advised to refer to CERT MITIGATIONS section PN1575 for affected packages and patching details.

  • CVE-2022-30264
    QID: 591067
    Recently Published

    Emerson ROC800, ROC800L and DL8000 Vulnerability (ICSA-22-223-04)

    Severity
    Urgent5
    Qualys ID
    591067
    Date Published
    September 30, 2022
    Vendor Reference
    icsa-22-223-04
    CVE Reference
    CVE-2022-30264
    CVSS Scores
    Base 9.8 / Temporal 9
    Description

    AFFECTED PRODUCTS
    The following versions of ROC800, a remote automation controller, are affected: ROC800: All versions
    ROC800L: All versions
    DL8000: All versions

    QID Detection Logic (Authenticated):
    QID checks for the Vulnerable version of using passive scanning

    Consequence
    Successful exploitation of this vulnerability could cause file manipulation.
    Solution

    Customers are advised to refer to CERT MITIGATIONS section icsa-22-223-04 for affected packages and patching details.

  • CVE-2017-6868
    QID: 591064
    Recently Published

    Siemens SIMATIC CP 44x-1 Redundant Network Access Modules Vulnerability (ICSA-17-173-01) (SSA-126840)

    Severity
    Critical4
    Qualys ID
    591064
    Date Published
    September 30, 2022
    Vendor Reference
    ICSA-17-173-01
    CVE Reference
    CVE-2017-6868
    CVSS Scores
    Base 8.1 / Temporal 7.1
    Description

    AFFECTED PRODUCTS
    The following versions of the SIMATIC CP 44x-1 RNA, which connect SIMATIC S7-400 CPUs to Industrial Ethernet, are affected: SIMATIC CP 44x-1 RNA, all versions prior to Versions 1.4.1.

    QID Detection Logic (Authenticated):
    QID checks for the Vulnerable version of using passive scanning

    Consequence
    Successful exploitation of this vulnerability may allow an unauthenticated remote attacker to perform administrative actions under certain conditions.
    Solution

    Customers are advised to refer to CERT MITIGATIONS section ICSA-17-173-01 for affected packages and patching details.

    Patches
    ICSA-17-173-01
  • CVE-2020-25173+
    QID: 591062
    Recently Published

    Reolink P2P Cameras Multiple Vulnerabilities (icsa-21-019-02)

    Severity
    Critical4
    Qualys ID
    591062
    Date Published
    September 30, 2022
    Vendor Reference
    icsa-21-019-02
    CVE Reference
    CVE-2020-25173, CVE-2020-25169
    CVSS Scores
    Base 7.8 / Temporal 7.1
    Description

    AFFECTED PRODUCTS
    The following Reolink devices use P2P: RLC-4XX series
    RLC-5XX series
    RLN-X10 series

    QID Detection Logic (Authenticated):
    QID checks for the Vulnerable version of using passive scanning

    Consequence
    Successful exploitation of these vulnerabilities could permit unauthorized access to sensitive information.
    Solution

    Customers are advised to refer to CERT MITIGATIONS section icsa-21-019-02 for affected packages and patching details.

  • CVE-2019-6845
    QID: 591072
    Recently Published

    Schneider Electric Modicon Controllers Vulnerability (SEVD-2019-281-03)

    Severity
    Critical4
    Qualys ID
    591072
    Date Published
    September 30, 2022
    Vendor Reference
    SEVD-2019-281-03
    CVE Reference
    CVE-2019-6845
    CVSS Scores
    Base 7.5 / Temporal 6.7
    Description

    AFFECTED PRODUCTS
    Modicon M580 (all firmware versions)
    Modicon M340 (all firmware versions)
    Modicon Premium (all firmware versions)
    Modicon Quantum (all firmware versions)

    QID Detection Logic (Authenticated):
    QID checks for the Vulnerable version of using passive scanning

    Consequence
    Cleartext Transmission of Sensitive Information vulnerability exists, which could cause the disclosure of information when transferring applications to the controller using Modbus TCP protocol.
    Solution

    Customers are advised to refer to CERT MITIGATIONS section SEVD-2019-281-03 for affected packages and patching details.

  • CVE-2020-24686
    QID: 591066
    Recently Published

    ABB AC500V2 Webserver Denial of Service (DoS) Vulnerability (ABBVU-ABBVREP0019-3ADR010645)

    Severity
    Critical4
    Qualys ID
    591066
    Date Published
    September 30, 2022
    Vendor Reference
    ABBVU-ABBVREP0019-3ADR010645
    CVE Reference
    CVE-2020-24686
    CVSS Scores
    Base 7.5 / Temporal 6.9
    Description

    AFFECTED PRODUCTS
    The following AC500 V2 products with onboard ethernet are affected by this vulnerability:
    PM554
    PM556
    PM564
    PM566
    PM572
    PM573

    QID Detection Logic (Authenticated):
    QID checks for the Vulnerable version of using passive scanning

    Consequence
    The vulnerabilities can be exploited to cause the web visualization component of the PLC to stop and not respond, leading to genuine users losing remote visibility of the PLC state. If a user attempts to login to the PLC while this vulnerability is exploited, the PLC will show an error state and refuse connections to Automation Builder.
    Solution

    Customers are advised to refer to CERT MITIGATIONS section ABBVU-ABBVREP0019-3ADR010645 for affected packages and patching details.

  • CVE-2019-13941
    QID: 591063
    Recently Published

    Siemens OZW Web Server Vulnerability (ICSA-20-042-09) (SSA-986695)

    Severity
    Critical4
    Qualys ID
    591063
    Date Published
    September 30, 2022
    Vendor Reference
    icsa-20-042-09
    CVE Reference
    CVE-2019-13941
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description

    AFFECTED PRODUCTS
    The following versions of OZW web server are affected: OZW672 and OZW772: All versions prior to 10.0

    QID Detection Logic (Authenticated):
    QID checks for the Vulnerable version of using passive scanning

    Consequence
    Successful exploitation of this vulnerability could allow unauthenticated users to access project files.
    Solution

    Customers are advised to refer to CERT MITIGATIONS section icsa-20-042-09 for affected packages and patching details.

    Patches
    icsa-20-042-09
  • CVE-2014-9193
    QID: 591069
    Recently Published

    Phoenix Contact Innominate mGuard devices Vulnerability (Security Advisory 2014/12/17-001)

    Severity
    Critical4
    Qualys ID
    591069
    Date Published
    September 30, 2022
    Vendor Reference
    Security Advisory 2014/12/17-001
    CVE Reference
    CVE-2014-9193
    CVSS Scores
    Base 5.3 / Temporal 4.6
    Description

    AFFECTED PRODUCTS
    All Innominate mGuard devices running with any firmware version up to firmware version 8.1.3 are affected. The firmware versions 8.1.4 and higher are not affected. The mGuard firmware 7.6.6 patch release also fixes this issue.

    QID Detection Logic (Authenticated):
    QID checks for the Vulnerable version of using passive scanning

    Consequence
    An attacker authorized as user "admin" may use special configuration settings to execute arbitrary commands as root user with UID 0.
    Solution

    Customers are advised to refer to CERT MITIGATIONS section Security Advisory 2014/12/17-001 for affected packages and patching details.

    Patches
    Security Advisory 2014/12/17-001
  • CVE-2017-13077+
    QID: 591073
    Recently Published

    Siemens SIMATIC RF350M and SIMATIC RF650M KRACK Attacks Multiple Vulnerabilities (SSA-418456)

    Severity
    Serious3
    Qualys ID
    591073
    Date Published
    September 30, 2022
    Vendor Reference
    ssa-418456
    CVE Reference
    CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081
    CVSS Scores
    Base 6.8 / Temporal 5.9
    Description

    AFFECTED PRODUCTS
    SIMATIC RF350M: All versions with Summit Client Utility prior to V22.3.5.16
    SIMATIC RF650M: All versions with Summit Client Utility prior to V22.3.5.16

    QID Detection Logic (Authenticated):
    QID checks for the Vulnerable version of using passive scanning

    Consequence
    These vulnerabilities could potentially allow an attacker within the radio range of the wireless network to decrypt, replay or inject forged network packets into the wireless communication.
    Solution

    Customers are advised to refer to CERT MITIGATIONS section ssa-418456 for affected packages and patching details.

    Patches
    ssa-418456
  • CVE-2020-28220
    QID: 591065
    Recently Published

    Schneider Electric Modicon M258 Logic Controllers Vulnerability (SEVD-2020-343-09)

    Severity
    Serious3
    Qualys ID
    591065
    Date Published
    September 30, 2022
    Vendor Reference
    SEVD-2020-343-09
    CVE Reference
    CVE-2020-28220
    CVSS Scores
    Base 6.8 / Temporal 6.1
    Description

    AFFECTED PRODUCTS
    Modicon M258 Firmware All versions prior to V5.0.4.11

    QID Detection Logic (Authenticated):
    QID checks for the Vulnerable version of using passive scanning

    Consequence
    Successful exploitation of this vulnerability may risk buffer overflow attack, which could result in arbitrary code execution or unavailability of the process or operations.
    Solution

    Customers are advised to refer to CERT MITIGATIONS section SEVD-2020-343-09 for affected packages and patching details.

  • CVE-2021-22685
    QID: 591074
    Recently Published

    Cassia Networks Access Controller Vulnerability (ICSA-21-119-02)

    Severity
    Serious3
    Qualys ID
    591074
    Date Published
    September 30, 2022
    Vendor Reference
    icsa-21-119-02
    CVE Reference
    CVE-2021-22685
    CVSS Scores
    Base 0 / Temporal 0
    Description

    AFFECTED PRODUCTS
    The following versions of Access Controller are affected: Access Controller: All versions prior to 2.0.1

    QID Detection Logic (Authenticated):
    QID checks for the Vulnerable version of using passive scanning

    Consequence
    Successful exploitation of this vulnerability could allow an attacker to read any file from the Access Controller server.
    Solution

    Customers are advised to refer to CERT MITIGATIONS section icsa-21-119-02 for affected packages and patching details.

    Patches
    icsa-21-119-02
  • CVE-2014-2908+
    QID: 591071
    Recently Published

    Siemens SIMATIC S7-1200 CPU Web Multiple Vulnerabilities (ICSA-14-114-02) (SSA-892012)

    Severity
    Serious3
    Qualys ID
    591071
    Date Published
    September 30, 2022
    Vendor Reference
    ICSA-14-114-02
    CVE Reference
    CVE-2014-2908, CVE-2014-2909
    CVSS Scores
    Base 0 / Temporal 0
    Description

    AFFECTED PRODUCTS
    The following Siemens SIMATIC S7-1200 CPU versions are affected: SIMATIC S7-1200 CPU family Versions: V2.X and V3.X.

    QID Detection Logic (Authenticated):
    QID checks for the Vulnerable version of using passive scanning

    Consequence
    Attackers could use these vulnerabilities to perform attacks against the SIMATIC S7-1200 CPU family web server to disrupt integrity and availability of normal operations.
    Solution

    Customers are advised to refer to CERT MITIGATIONS section ICSA-14-114-02 for affected packages and patching details.

    Patches
    ICSA-14-114-02
  • CVE-2014-9295
    QID: 591070
    Recently Published

    Phoenix Contact Innominate mGuard Vulnerability (Security Advisory 2015/01/20-001)

    Severity
    Serious3
    Qualys ID
    591070
    Date Published
    September 30, 2022
    Vendor Reference
    Security Advisory 2015/01/20-001
    CVE Reference
    CVE-2014-9295
    CVSS Scores
    Base 0 / Temporal 0
    Description

    AFFECTED PRODUCTS
    All Innominate mGuard devices running with any firmware version up to firmware version 8.1.4 are affected. The firmware versions 8.1.5 and higher are not affected. The mGuard firmware 7.6.7 patch release also fixes this issue.

    QID Detection Logic (Authenticated):
    QID checks for the Vulnerable version of using passive scanning

    Consequence
    An attacker may use specially crafted NTP packets to remotely exploit the NTP vulnerability tracked as CVE-2014-9295 and execute arbitrary code as unprivileged user or to interrupt the NTP service. The mGuard is only vulnerable to this attack if the NTP service on the mGuard is enabled, which is not the default setting. Due to the nature of the NTP protocol exploiting the vulnerability from remote is possible if an attacker can inject malicious packets into communication opened from the mGuard to a remote NTP server.
    Solution

    Customers are advised to refer to CERT MITIGATIONS section Security Advisory 2015/01/20-001 for affected packages and patching details.

    Patches
    Security Advisory 2015/01/20-001
  • QID: 150565
    Recently Published

    Custom Error Page Detected

    Severity
    Minimal1
    Qualys ID
    150565
    Date Published
    September 30, 2022
    CVSS Scores
    Base / Temporal
    Description
    A custom Error Page can be set using a url or a custom regex in the WAS scan configuration. WAS will use the custom error set to compare against responses for 150004 Path-Based Vulnerability and 150174 Path Traversal Vulnerability and further filter responses that match the custom Error Page. If there is a match then respective vulnerabilities will not be reported. Using the URL option will set the error page as the response received. WAS will use the response from the URL to make an exact match (including spaces and tags) in order to filter out detections for 150004 and 150174. The URL set must be in scope for WAS to be able to set the error page. For the regex option make sure the regex is strict enough to catch the custom error page and not detect valid responses. Using a wildcard regex (.*) is a valid regex but not recommended for use with this configuration, since it will lead to filtering all 150004 and 150174 (potential true vulnerabilities).
    Consequence
    N/A
    Solution
    N/A
  • QID: 150506
    Recently Published

    Web Application Client Certificate Based Authentication Failure

    Severity
    Minimal1
    Qualys ID
    150506
    Date Published
    September 30, 2022
    CVSS Scores
    Base / Temporal
    Description
    Web application client certificate-based authentication was performed during the scan, but login attempts using the client certificate and key specified in the Web application's authentication record for this host failed.
    Consequence
    Vulnerabilities that require Web application authentication may not be detected.
    Solution
    Verify that the client certificate and key defined in the Web application's authentication record are valid for this host.
  • QID: 150505
    Recently Published

    Web Application Client Certificate Based Authentication Success

    Severity
    Minimal1
    Qualys ID
    150505
    Date Published
    September 30, 2022
    CVSS Scores
    Base / Temporal
    Description
    Web application client certificate based authentication was performed for the scan and was successfully authenticated.
    Consequence
    N/A
    Solution
    N/A
  • CVE-2022-29599
    QID: 181084
    Recently Published

    Debian Security Update for maven-shared-utils (DSA 5242-1)

    Severity
    Urgent5
    Qualys ID
    181084
    Date Published
    September 29, 2022
    Vendor Reference
    DSA 5242-1
    CVE Reference
    CVE-2022-29599
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Debian has released a security update for maven-shared-utils to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory DSA 5242-1 for updates and patch information.
    Patches
    Debian DSA 5242-1
  • CVE-2022-32296+
    QID: 198966
    Recently Published

    Ubuntu Security Notification for Linux kernel (GCP) Vulnerabilities (USN-5647-1)

    Severity
    Urgent5
    Qualys ID
    198966
    Date Published
    September 29, 2022
    Vendor Reference
    USN-5647-1
    CVE Reference
    CVE-2022-32296, CVE-2022-2503, CVE-2022-1012, CVE-2022-36946, CVE-2022-1729, CVE-2021-33655
    CVSS Scores
    Base 8.2 / Temporal 7.1
    Description
    Ubuntu has released a security update for linux to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Ubuntu security advisory USN-5647-1 for updates and patch information.
    Patches
    Ubuntu Linux USN-5647-1
  • CVE-2022-40956+
    QID: 160117
    Recently Published

    Oracle Enterprise Linux Security Update for firefox (ELSA-2022-6700)

    Severity
    Critical4
    Qualys ID
    160117
    Date Published
    September 29, 2022
    Vendor Reference
    ELSA-2022-6700
    CVE Reference
    CVE-2022-40956, CVE-2022-40957, CVE-2022-40960, CVE-2022-40962, CVE-2022-40959, CVE-2022-40958
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Oracle Enterprise Linux has released a security update for firefox to fix the vulnerabilities.
    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation allows an attacker to compromise the system.
    Solution
    To resolve this issue, upgrade to the latest packages which contain a patch.Refer to Oracle Enterprise Linux advisory below for updates and patch information:

    ELSA-2022-6700
    Patches
    Oracle Linux ELSA-2022-6700
  • CVE-2022-40956+
    QID: 160116
    Recently Published

    Oracle Enterprise Linux Security Update for thunderbird (ELSA-2022-6717)

    Severity
    Critical4
    Qualys ID
    160116
    Date Published
    September 29, 2022
    Vendor Reference
    ELSA-2022-6717
    CVE Reference
    CVE-2022-40956, CVE-2022-36059, CVE-2022-40957, CVE-2022-40960, CVE-2022-40962, CVE-2022-40959, CVE-2022-3034, CVE-2022-40958, CVE-2022-3032, CVE-2022-3033
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Oracle Enterprise Linux has released a security update for thunderbird to fix the vulnerabilities.
    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation allows an attacker to compromise the system.
    Solution
    To resolve this issue, upgrade to the latest packages which contain a patch.Refer to Oracle Enterprise Linux advisory below for updates and patch information:

    ELSA-2022-6717
    Patches
    Oracle Linux ELSA-2022-6717
  • CVE-2022-40956+
    QID: 160115
    Recently Published

    Oracle Enterprise Linux Security Update for firefox (ELSA-2022-6702)

    Severity
    Critical4
    Qualys ID
    160115
    Date Published
    September 29, 2022
    Vendor Reference
    ELSA-2022-6702
    CVE Reference
    CVE-2022-40956, CVE-2022-40957, CVE-2022-40960, CVE-2022-40962, CVE-2022-40959, CVE-2022-40958
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Oracle Enterprise Linux has released a security update for firefox to fix the vulnerabilities.
    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation allows an attacker to compromise the system.
    Solution
    To resolve this issue, upgrade to the latest packages which contain a patch.Refer to Oracle Enterprise Linux advisory below for updates and patch information:

    ELSA-2022-6702
    Patches
    Oracle Linux ELSA-2022-6702
  • CVE-2022-40956+
    QID: 160114
    Recently Published

    Oracle Enterprise Linux Security Update for thunderbird (ELSA-2022-6708)

    Severity
    Critical4
    Qualys ID
    160114
    Date Published
    September 29, 2022
    Vendor Reference
    ELSA-2022-6708
    CVE Reference
    CVE-2022-40956, CVE-2022-36059, CVE-2022-40957, CVE-2022-40960, CVE-2022-40962, CVE-2022-40959, CVE-2022-3034, CVE-2022-40958, CVE-2022-3032, CVE-2022-3033
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Oracle Enterprise Linux has released a security update for thunderbird to fix the vulnerabilities.
    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation allows an attacker to compromise the system.
    Solution
    To resolve this issue, upgrade to the latest packages which contain a patch.Refer to Oracle Enterprise Linux advisory below for updates and patch information:

    ELSA-2022-6708
    Patches
    Oracle Linux ELSA-2022-6708
  • CVE-2014-9862
    QID: 752636
    Recently Published

    SUSE Enterprise Linux Security Update for libostree (SUSE-SU-2022:3455-1)

    Severity
    Critical4
    Qualys ID
    752636
    Date Published
    September 29, 2022
    Vendor Reference
    SUSE-SU-2022:3455-1
    CVE Reference
    CVE-2014-9862
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    SUSE has released a security update for libostree to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server for SAP Applications 15 SP1
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3455-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3455-1
  • CVE-2014-9862
    QID: 752634
    Recently Published

    SUSE Enterprise Linux Security Update for libostree (SUSE-SU-2022:3456-1)

    Severity
    Critical4
    Qualys ID
    752634
    Date Published
    September 29, 2022
    Vendor Reference
    SUSE-SU-2022:3456-1
    CVE Reference
    CVE-2014-9862
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    SUSE has released a security update for libostree to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server Basesystem 15 SP3
    SUSE Linux Enterprise Server for SAP Applications 15 SP2
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3456-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3456-1
  • CVE-2022-39249+
    QID: 690947
    Recently Published

    Free Berkeley Software Distribution (FreeBSD) Security Update for matrix clients (cb902a77-3f43-11ed-9402-901b0e9408dc)

    Severity
    Critical4
    Qualys ID
    690947
    Date Published
    September 29, 2022
    Vendor Reference
    cb902a77-3f43-11ed-9402-901b0e9408dc
    CVE Reference
    CVE-2022-39249, CVE-2022-39236, CVE-2022-39250, CVE-2022-39251
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    FreeBSD has released a security update for matrix clients to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to FreeBSD security advisory cb902a77-3f43-11ed-9402-901b0e9408dc for updates and patch information.
    Patches
    "FreeBSD" cb902a77-3f43-11ed-9402-901b0e9408dc
  • CVE-2022-41556+
    QID: 181083
    Recently Published

    Debian Security Update for lighttpd (DSA 5243-1)

    Severity
    Critical4
    Qualys ID
    181083
    Date Published
    September 29, 2022
    Vendor Reference
    DSA 5243-1
    CVE Reference
    CVE-2022-41556, CVE-2022-37797
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    Debian has released a security update for lighttpd to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory DSA 5243-1 for updates and patch information.
    Patches
    Debian DSA 5243-1
  • CVE-2021-3618
    QID: 752635
    Recently Published

    SUSE Enterprise Linux Security Update for vsftpd (SUSE-SU-2022:3457-1)

    Severity
    Critical4
    Qualys ID
    752635
    Date Published
    September 29, 2022
    Vendor Reference
    SUSE-SU-2022:3457-1
    CVE Reference
    CVE-2021-3618
    CVSS Scores
    Base 7.4 / Temporal 6.4
    Description
    SUSE has released a security update for vsftpd to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server for SAP Applications 15 SP2
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3457-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3457-1
  • CVE-2021-3618
    QID: 752633
    Recently Published

    SUSE Enterprise Linux Security Update for vsftpd (SUSE-SU-2022:3458-1)

    Severity
    Critical4
    Qualys ID
    752633
    Date Published
    September 29, 2022
    Vendor Reference
    SUSE-SU-2022:3458-1
    CVE Reference
    CVE-2021-3618
    CVSS Scores
    Base 7.4 / Temporal 6.4
    Description
    SUSE has released a security update for vsftpd to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server for SAP Applications 15
    SUSE Linux Enterprise Server for SAP Applications 15 SP1
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3458-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3458-1
  • CVE-2022-2330
    QID: 377611
    Recently Published

    McAfee Data Loss Prevention (DLP) Endpoint for Windows Extensible Markup Language (XML) External Entity Reference Vulnerability

    Severity
    Serious3
    Qualys ID
    377611
    Date Published
    September 29, 2022
    Vendor Reference
    CVE-2022-2330
    CVE Reference
    CVE-2022-2330
    CVSS Scores
    Base 6.5 / Temporal 5.7
    Description
    Improper Restriction of XML External Entity Reference vulnerability in DLP Endpoint for Windows prior to 11.9.100 allows a remote attacker to cause the DLP Agent to access a local service that the attacker wouldn't usually have access to via a carefully constructed XML file, which the DLP Agent doesn't parse correctly.

    Affected Versions:
    McAfee DLP Endpoint for Windows prior to 11.6.600.212 and 11.9.100

    QID Detection logic (Authenticated):
    This QID checks for vulnerable McAfee DLP Endpoint for Windows version by checking the registry entry for McAfee DLP Agent.

    Consequence
    Successful exploitation of the vulnerability may allow a remote attacker to cause the DLP Agent to access a local service that the attacker wouldn't usually have access to via a carefully constructed XML file, which the DLP Agent doesn't parse correctly.

    Solution
    Customers are advised to upgrade McAfee DLP Endpoint to version 11.6.600.212 and 11.9.100 to patch the vulnerability. For more information please refer to Trellix Security Advisory

    Patches
    SB10386
  • CVE-2022-3317+
    QID: 181085
    Recently Published

    Debian Security Update for chromium (DSA 5244-1)

    Severity
    Serious3
    Qualys ID
    181085
    Date Published
    September 29, 2022
    Vendor Reference
    DSA 5244-1
    CVE Reference
    CVE-2022-3317, CVE-2022-3316, CVE-2022-3306, CVE-2022-3308, CVE-2022-3201, CVE-2022-3311, CVE-2022-3307, CVE-2022-3314, CVE-2022-3318, CVE-2022-3310, CVE-2022-3305, CVE-2022-3315, CVE-2022-3312, CVE-2022-3304, CVE-2022-3309, CVE-2022-3313
    CVSS Scores
    Base 5.4 / Temporal 4.7
    Description
    Debian has released a security update for chromium to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory DSA 5244-1 for updates and patch information.
    Patches
    Debian DSA 5244-1
  • CVE-2021-3782
    QID: 904054
    Recently Published

    Common Base Linux Mariner (CBL-Mariner) Security Update for wayland (11024)

    Severity
    Urgent5
    Qualys ID
    904054
    Date Published
    September 29, 2022
    Vendor Reference
    11024
    CVE Reference
    CVE-2021-3782
    CVSS Scores
    Base 9.8 / Temporal 9
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for wayland to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • QID: 650059
    Recently Published

    EOL/Obsolete Software: Apache ZooKeeper 3.5.x Detected

    Severity
    Urgent5
    Qualys ID
    650059
    Date Published
    September 29, 2022
    Vendor Reference
    Apache ZooKeeper Release Notes
    CVSS Scores
    Base 9.8 / Temporal 9
    Description
    ZooKeeper is a centralized service for maintaining configuration information, naming, providing distributed synchronization, and providing group services.

    Apache ZooKeeper 3.5.x has reached EOL and will be effective from 1st of June, 2022
    Currently supported versions of Apache ZooKeeper are 3.6.x, 3.7.x and 3.8.x

    QID Detection Logic (Unauthenticated):
    This QID checks the banner response to see if the server is running a vulnerable version of Apache ZooKeeper.

    Consequence
    The system is at high risk of exposure to security vulnerabilities. Since the vendor no longer provides updates, obsolete software is more vulnerable to attacks.
    Solution
    Customers are advised to upgrade to Apache ZooKeeper latest versions to remediate these vulnerabilities.
  • QID: 650058
    Recently Published

    EOL/Obsolete Software: Apache ZooKeeper 3.4.x Detected

    Severity
    Urgent5
    Qualys ID
    650058
    Date Published
    September 29, 2022
    Vendor Reference
    Apache ZooKeeper Advisory
    CVSS Scores
    Base 9.8 / Temporal 9
    Description
    ZooKeeper is a centralized service for maintaining configuration information, naming, providing distributed synchronization, and providing group services.

    Apache ZooKeeper 3.4.x has reached EOL and will be effective from 1st of June, 2020
    Currently supported versions of Apache ZooKeeper are 3.6.x, 3.7.x and 3.8.x

    QID Detection Logic (Unauthenticated):
    This QID checks the banner response to see if the server is running a vulnerable version of Apache ZooKeeper.

    Consequence
    The system is at high risk of exposure to security vulnerabilities. Since the vendor no longer provides updates, obsolete software is more vulnerable to attacks.
    Solution
    Customers are advised to upgrade to Apache ZooKeeper latest versions to remediate these vulnerabilities.
  • CVE-2022-29581+
    QID: 752632
    Recently Published

    SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:3450-1)

    Severity
    Urgent5
    Qualys ID
    752632
    Date Published
    September 29, 2022
    Vendor Reference
    SUSE-SU-2022:3450-1
    CVE Reference
    CVE-2022-29581, CVE-2022-36879, CVE-2021-4203, CVE-2022-2639, CVE-2022-32250, CVE-2020-27784, CVE-2022-1012, CVE-2022-2663, CVE-2016-3695, CVE-2022-2588, CVE-2022-2977, CVE-2022-20166, CVE-2022-20369, CVE-2020-36516, CVE-2022-20368, CVE-2022-26373, CVE-2022-39188, CVE-2021-4155, CVE-2022-3028, CVE-2022-2905
    CVSS Scores
    Base 8.2 / Temporal 7.1
    Description
    SUSE has released a security update for kernel to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server for SAP Applications 15 SP2
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3450-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3450-1
  • CVE-2022-41224+
    QID: 730618
    Recently Published

    Jenkins Cross-Site Scripting (XSS) Vulnerability (Jenkins Security Advisory 2022-09-21)

    Severity
    Critical4
    Qualys ID
    730618
    Date Published
    September 29, 2022
    Vendor Reference
    Jenkins Security Advisory 2022-09-21
    CVE Reference
    CVE-2022-41224, CVE-2022-41225, CVE-2022-41226, CVE-2022-41227, CVE-2022-41228, CVE-2022-41229, CVE-2022-41230, CVE-2022-41231, CVE-2022-41232, CVE-2022-41233, CVE-2022-41234, CVE-2022-41235, CVE-2022-41236, CVE-2022-41237, CVE-2022-41238, CVE-2022-41239, CVE-2022-41240, CVE-2022-41241, CVE-2022-41242, CVE-2022-41243, CVE-2022-41244, CVE-2022-41245, CVE-2022-41246, CVE-2022-41247, CVE-2022-41248, CVE-2022-41249, CVE-2022-41250, CVE-2022-41251, CVE-2022-41252, CVE-2022-41253, CVE-2022-41254, CVE-2022-41255
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Jenkins is an open-source automation server written in Java. Jenkins helps to automate the non-human part of the software development process, with continuous integration and facilitating technical aspects of continuous delivery.

    Jenkins 2.367 through 2.369 (both inclusive) does not escape tooltips of the l:helpIcon UI component used for some help icons on the Jenkins web UI.

    Affected Versions:
    Jenkins weekly up to and including 2.369

    Fixed Versions:
    Jenkins weekly should be updated to version 2.370

    QID Detection Logic(Unauthenticated):
    This QID checks for vulnerable version by sending a crafted GET request to Jenkins. This QID also detects the vulnerable version from login page or HTTP header.

    Consequence
    A stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control tooltips for this component.

    Solution
    Customers are advised to upgrade to latest Jenkins version
    For further details refer to Jenkins Security Advisory 2022-09-21
    Patches
    Jenkins Security Advisory 2022-09-21
  • CVE-2022-32886
    QID: 181082
    Recently Published

    Debian Security Update for wpewebkit (DSA 5241-1)

    Severity
    Critical4
    Qualys ID
    181082
    Date Published
    September 29, 2022
    Vendor Reference
    DSA 5241-1
    CVE Reference
    CVE-2022-32886
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description
    Debian has released a security update for wpewebkit to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory DSA 5241-1 for updates and patch information.
    Patches
    Debian DSA 5241-1
  • CVE-2022-32886
    QID: 181081
    Recently Published

    Debian Security Update for webkit2gtk (DSA 5240-1)

    Severity
    Critical4
    Qualys ID
    181081
    Date Published
    September 29, 2022
    Vendor Reference
    DSA 5240-1
    CVE Reference
    CVE-2022-32886
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description
    Debian has released a security update for webkit2gtk to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory DSA 5240-1 for updates and patch information.
    Patches
    Debian DSA 5240-1
  • CVE-1999-0612
    QID: 904053
    Recently Published

    Common Base Linux Mariner (CBL-Mariner) Security Update for finger (6267-1)

    Severity
    Critical4
    Qualys ID
    904053
    Date Published
    September 29, 2022
    Vendor Reference
    6267-1
    CVE Reference
    CVE-1999-0612
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has released a security update for finger to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    CBL-Mariner has issued updated packages to fix this vulnerability. For more information about the vulnerability and obtaining patches, refer to the following CBL-Mariner security advisories:https://github.com/microsoft/CBL-Mariner/releases

    Patches
    CBL-Mariner Linux 6267-1
  • QID: 283152
    Recently Published

    Fedora Security Update for libofx (FEDORA-2022-95000d85e2)

    Severity
    Critical4
    Qualys ID
    283152
    Date Published
    September 29, 2022
    Vendor Reference
    FEDORA-2022-95000d85e2
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Fedora has released a security update for libofx to fix the vulnerabilities.

    Affected OS:
    Fedora 36


    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Refer to Fedora security advisory Fedora 36 for updates and patch information.
    Patches
    Fedora 36 FEDORA-2022-95000d85e2
  • CVE-2022-38752
    QID: 904055
    Recently Published

    Common Base Linux Mariner (CBL-Mariner) Security Update for snakeyaml (11026)

    Severity
    Serious3
    Qualys ID
    904055
    Date Published
    September 29, 2022
    Vendor Reference
    Mariner_2.0_11026
    CVE Reference
    CVE-2022-38752
    CVSS Scores
    Base 6.5 / Temporal 6
    Description
    CBL-Mariner 2.0 is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for snakeyaml to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • CVE-2021-23282
    QID: 591061
    Recently Published

    Eaton Intelligent Power Manager Vulnerability (ICSA-22-130-04) (ETN-VA-2021-1001a)

    Severity
    Serious3
    Qualys ID
    591061
    Date Published
    September 29, 2022
    Vendor Reference
    icsa-22-130-04
    CVE Reference
    CVE-2021-23282
    CVSS Scores
    Base 5.2 / Temporal 4.5
    Description

    AFFECTED PRODUCTS
    The following versions of Eaton IPM, a power management platform, are affected: Eaton Intelligent Power Manager (IPM) v1: All versions prior to v1.70

    QID Detection Logic (Authenticated)
    QID checks for the Vulnerable version using windows registry keys

    Consequence
    Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code using untrusted data.
    Solution

    Customers are advised to refer to CERT MITIGATIONS section icsa-22-130-04 for affected packages and patching details.

    Patches
    icsa-22-130-04
  • QID: 48221
    Recently Published

    Apache Hadoop NameNode UI Endpoints Accessible

    Severity
    Minimal1
    Qualys ID
    48221
    Date Published
    September 29, 2022
    CVSS Scores
    Base / Temporal
    Description
    The Apache Hadoop software library is a framework that allows for the distributed processing of large data sets across clusters of computers using simple programming models.

    QID Detection Logic:(Unauthenticated)
    This QID sends GET request to webhdfs/v1 to check Hadoop Namenode information is set to or not.

    Consequence
    N/A
    Solution
    N/A
  • CVE-2022-1018
    QID: 591060
    Recently Published

    Rockwell Automation ISaGRAF, CCW, SIS Workstation Vulnerability (ICSA-22-088-01) (PN1588)

    Severity
    Serious3
    Qualys ID
    591060
    Date Published
    September 29, 2022
    Vendor Reference
    icsa-22-088-01
    CVE Reference
    CVE-2022-1018
    CVSS Scores
    Base 5.5 / Temporal 4.8
    Description

    AFFECTED PRODUCTS
    The following Rockwell Automation software products are affected: Connected Component Workbench: v12.00 and prior
    ISaGRAF Workbench: All versions prior to v6.6.10
    ISaGRAF Workbench: v6.6.9 and prior
    Safety Instrumented Systems Workstation: v1.1 and prior

    QID Detection Logic (Authenticated)
    QID checks for the Vulnerable version using windows registry keys

    Consequence
    Successful exploitation of this vulnerability could allow an attacker to pass local file data to a remote web server, leading to loss of confidentiality.
    Solution

    Customers are advised to refer to Schneider Electric MITIGATIONS section icsa-22-088-01 for affected packages and patching details.

    Patches
    PN1588, icsa-22-088-01
  • CVE-2022-36934+
    QID: 630827
    Recently Published

    Whatsapp for Android and iOS Multiple Vulnerabilities

    Severity
    Urgent5
    Qualys ID
    630827
    Date Published
    September 29, 2022
    Vendor Reference
    CVE-2022-27492
    CVE Reference
    CVE-2022-36934, CVE-2022-27492
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    CVE-2022-36934 An integer overflow in WhatsApp for Android prior to v2.22.16.12, Business for Android prior to v2.22.16.12, iOS prior to v2.22.16.12, Business for iOS prior to v2.22.16.12 could result in remote code execution in an established video call.

    CVE-2022-27492 An integer underflow in WhatsApp for Android prior to v2.22.16.2, WhatsApp for iOS v2.22.15.9 could have caused remote code execution when receiving a crafted video file.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to CVE-2022-27492 to address this issue and obtain more information.
    Patches
    Android CVE-2022-27492, iOS CVE-2022-27492
  • CVE-2022-2623+
    QID: 630826
    Recently Published

    Google Chrome For Android Use After Free Vulnerability

    Severity
    Critical4
    Qualys ID
    630826
    Date Published
    September 29, 2022
    Vendor Reference
    CVE-2022-2623
    CVE Reference
    CVE-2022-2623, CVE-2022-2611
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description
    Use after free in Offline in Google Chrome on Android prior to 104.0.5112.79 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via specific UI interactions.
    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to CVE-2022-2623 to address this issue and obtain more information.
    Patches
    Android CVE-2022-2623
  • CVE-2022-40674
    QID: 690945
    Recently Published

    Free Berkeley Software Distribution (FreeBSD) Security Update for expat (0a0670a1-3e1a-11ed-b48b-e0d55e2a8bf9)

    Severity
    Urgent5
    Qualys ID
    690945
    Date Published
    September 28, 2022
    Vendor Reference
    0a0670a1-3e1a-11ed-b48b-e0d55e2a8bf9
    CVE Reference
    CVE-2022-40674
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    FreeBSD has released a security update for expat to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to FreeBSD security advisory 0a0670a1-3e1a-11ed-b48b-e0d55e2a8bf9 for updates and patch information.
    Patches
    "FreeBSD" 0a0670a1-3e1a-11ed-b48b-e0d55e2a8bf9
  • CVE-2022-3198+
    QID: 752631
    Recently Published

    OpenSUSE Security Update for opera (openSUSE-SU-2022:10131-1)

    Severity
    Critical4
    Qualys ID
    752631
    Date Published
    September 28, 2022
    Vendor Reference
    openSUSE-SU-2022:10131-1
    CVE Reference
    CVE-2022-3198, CVE-2022-3201, CVE-2022-3196, CVE-2022-3199, CVE-2022-3197, CVE-2022-3200
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description
    OpenSUSE has released a security update for opera to fix the vulnerabilities.

    Affected Products:
    openSUSE Leap 15.4:NonFree

    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Refer to openSUSE security advisory openSUSE-SU-2022:10131-1 for updates and patch information.
    Patches
    OpenSuse openSUSE-SU-2022:10131-1
  • CVE-2022-2132+
    QID: 752630
    Recently Published

    SUSE Enterprise Linux Security Update for dpdk (SUSE-SU-2022:3429-1)

    Severity
    Critical4
    Qualys ID
    752630
    Date Published
    September 28, 2022
    Vendor Reference
    SUSE-SU-2022:3429-1
    CVE Reference
    CVE-2022-2132, CVE-2022-28199
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    SUSE has released a security update for dpdk to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server for SAP Applications 15 SP2
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3429-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3429-1
  • CVE-2022-2132
    QID: 752629
    Recently Published

    SUSE Enterprise Linux Security Update for dpdk (SUSE-SU-2022:3430-1)

    Severity
    Critical4
    Qualys ID
    752629
    Date Published
    September 28, 2022
    Vendor Reference
    SUSE-SU-2022:3430-1
    CVE Reference
    CVE-2022-2132
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    SUSE has released a security update for dpdk to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server for SAP Applications 15 SP1
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3430-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3430-1
  • CVE-2022-40962+
    QID: 752627
    Recently Published

    SUSE Enterprise Linux Security Update for MozillaFirefox (SUSE-SU-2022:3441-1)

    Severity
    Critical4
    Qualys ID
    752627
    Date Published
    September 28, 2022
    Vendor Reference
    SUSE-SU-2022:3441-1
    CVE Reference
    CVE-2022-40962, CVE-2022-40960, CVE-2022-40958, CVE-2022-40959, CVE-2022-40956, CVE-2022-40957
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    SUSE has released a security update for firefox to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server for SAP Applications 15
    SUSE Linux Enterprise Server for SAP Applications 15 SP1
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3441-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3441-1
  • CVE-2022-40962+
    QID: 752626
    Recently Published

    SUSE Enterprise Linux Security Update for MozillaFirefox (SUSE-SU-2022:3440-1)

    Severity
    Critical4
    Qualys ID
    752626
    Date Published
    September 28, 2022
    Vendor Reference
    SUSE-SU-2022:3440-1
    CVE Reference
    CVE-2022-40962, CVE-2022-40960, CVE-2022-40958, CVE-2022-40959, CVE-2022-40956, CVE-2022-40957
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    SUSE has released a security update for firefox to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server for SAP Applications 12 SP4
    SUSE Linux Enterprise (Desktop|Server) 12 SP5
    SUSE Linux Enterprise Server 12 SP5
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3440-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3440-1
  • CVE-2022-40962+
    QID: 181080
    Recently Published

    Debian Security Update for thunderbird (DSA 5238-1)

    Severity
    Critical4
    Qualys ID
    181080
    Date Published
    September 28, 2022
    Vendor Reference
    DSA 5238-1
    CVE Reference
    CVE-2022-40962, CVE-2022-40960, CVE-2022-40958, CVE-2022-40959, CVE-2022-40956, CVE-2022-40957
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Debian has released a security update for thunderbird to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory DSA 5238-1 for updates and patch information.
    Patches
    Debian DSA 5238-1
  • CVE-2022-40962+
    QID: 181078
    Recently Published

    Debian Security Update for thunderbird (DLA 3123-1)

    Severity
    Critical4
    Qualys ID
    181078
    Date Published
    September 28, 2022
    Vendor Reference
    DLA 3123-1
    CVE Reference
    CVE-2022-40962, CVE-2022-40960, CVE-2022-40958, CVE-2022-40959, CVE-2022-40956, CVE-2022-40957
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Debian has released a security update for thunderbird to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory DLA 3123-1 for updates and patch information.
    Patches
    Debian DLA 3123-1
  • CVE-2021-41133
    QID: 752628
    Recently Published

    SUSE Enterprise Linux Security Update for flatpak (SUSE-SU-2022:3439-1)

    Severity
    Critical4
    Qualys ID
    752628
    Date Published
    September 28, 2022
    Vendor Reference
    SUSE-SU-2022:3439-1
    CVE Reference
    CVE-2021-41133
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    SUSE has released a security update for flatpak to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server for SAP Applications 15
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3439-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3439-1
  • CVE-2021-3410
    QID: 752625
    Recently Published

    SUSE Enterprise Linux Security Update for libcaca (SUSE-SU-2022:3428-1)

    Severity
    Critical4
    Qualys ID
    752625
    Date Published
    September 28, 2022
    Vendor Reference
    SUSE-SU-2022:3428-1
    CVE Reference
    CVE-2021-3410
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    SUSE has released a security update for libcaca to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise (Desktop|Server) 12 SP5
    SUSE Linux Enterprise Server 12 SP5
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3428-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3428-1
  • CVE-2022-33742+
    QID: 198964
    Recently Published

    Ubuntu Security Notification for Linux kernel (GCP) Vulnerabilities (USN-5644-1)

    Severity
    Critical4
    Qualys ID
    198964
    Date Published
    September 28, 2022
    Vendor Reference
    USN-5644-1
    CVE Reference
    CVE-2022-33742, CVE-2022-33743, CVE-2022-2318, CVE-2022-33740, CVE-2022-34495, CVE-2021-33655, CVE-2022-34494, CVE-2022-36946, CVE-2022-26365, CVE-2022-33741, CVE-2022-33744
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    Ubuntu has released a security update for linux to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Ubuntu security advisory USN-5644-1 for updates and patch information.
    Patches
    Ubuntu Linux USN-5644-1
  • CVE-2022-2085+
    QID: 198965
    Recently Published

    Ubuntu Security Notification for Ghostscript Vulnerabilities (USN-5643-1)

    Severity
    Critical4
    Qualys ID
    198965
    Date Published
    September 28, 2022
    Vendor Reference
    USN-5643-1
    CVE Reference
    CVE-2022-2085, CVE-2020-27792
    CVSS Scores
    Base 7.1 / Temporal 6.2
    Description
    Ubuntu has released a security update for ghostscript to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Ubuntu security advisory USN-5643-1 for updates and patch information.
    Patches
    Ubuntu Linux USN-5643-1
  • CVE-2022-3306+
    QID: 690946
    Recently Published

    Free Berkeley Software Distribution (FreeBSD) Security Update for chromium (18529cb0-3e9c-11ed-9bc7-3065ec8fd3ec)

    Severity
    Critical4
    Qualys ID
    690946
    Date Published
    September 28, 2022
    Vendor Reference
    18529cb0-3e9c-11ed-9bc7-3065ec8fd3ec
    CVE Reference
    CVE-2022-3306, CVE-2022-3314, CVE-2022-3316, CVE-2022-3304, CVE-2022-3309, CVE-2022-3201, CVE-2022-3318, CVE-2022-3317, CVE-2022-3311, CVE-2022-3312, CVE-2022-3307, CVE-2022-3315, CVE-2022-3310, CVE-2022-3305, CVE-2022-3308, CVE-2022-3313
    CVSS Scores
    Base 5.4 / Temporal 4.7
    Description
    FreeBSD has released a security update for chromium to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to FreeBSD security advisory 18529cb0-3e9c-11ed-9bc7-3065ec8fd3ec for updates and patch information.
    Patches
    "FreeBSD" 18529cb0-3e9c-11ed-9bc7-3065ec8fd3ec
  • CVE-2022-3306+
    QID: 377610
    Recently Published

    Google Chrome Prior to 106.0.5249.61 Multiple Vulnerabilities

    Severity
    Critical4
    Qualys ID
    377610
    Date Published
    September 28, 2022
    Vendor Reference
    Google Chrome 106.0.5249.61
    CVE Reference
    CVE-2022-3306, CVE-2022-3314, CVE-2022-3316, CVE-2022-3304, CVE-2022-3309, CVE-2022-3201, CVE-2022-3318, CVE-2022-3317, CVE-2022-3311, CVE-2022-3312, CVE-2022-3307, CVE-2022-3315, CVE-2022-3310, CVE-2022-3305, CVE-2022-3308, CVE-2022-3313
    CVSS Scores
    Base 5.4 / Temporal 4.7
    Description
    Chrome has released security updates for Windows, Mac, and Linux to fix the vulnerabilities.


    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Chrome security advisory 106.0.5249.61 for updates and patch information.
    Patches
    Google Chrome 106.0.5249.61
  • CVE-2021-45943
    QID: 181079
    Recently Published

    Debian Security Update for gdal (DSA 5239-1)

    Severity
    Serious3
    Qualys ID
    181079
    Date Published
    September 28, 2022
    Vendor Reference
    DSA 5239-1
    CVE Reference
    CVE-2021-45943
    CVSS Scores
    Base 5.5 / Temporal 4.8
    Description
    Debian has released a security update for gdal to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory DSA 5239-1 for updates and patch information.
    Patches
    Debian DSA 5239-1
  • CVE-2021-3782
    QID: 904051
    Recently Published

    Common Base Linux Mariner (CBL-Mariner) Security Update for wayland (11019)

    Severity
    Urgent5
    Qualys ID
    904051
    Date Published
    September 28, 2022
    Vendor Reference
    Mariner_2.0_11019
    CVE Reference
    CVE-2021-3782
    CVSS Scores
    Base 9.8 / Temporal 9
    Description
    CBL-Mariner 2.0 is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for wayland to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • QID: 650057
    Recently Published

    EOL/Obsolete Software: Apache Traffic Server 7.x Detected

    Severity
    Urgent5
    Qualys ID
    650057
    Date Published
    September 28, 2022
    Vendor Reference
    Apache Traffic Server EOL Reference
    CVSS Scores
    Base 9.8 / Temporal 9
    Description
    Apache Traffic Server is a fast, scalable and extensible HTTP/1.1 and HTTP/2.0 compliant caching proxy server.

    Apache Traffic Server versions 7.1.12 was released on Jan 07, 2021 and no further releases for 7.1.x have been released.
    Apache Traffic Server is currently on a two year major release cycle.
    The LTS cycle is supported only for major releases up to 4 years.
    Currently supported versions of Apache Traffic Server are 8.1.x, 9.1.x

    QID Detection Logic (Unauthenticated):
    This QID checks the HTTP Server response header to see if the server is running a vulnerable version of Apache Traffic Server.

    Consequence
    The system is at high risk of exposure to security vulnerabilities. Since the vendor no longer provides updates, obsolete software is more vulnerable to attacks.
    Solution
    Customers are advised to upgrade to Apache Traffic Server Downloads or later versions to remediate these vulnerabilities.
  • CVE-2022-32886+
    QID: 283151
    Recently Published

    Fedora Security Update for webkit2gtk3 (FEDORA-2022-ece798a8d4)

    Severity
    Critical4
    Qualys ID
    283151
    Date Published
    September 28, 2022
    Vendor Reference
    FEDORA-2022-ece798a8d4
    CVE Reference
    CVE-2022-32886, CVE-2022-32891
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description
    Fedora has released a security update for webkit2gtk3 to fix the vulnerabilities.

    Affected OS:
    Fedora 35


    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Refer to Fedora security advisory Fedora 35 for updates and patch information.
    Patches
    Fedora 35 FEDORA-2022-ece798a8d4
  • CVE-2021-33515+
    QID: 181077
    Recently Published

    Debian Security Update for dovecot (DLA 3122-1)

    Severity
    Critical4
    Qualys ID
    181077
    Date Published
    September 28, 2022
    Vendor Reference
    DLA 3122-1
    CVE Reference
    CVE-2021-33515, CVE-2022-30550
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description
    Debian has released a security update for dovecot to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory DLA 3122-1 for updates and patch information.
    Patches
    Debian DLA 3122-1
  • QID: 283149
    Recently Published

    Fedora Security Update for firefox (FEDORA-2022-38179cd087)

    Severity
    Critical4
    Qualys ID
    283149
    Date Published
    September 28, 2022
    Vendor Reference
    FEDORA-2022-38179cd087
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Fedora has released a security update for firefox to fix the vulnerabilities.

    Affected OS:
    Fedora 36


    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Refer to Fedora security advisory Fedora 36 for updates and patch information.
    Patches
    Fedora 36 FEDORA-2022-38179cd087
  • CVE-2022-38177+
    QID: 283150
    Recently Published

    Fedora Security Update for bind (FEDORA-2022-8268735e06)

    Severity
    Critical4
    Qualys ID
    283150
    Date Published
    September 28, 2022
    Vendor Reference
    FEDORA-2022-8268735e06
    CVE Reference
    CVE-2022-38177, CVE-2022-3080, CVE-2022-38178, CVE-2022-2795
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    Fedora has released a security update for bind to fix the vulnerabilities.

    Affected OS:
    Fedora 36


    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Refer to Fedora security advisory Fedora 36 for updates and patch information.
    Patches
    Fedora 36 FEDORA-2022-8268735e06
  • CVE-2022-2785
    QID: 904052
    Recently Published

    Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (11015)

    Severity
    Serious3
    Qualys ID
    904052
    Date Published
    September 28, 2022
    Vendor Reference
    Mariner_2.0_11015
    CVE Reference
    CVE-2022-2785
    CVSS Scores
    Base 5.5 / Temporal 5.1
    Description
    CBL-Mariner 2.0 is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for kernel to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • CVE-2022-3278
    QID: 904050
    Recently Published

    Common Base Linux Mariner (CBL-Mariner) Security Update for vim (11018)

    Severity
    Serious3
    Qualys ID
    904050
    Date Published
    September 28, 2022
    Vendor Reference
    Mariner_2.0_11018
    CVE Reference
    CVE-2022-3278
    CVSS Scores
    Base 5.5 / Temporal 5.1
    Description
    CBL-Mariner 2.0 is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for vim to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • CVE-2022-3278
    QID: 904049
    Recently Published

    Common Base Linux Mariner (CBL-Mariner) Security Update for vim (11023)

    Severity
    Serious3
    Qualys ID
    904049
    Date Published
    September 28, 2022
    Vendor Reference
    11023
    CVE Reference
    CVE-2022-3278
    CVSS Scores
    Base 5.5 / Temporal 5.1
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for vim to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • CVE-2022-2785
    QID: 904048
    Recently Published

    Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (11022)

    Severity
    Serious3
    Qualys ID
    904048
    Date Published
    September 28, 2022
    Vendor Reference
    11022
    CVE Reference
    CVE-2022-2785
    CVSS Scores
    Base 5.5 / Temporal 5.1
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for kernel to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • CVE-2022-2048
    QID: 730617
    Recently Published

    Eclipse Jetty Denial of Service (DoS) Vulnerability

    Severity
    Critical4
    Qualys ID
    730617
    Date Published
    September 28, 2022
    Vendor Reference
    eclipse jetty
    CVE Reference
    CVE-2022-2048
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    Eclipse Jetty is a Java HTTP server and Java Servlet container. While Web Servers are usually associated with serving documents to people, Jetty is now often used for machine to machine communications, usually within larger software frameworks.

    In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources.

    Versions Affected:
    Eclipse Jetty Prior to 9.4.47
    Eclipse Jetty 10.0.0 to 10.0.9
    Eclipse Jetty 11.0.0 to 11.0.9
    QID Detection Logic:(Unauthenticated)
    It looks at http banner to check for vulnerable version of Jetty.

    Consequence
    This can lead to a Denial of Service scenario where there are no enough resources left to process good requests.

    Solution

    Customers are advised to refer to eclipse Jetty for more information.

    Patches
    eclipse Jetty
  • CVE-2022-21385+
    QID: 752615
    Recently Published

    SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:3408-1)

    Severity
    Urgent5
    Qualys ID
    752615
    Date Published
    September 27, 2022
    Vendor Reference
    SUSE-SU-2022:3408-1
    CVE Reference
    CVE-2022-21385, CVE-2022-20368, CVE-2022-26373, CVE-2021-4203, CVE-2022-2639, CVE-2022-29581, CVE-2022-2977, CVE-2022-2588, CVE-2022-36879, CVE-2022-39188, CVE-2022-2663, CVE-2020-36516, CVE-2022-1012, CVE-2022-20369, CVE-2022-3028
    CVSS Scores
    Base 8.2 / Temporal 7.1
    Description
    SUSE has released a security update for kernel to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server for SAP Applications 15 SP1
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3408-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3408-1
  • CVE-2021-33655+
    QID: 198962
    Recently Published

    Ubuntu Security Notification for Linux kernel (Azure CVM) Vulnerabilities (USN-5639-1)

    Severity
    Urgent5
    Qualys ID
    198962
    Date Published
    September 27, 2022
    Vendor Reference
    USN-5639-1
    CVE Reference
    CVE-2021-33655, CVE-2022-32296, CVE-2022-36946, CVE-2022-2503, CVE-2022-1012, CVE-2022-1729
    CVSS Scores
    Base 8.2 / Temporal 7.1
    Description
    Ubuntu has released a security update for linux to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Ubuntu security advisory USN-5639-1 for updates and patch information.
    Patches
    Ubuntu Linux USN-5639-1
  • CVE-2021-27577+
    QID: 87522
    Recently Published

    Apache Traffic Server Multiple Vulnerabilities

    Severity
    Critical4
    Qualys ID
    87522
    Date Published
    September 27, 2022
    Vendor Reference
    Apache Traffic Server Reference
    CVE Reference
    CVE-2021-27577, CVE-2021-32565, CVE-2021-32566, CVE-2021-32567, CVE-2021-35474
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Apache Traffic Server is a fast, scalable and extensible HTTP/1.1 and HTTP/2.0 compliant caching proxy server.

    ATS is vulnerable to potential smuggle and MITM attacks
    Version Affected:
    ATS 7.0.0 to 7.1.12
    ATS 8.0.0 to 8.1.1
    ATS 9.0.0 to 9.0.1
    QID Detection Logic:
    This unauthenticated QID relies on the version reported by the ATS service.

    Consequence
    It allows an attacker to perform multiple attacks like cache poisoning, buffer overflow, and Denial of Service.

    Solution
    Customers are advised to upgrade to Apache Traffic Server 8.1.2, 9.0.2 or later versions to remediate these vulnerabilities.
    Patches
    CVE-2021-32567
  • CVE-2022-3196+
    QID: 752624
    Recently Published

    OpenSUSE Security Update for opera (openSUSE-SU-2022:10130-1)

    Severity
    Critical4
    Qualys ID
    752624
    Date Published
    September 27, 2022
    Vendor Reference
    openSUSE-SU-2022:10130-1
    CVE Reference
    CVE-2022-3196, CVE-2022-3197, CVE-2022-3198, CVE-2022-3200, CVE-2022-3201, CVE-2022-3199
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description
    OpenSUSE has released a security update for opera to fix the vulnerabilities.

    Affected Products:
    openSUSE Leap 15.3:NonFree

    Consequence
    Malicious users could use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.
    Solution
    Refer to openSUSE security advisory openSUSE-SU-2022:10130-1 for updates and patch information.
    Patches
    OpenSuse openSUSE-SU-2022:10130-1
  • CVE-2022-32886
    QID: 198963
    Recently Published

    Ubuntu Security Notification for WebKitGTK Vulnerabilities (USN-5642-1)

    Severity
    Critical4
    Qualys ID
    198963
    Date Published
    September 27, 2022
    Vendor Reference
    USN-5642-1
    CVE Reference
    CVE-2022-32886
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description
    Ubuntu has released a security update for webkitgtk to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Ubuntu security advisory USN-5642-1 for updates and patch information.
    Patches
    Ubuntu Linux USN-5642-1
  • CVE-2022-2132
    QID: 752620
    Recently Published

    SUSE Enterprise Linux Security Update for dpdk (SUSE-SU-2022:3381-1)

    Severity
    Critical4
    Qualys ID
    752620
    Date Published
    September 27, 2022
    Vendor Reference
    SUSE-SU-2022:3381-1
    CVE Reference
    CVE-2022-2132
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    SUSE has released a security update for dpdk to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server 12 SP5
    SUSE Linux Enterprise (Desktop|Server) 12 SP5
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3381-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3381-1
  • CVE-2022-31252
    QID: 752617
    Recently Published

    SUSE Enterprise Linux Security Update for permissions (SUSE-SU-2022:3382-1)

    Severity
    Critical4
    Qualys ID
    752617
    Date Published
    September 27, 2022
    Vendor Reference
    SUSE-SU-2022:3382-1
    CVE Reference
    CVE-2022-31252
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    SUSE has released a security update for permissions to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server 12 SP5
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3382-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3382-1
  • CVE-2022-31252
    QID: 752616
    Recently Published

    SUSE Enterprise Linux Security Update for permissions (SUSE-SU-2022:3394-1)

    Severity
    Critical4
    Qualys ID
    752616
    Date Published
    September 27, 2022
    Vendor Reference
    SUSE-SU-2022:3394-1
    CVE Reference
    CVE-2022-31252
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    SUSE has released a security update for permissions to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server Basesystem 15 SP3
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3394-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3394-1
  • CVE-2022-40960+
    QID: 752611
    Recently Published

    SUSE Enterprise Linux Security Update for MozillaFirefox (SUSE-SU-2022:3396-1)

    Severity
    Critical4
    Qualys ID
    752611
    Date Published
    September 27, 2022
    Vendor Reference
    SUSE-SU-2022:3396-1
    CVE Reference
    CVE-2022-40960, CVE-2022-34480, CVE-2022-34479, CVE-2022-34476, CVE-2022-34484, CVE-2022-34485, CVE-2022-36318, CVE-2022-38473, CVE-2022-34483, CVE-2022-34477, CVE-2022-34468, CVE-2022-34469, CVE-2022-38478, CVE-2022-40959, CVE-2022-38476, CVE-2022-34473, CVE-2022-40957, CVE-2022-34471, CVE-2022-34472, CVE-2022-38477, CVE-2022-34478, CVE-2022-38472, CVE-2022-40958, CVE-2022-2200, CVE-2022-36314, CVE-2022-34475, CVE-2022-40962, CVE-2022-34470, CVE-2022-36319, CVE-2022-2505, CVE-2022-34481, CVE-2022-34474, CVE-2022-40956, CVE-2022-34482
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    SUSE has released a security update for firefox to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server for SAP Applications 15 SP2
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3396-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3396-1
  • CVE-2022-40956+
    QID: 240696
    Recently Published

    Red Hat Update for firefox (RHSA-2022:6701)

    Severity
    Critical4
    Qualys ID
    240696
    Date Published
    September 27, 2022
    Vendor Reference
    RHSA-2022:6701
    CVE Reference
    CVE-2022-40956, CVE-2022-40957, CVE-2022-40958, CVE-2022-40959, CVE-2022-40960, CVE-2022-40962
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Mozilla firefox is an open-source web browser, designed for standards compliance, performance, and portability...Security Fix(es):
      mozilla: bypassing featurepolicy restrictions on transient pages (cve-2022-40959).
      Mozilla: data-race when parsing non-utf-8 urls in threads (cve-2022-40960).
      Mozilla: memory safety bugs fixed in firefox 105 and firefox esr 102.3 (cve-2022-40962).
      Mozilla: bypassing secure context restriction for cookies with __host and __secure prefix (cve-2022-40958).
      Mozilla: content-security-policy base-uri bypass (cve-2022-40956).
      Mozilla: incoherent instruction cache when building wasm on arm64 (cve-2022-40957).
    Affected Products:
      Red Hat enterprise linux for x86_64 - extended update support 8.4 x86_64.
      Red hat enterprise linux server - aus 8.4 x86_64.
      Red hat enterprise linux for ibm z systems - extended update support 8.4 s390x.
      Red hat enterprise linux for power, little endian - extended update support 8.4 ppc64le.
      Red hat enterprise linux server - tus 8.4 x86_64.
      Red hat enterprise linux for arm 64 - extended update support 8.4 aarch64.
      Red hat enterprise linux server for power le - update services for sap solutions 8.4 ppc64le.
      Red hat enterprise linux for x86_64 - update services for sap solutions 8.4 x86_64.
    .

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Red Hat security advisory RHSA-2022:6701 for updates and patch information.
    Patches
    Red Hat Enterprise Linux RHSA-2022:6701
  • CVE-2022-40956+
    QID: 240695
    Recently Published

    Red Hat Update for firefox (RHSA-2022:6711)

    Severity
    Critical4
    Qualys ID
    240695
    Date Published
    September 27, 2022
    Vendor Reference
    RHSA-2022:6711
    CVE Reference
    CVE-2022-40956, CVE-2022-40957, CVE-2022-40958, CVE-2022-40959, CVE-2022-40960, CVE-2022-40962
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Mozilla firefox is an open-source web browser, designed for standards compliance, performance, and portability...Security Fix(es):
      mozilla: bypassing featurepolicy restrictions on transient pages (cve-2022-40959).
      Mozilla: data-race when parsing non-utf-8 urls in threads (cve-2022-40960).
      Mozilla: memory safety bugs fixed in firefox 105 and firefox esr 102.3 (cve-2022-40962).
      Mozilla: bypassing secure context restriction for cookies with __host and __secure prefix (cve-2022-40958).
      Mozilla: content-security-policy base-uri bypass (cve-2022-40956).
      Mozilla: incoherent instruction cache when building wasm on arm64 (cve-2022-40957).
    Affected Products:
      Red Hat enterprise linux server 7 x86_64.
      Red hat enterprise linux workstation 7 x86_64.
      Red hat enterprise linux desktop 7 x86_64.
      Red hat enterprise linux for ibm z systems 7 s390x.
      Red hat enterprise linux for power, big endian 7 ppc64.
      Red hat enterprise linux for power, little endian 7 ppc64le.
    .

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Red Hat security advisory RHSA-2022:6711 for updates and patch information.
    Patches
    Red Hat Enterprise Linux RHSA-2022:6711
  • CVE-2022-3032+
    QID: 240694
    Recently Published

    Red Hat Update for thunderbird (RHSA-2022:6715)

    Severity
    Critical4
    Qualys ID
    240694
    Date Published
    September 27, 2022
    Vendor Reference
    RHSA-2022:6715
    CVE Reference
    CVE-2022-3032, CVE-2022-3033, CVE-2022-3034, CVE-2022-36059, CVE-2022-40956, CVE-2022-40957, CVE-2022-40958, CVE-2022-40959, CVE-2022-40960, CVE-2022-40962
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Mozilla thunderbird is a standalone mail and newsgroup client...Security Fix(es):
      mozilla: leaking of sensitive information when composing a response to an html email with a meta refresh tag (cve-2022-3033).
      Mozilla: bypassing featurepolicy restrictions on transient pages (cve-2022-40959).
      Mozilla: data-race when parsing non-utf-8 urls in threads (cve-2022-40960).
      Mozilla: memory safety bugs fixed in firefox 105 and firefox esr 102.3 (cve-2022-40962).
      Mozilla: remote content specified in an html document that was nested inside an iframe's srcdoc attribute was not blocked (cve-2022-3032).
      Mozilla: an iframe element in an html email could trigger a network request (cve-2022-3034).
      Mozilla: matrix sdk bundled with thunderbird vulnerable to denial-of-service attack (cve-2022-36059).
      Mozilla: bypassing secure context restriction for cookies with __host and __secure prefix (cve-2022-40958).
      Mozilla: content-security-policy base-uri bypass (cve-2022-40956).
      Mozilla: incoherent instruction cache when building wasm on arm64 (cve-2022-40957).
    Affected Products:
      Red Hat enterprise linux for x86_64 - extended update support 8.2 x86_64.
      Red hat enterprise linux server - aus 8.2 x86_64.
      Red hat enterprise linux for power, little endian - extended update support 8.2 ppc64le.
      Red hat enterprise linux server - tus 8.2 x86_64.
      Red hat enterprise linux for arm 64 - extended update support 8.2 aarch64.
      Red hat enterprise linux server for power le - update services for sap solutions 8.2 ppc64le.
      Red hat enterprise linux for x86_64 - update services for sap solutions 8.2 x86_64.
    .

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Red Hat security advisory RHSA-2022:6715 for updates and patch information.
    Patches
    Red Hat Enterprise Linux RHSA-2022:6715
  • CVE-2022-3032+
    QID: 240693
    Recently Published

    Red Hat Update for thunderbird (RHSA-2022:6710)

    Severity
    Critical4
    Qualys ID
    240693
    Date Published
    September 27, 2022
    Vendor Reference
    RHSA-2022:6710
    CVE Reference
    CVE-2022-3032, CVE-2022-3033, CVE-2022-3034, CVE-2022-36059, CVE-2022-40956, CVE-2022-40957, CVE-2022-40958, CVE-2022-40959, CVE-2022-40960, CVE-2022-40962
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Mozilla thunderbird is a standalone mail and newsgroup client...Security Fix(es):
      mozilla: leaking of sensitive information when composing a response to an html email with a meta refresh tag (cve-2022-3033).
      Mozilla: bypassing featurepolicy restrictions on transient pages (cve-2022-40959).
      Mozilla: data-race when parsing non-utf-8 urls in threads (cve-2022-40960).
      Mozilla: memory safety bugs fixed in firefox 105 and firefox esr 102.3 (cve-2022-40962).
      Mozilla: remote content specified in an html document that was nested inside an iframe's srcdoc attribute was not blocked (cve-2022-3032).
      Mozilla: an iframe element in an html email could trigger a network request (cve-2022-3034).
      Mozilla: matrix sdk bundled with thunderbird vulnerable to denial-of-service attack (cve-2022-36059).
      Mozilla: bypassing secure context restriction for cookies with __host and __secure prefix (cve-2022-40958).
      Mozilla: content-security-policy base-uri bypass (cve-2022-40956).
      Mozilla: incoherent instruction cache when building wasm on arm64 (cve-2022-40957).
    Affected Products:
      Red Hat enterprise linux server 7 x86_64.
      Red hat enterprise linux workstation 7 x86_64.
      Red hat enterprise linux desktop 7 x86_64.
      Red hat enterprise linux for power, little endian 7 ppc64le.
    .

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Red Hat security advisory RHSA-2022:6710 for updates and patch information.
    Patches
    Red Hat Enterprise Linux RHSA-2022:6710
  • CVE-2022-40956+
    QID: 240692
    Recently Published

    Red Hat Update for firefox (RHSA-2022:6702)

    Severity
    Critical4
    Qualys ID
    240692
    Date Published
    September 27, 2022
    Vendor Reference
    RHSA-2022:6702
    CVE Reference
    CVE-2022-40956, CVE-2022-40957, CVE-2022-40958, CVE-2022-40959, CVE-2022-40960, CVE-2022-40962
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Mozilla firefox is an open-source web browser, designed for standards compliance, performance, and portability...Security Fix(es):
      mozilla: bypassing featurepolicy restrictions on transient pages (cve-2022-40959).
      Mozilla: data-race when parsing non-utf-8 urls in threads (cve-2022-40960).
      Mozilla: memory safety bugs fixed in firefox 105 and firefox esr 102.3 (cve-2022-40962).
      Mozilla: bypassing secure context restriction for cookies with __host and __secure prefix (cve-2022-40958).
      Mozilla: content-security-policy base-uri bypass (cve-2022-40956).
      Mozilla: incoherent instruction cache when building wasm on arm64 (cve-2022-40957).
    Affected Products:
      Red Hat enterprise linux for x86_64 8 x86_64.
      Red hat enterprise linux for x86_64 - extended update support 8.6 x86_64.
      Red hat enterprise linux server - aus 8.6 x86_64.
      Red hat enterprise linux for ibm z systems 8 s390x.
      Red hat enterprise linux for ibm z systems - extended update support 8.6 s390x.
      Red hat enterprise linux for power, little endian 8 ppc64le.
      Red hat enterprise linux for power, little endian - extended update support 8.6 ppc64le.
      Red hat enterprise linux server - tus 8.6 x86_64.
      Red hat enterprise linux for arm 64 8 aarch64.
      Red hat enterprise linux for arm 64 - extended update support 8.6 aarch64.
      Red hat enterprise linux server for power le - update services for sap solutions 8.6 ppc64le.
      Red hat enterprise linux for x86_64 - update services for sap solutions 8.6 x86_64.
    .

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Red Hat security advisory RHSA-2022:6702 for updates and patch information.
    Patches
    Red Hat Enterprise Linux RHSA-2022:6702
  • CVE-2022-3032+
    QID: 240691
    Recently Published

    Red Hat Update for thunderbird (RHSA-2022:6717)

    Severity
    Critical4
    Qualys ID
    240691
    Date Published
    September 27, 2022
    Vendor Reference
    RHSA-2022:6717
    CVE Reference
    CVE-2022-3032, CVE-2022-3033, CVE-2022-3034, CVE-2022-36059, CVE-2022-40956, CVE-2022-40957, CVE-2022-40958, CVE-2022-40959, CVE-2022-40960, CVE-2022-40962
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Red Hat has released a security update for thunderbird to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Red Hat security advisory RHSA-2022:6717 for updates and patch information.
    Patches
    Red Hat Enterprise Linux RHSA-2022:6717
  • CVE-2022-40956+
    QID: 240690
    Recently Published

    Red Hat Update for firefox (RHSA-2022:6707)

    Severity
    Critical4
    Qualys ID
    240690
    Date Published
    September 27, 2022
    Vendor Reference
    RHSA-2022:6707
    CVE Reference
    CVE-2022-40956, CVE-2022-40957, CVE-2022-40958, CVE-2022-40959, CVE-2022-40960, CVE-2022-40962
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Mozilla firefox is an open-source web browser, designed for standards compliance, performance, and portability...Security Fix(es):
      mozilla: bypassing featurepolicy restrictions on transient pages (cve-2022-40959).
      Mozilla: data-race when parsing non-utf-8 urls in threads (cve-2022-40960).
      Mozilla: memory safety bugs fixed in firefox 105 and firefox esr 102.3 (cve-2022-40962).
      Mozilla: bypassing secure context restriction for cookies with __host and __secure prefix (cve-2022-40958).
      Mozilla: content-security-policy base-uri bypass (cve-2022-40956).
      Mozilla: incoherent instruction cache when building wasm on arm64 (cve-2022-40957).
    Affected Products:
      Red Hat enterprise linux for x86_64 - extended update support 8.2 x86_64.
      Red hat enterprise linux server - aus 8.2 x86_64.
      Red hat enterprise linux for ibm z systems - extended update support 8.2 s390x.
      Red hat enterprise linux for power, little endian - extended update support 8.2 ppc64le.
      Red hat enterprise linux server - tus 8.2 x86_64.
      Red hat enterprise linux for arm 64 - extended update support 8.2 aarch64.
      Red hat enterprise linux server for power le - update services for sap solutions 8.2 ppc64le.
      Red hat enterprise linux for x86_64 - update services for sap solutions 8.2 x86_64.
    .

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Red Hat security advisory RHSA-2022:6707 for updates and patch information.
    Patches
    Red Hat Enterprise Linux RHSA-2022:6707
  • CVE-2022-40956+
    QID: 240689
    Recently Published

    Red Hat Update for firefox (RHSA-2022:6700)

    Severity
    Critical4
    Qualys ID
    240689
    Date Published
    September 27, 2022
    Vendor Reference
    RHSA-2022:6700
    CVE Reference
    CVE-2022-40956, CVE-2022-40957, CVE-2022-40958, CVE-2022-40959, CVE-2022-40960, CVE-2022-40962
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Mozilla firefox is an open-source web browser, designed for standards compliance, performance, and portability...Security Fix(es):
      mozilla: bypassing featurepolicy restrictions on transient pages (cve-2022-40959).
      Mozilla: data-race when parsing non-utf-8 urls in threads (cve-2022-40960).
      Mozilla: memory safety bugs fixed in firefox 105 and firefox esr 102.3 (cve-2022-40962).
      Mozilla: bypassing secure context restriction for cookies with __host and __secure prefix (cve-2022-40958).
      Mozilla: content-security-policy base-uri bypass (cve-2022-40956).
      Mozilla: incoherent instruction cache when building wasm on arm64 (cve-2022-40957).
    Affected Products:
      Red Hat enterprise linux for x86_64 9 x86_64.
      Red hat enterprise linux for x86_64 - extended update support 9.0 x86_64.
      Red hat enterprise linux for ibm z systems 9 s390x.
      Red hat enterprise linux for ibm z systems - extended update support 9.0 s390x.
      Red hat enterprise linux for power, little endian 9 ppc64le.
      Red hat enterprise linux for power, little endian - extended update support 9.0 ppc64le.
      Red hat enterprise linux for arm 64 9 aarch64.
      Red hat enterprise linux for arm 64 - extended update support 9.0 aarch64.
      Red hat enterprise linux server for power le - update services for sap solutions 9.0 ppc64le.
      Red hat enterprise linux for x86_64 - update services for sap solutions 9.0 x86_64.
      Red hat enterprise linux server for arm 64 - 4 years of updates 9.0 aarch64.
      Red hat enterprise linux server for ibm z systems - 4 years of updates 9.0 s390x.
    .

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Red Hat security advisory RHSA-2022:6700 for updates and patch information.
    Patches
    Red Hat Enterprise Linux RHSA-2022:6700
  • CVE-2022-3032+
    QID: 240688
    Recently Published

    Red Hat Update for thunderbird (RHSA-2022:6713)

    Severity
    Critical4
    Qualys ID
    240688
    Date Published
    September 27, 2022
    Vendor Reference
    RHSA-2022:6713
    CVE Reference
    CVE-2022-3032, CVE-2022-3033, CVE-2022-3034, CVE-2022-36059, CVE-2022-40956, CVE-2022-40957, CVE-2022-40958, CVE-2022-40959, CVE-2022-40960, CVE-2022-40962
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Mozilla thunderbird is a standalone mail and newsgroup client...Security Fix(es):
      mozilla: leaking of sensitive information when composing a response to an html email with a meta refresh tag (cve-2022-3033).
      Mozilla: bypassing featurepolicy restrictions on transient pages (cve-2022-40959).
      Mozilla: data-race when parsing non-utf-8 urls in threads (cve-2022-40960).
      Mozilla: memory safety bugs fixed in firefox 105 and firefox esr 102.3 (cve-2022-40962).
      Mozilla: remote content specified in an html document that was nested inside an iframe's srcdoc attribute was not blocked (cve-2022-3032).
      Mozilla: an iframe element in an html email could trigger a network request (cve-2022-3034).
      Mozilla: matrix sdk bundled with thunderbird vulnerable to denial-of-service attack (cve-2022-36059).
      Mozilla: bypassing secure context restriction for cookies with __host and __secure prefix (cve-2022-40958).
      Mozilla: content-security-policy base-uri bypass (cve-2022-40956).
      Mozilla: incoherent instruction cache when building wasm on arm64 (cve-2022-40957).
    Affected Products:
      Red Hat enterprise linux for x86_64 - extended update support 8.4 x86_64.
      Red hat enterprise linux server - aus 8.4 x86_64.
      Red hat enterprise linux for ibm z systems - extended update support 8.4 s390x.
      Red hat enterprise linux for power, little endian - extended update support 8.4 ppc64le.
      Red hat enterprise linux server - tus 8.4 x86_64.
      Red hat enterprise linux for arm 64 - extended update support 8.4 aarch64.
      Red hat enterprise linux server for power le - update services for sap solutions 8.4 ppc64le.
      Red hat enterprise linux for x86_64 - update services for sap solutions 8.4 x86_64.
    .

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Red Hat security advisory RHSA-2022:6713 for updates and patch information.
    Patches
    Red Hat Enterprise Linux RHSA-2022:6713
  • CVE-2022-3032+
    QID: 240687
    Recently Published

    Red Hat Update for thunderbird (RHSA-2022:6708)

    Severity
    Critical4
    Qualys ID
    240687
    Date Published
    September 27, 2022
    Vendor Reference
    RHSA-2022:6708
    CVE Reference
    CVE-2022-3032, CVE-2022-3033, CVE-2022-3034, CVE-2022-36059, CVE-2022-40956, CVE-2022-40957, CVE-2022-40958, CVE-2022-40959, CVE-2022-40960, CVE-2022-40962
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Red Hat has released a security update for thunderbird to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Red Hat security advisory RHSA-2022:6708 for updates and patch information.
    Patches
    Red Hat Enterprise Linux RHSA-2022:6708
  • CVE-2022-41317+
    QID: 198961
    Recently Published

    Ubuntu Security Notification for Squid Vulnerabilities (USN-5641-1)

    Severity
    Critical4
    Qualys ID
    198961
    Date Published
    September 27, 2022
    Vendor Reference
    USN-5641-1
    CVE Reference
    CVE-2022-41317, CVE-2022-41318
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Ubuntu has released a security update for squid to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Ubuntu security advisory USN-5641-1 for updates and patch information.
    Patches
    Ubuntu Linux USN-5641-1
  • CVE-2022-40958+
    QID: 181076
    Recently Published

    Debian Security Update for firefox-esr (DLA 3121-1)

    Severity
    Critical4
    Qualys ID
    181076
    Date Published
    September 27, 2022
    Vendor Reference
    DLA 3121-1
    CVE Reference
    CVE-2022-40958, CVE-2022-40960, CVE-2022-40959, CVE-2022-40962, CVE-2022-40957, CVE-2022-40956
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Debian has released a security update for firefox-esr to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory DLA 3121-1 for updates and patch information.
    Patches
    Debian DLA 3121-1
  • CVE-2018-12983
    QID: 752622
    Recently Published

    SUSE Enterprise Linux Security Update for podofo (SUSE-SU-2022:3385-1)

    Severity
    Critical4
    Qualys ID
    752622
    Date Published
    September 27, 2022
    Vendor Reference
    SUSE-SU-2022:3385-1
    CVE Reference
    CVE-2018-12983
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    SUSE has released a security update for podofo to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise (Desktop|Server) 12 SP5
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3385-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3385-1
  • CVE-2021-23177
    QID: 752619
    Recently Published

    SUSE Enterprise Linux Security Update for libarchive (SUSE-SU-2022:3393-1)

    Severity
    Critical4
    Qualys ID
    752619
    Date Published
    September 27, 2022
    Vendor Reference
    SUSE-SU-2022:3393-1
    CVE Reference
    CVE-2021-23177
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    SUSE has released a security update for libarchive to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server Basesystem 15 SP3
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3393-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3393-1
  • CVE-2021-3410
    QID: 752614
    Recently Published

    SUSE Enterprise Linux Security Update for libcaca (SUSE-SU-2022:3400-1)

    Severity
    Critical4
    Qualys ID
    752614
    Date Published
    September 27, 2022
    Vendor Reference
    SUSE-SU-2022:3400-1
    CVE Reference
    CVE-2021-3410
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    SUSE has released a security update for libcaca to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server Basesystem 15 SP4
    SUSE Linux Enterprise Server Basesystem 15 SP3
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3400-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3400-1
  • CVE-2022-2318+
    QID: 198960
    Recently Published

    Ubuntu Security Notification for Linux kernel (Oracle) Vulnerabilities (USN-5640-1)

    Severity
    Critical4
    Qualys ID
    198960
    Date Published
    September 27, 2022
    Vendor Reference
    USN-5640-1
    CVE Reference
    CVE-2022-2318, CVE-2022-33744, CVE-2022-33741, CVE-2022-34494, CVE-2021-33655, CVE-2022-36946, CVE-2022-33742, CVE-2022-33743, CVE-2022-34495, CVE-2022-33740, CVE-2022-26365
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    Ubuntu has released a security update for linux to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Ubuntu security advisory USN-5640-1 for updates and patch information.
    Patches
    Ubuntu Linux USN-5640-1
  • CVE-2020-35498
    QID: 752618
    Recently Published

    SUSE Enterprise Linux Security Update for openvswitch (SUSE-SU-2022:3384-1)

    Severity
    Critical4
    Qualys ID
    752618
    Date Published
    September 27, 2022
    Vendor Reference
    SUSE-SU-2022:3384-1
    CVE Reference
    CVE-2020-35498
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    SUSE has released a security update for openvswitch to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server 12 SP5
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3384-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3384-1
  • CVE-2022-35737+
    QID: 752612
    Recently Published

    SUSE Enterprise Linux Security Update for sqlite3 (SUSE-SU-2022:3401-1)

    Severity
    Critical4
    Qualys ID
    752612
    Date Published
    September 27, 2022
    Vendor Reference
    SUSE-SU-2022:3401-1
    CVE Reference
    CVE-2022-35737, CVE-2021-36690
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    SUSE has released a security update for sqlite3 to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server 12 SP5
    SUSE Linux Enterprise (Desktop|Server) 12 SP5
    SUSE Linux Enterprise Server for SAP Applications 12 SP4
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3401-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3401-1
  • CVE-2021-3618
    QID: 752623
    Recently Published

    SUSE Enterprise Linux Security Update for vsftpd (SUSE-SU-2022:3383-1)

    Severity
    Critical4
    Qualys ID
    752623
    Date Published
    September 27, 2022
    Vendor Reference
    SUSE-SU-2022:3383-1
    CVE Reference
    CVE-2021-3618
    CVSS Scores
    Base 7.4 / Temporal 6.4
    Description
    SUSE has released a security update for vsftpd to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server 12 SP5
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3383-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3383-1
  • CVE-2022-0529+
    QID: 752621
    Recently Published

    SUSE Enterprise Linux Security Update for unzip (SUSE-SU-2022:3399-1)

    Severity
    Serious3
    Qualys ID
    752621
    Date Published
    September 27, 2022
    Vendor Reference
    SUSE-SU-2022:3399-1
    CVE Reference
    CVE-2022-0529, CVE-2022-0530
    CVSS Scores
    Base 5.5 / Temporal 4.8
    Description
    SUSE has released a security update for unzip to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server Basesystem 15 SP4
    SUSE Linux Enterprise Server Basesystem 15 SP3
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3399-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3399-1
  • CVE-2022-0529+
    QID: 752613
    Recently Published

    SUSE Enterprise Linux Security Update for unzip (SUSE-SU-2022:3386-1)

    Severity
    Serious3
    Qualys ID
    752613
    Date Published
    September 27, 2022
    Vendor Reference
    SUSE-SU-2022:3386-1
    CVE Reference
    CVE-2022-0529, CVE-2022-0530
    CVSS Scores
    Base 5.5 / Temporal 4.8
    Description
    SUSE has released a security update for unzip to fix the vulnerabilities.

    Affected product(s):
    SUSE Linux Enterprise Server 12 SP5
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to SUSE security advisory SUSE-SU-2022:3386-1 for updates and patch information.
    Patches
    SUSE Enterprise Linux SUSE-SU-2022:3386-1
  • CVE-2022-35405
    QID: 377607
    Recently Published

    Zoho ManageEngine PAM360, Password Manager Pro, and Access Manager Plus Remote Code Execution (RCE) Vulnerability

    Severity
    Urgent5
    Qualys ID
    377607
    Date Published
    September 26, 2022
    Vendor Reference
    ManageEngine
    CVE Reference
    CVE-2022-35405
    CVSS Scores
    Base 9.8 / Temporal 8.8
    Description
    ManageEngine offers enterprise IT management software for your service management, operations management, Active Directory and security needs.

    Zoho ManageEngine Password Manager Pro before 12101 and PAM360 before 5510 are vulnerable to unauthenticated remote code execution. (This also affects ManageEngine Access Manager Plus before 4303 with authentication.)

    Affected Versions:
    Access Manager Plus Prior to build 4302

    Password Manager Pro Prior to build 12100

    PAM360 Prior to build 5500

    QID Detection Logic:
    . Authenticated : This QID checks for file modified date to check if latest build is installed

    Consequence
    This remote code execution vulnerability could allow remote attackers to execute arbitrary code on affected installations of Password Manager Pro, PAM360 and Access Manager Plus
    Solution
    This remote code execution vulnerability could allow remote attackers to execute arbitrary code on affected installations of Password Manager Pro, PAM360 and Access Manager Plus
    Patches
    cve-2022-35405
  • CVE-2021-26109
    QID: 43915
    Under Investigation

    FortiOS Integer Overflow Vulnerability in Secure Sockets Layer (SSL) Virtual Private Network (VPN) (SSLVPN) Allocator (FG-IR-21-049)

    Severity
    Critical4
    Qualys ID
    43915
    Vendor Reference
    FG-IR-21-049
    CVE Reference
    CVE-2021-26109
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    An integer overflow or wraparound vulnerability [CWE-190] in FortiOS SSLVPN memory allocator may allow an unauthenticated attacker to corrupt control data on the heap via specifically crafted requests to SSLVPN, resulting in potentially arbitrary code execution.

    Affected Products:
    Only when SSLVPN is enabled:
    FortiOS version 7.0.0 and below
    FortiOS version 6.4.5 and below
    FortiOS version 6.2.9 and below
    FortiOS version 6.0.12 and below

    QID Detection Logic (Authenticated):
    Detection checks for vulnerable version of FortiOS.

    Consequence
    Vulnerable version of FortiOS may allow an unauthenticated attacker to corrupt control data on the heap via specifically crafted requests to SSLVPN, resulting in potentially arbitrary code execution.
    Solution

    Vendor has released fixes to address this vulnerability
    For more details refer advisory FG-IR-21-049

    Patches
    FG-IR-21-049
  • CVE-2017-14176
    QID: 904046
    Recently Published

    Common Base Linux Mariner (CBL-Mariner) Security Update for bzr (1891)

    Severity
    Critical4
    Qualys ID
    904046
    Date Published
    September 27, 2022
    Vendor Reference
    1891
    CVE Reference
    CVE-2017-14176
    CVSS Scores
    Base 8.8 / Temporal 8.1
    Description
    CBL-Mariner is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has NOT released a security update for bzr to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    Patch is NOT available for the package.

  • CVE-1999-0612
    QID: 904047
    Recently Published

    Common Base Linux Mariner (CBL-Mariner) Security Update for finger (6422-1)

    Severity
    Critical4
    Qualys ID
    904047
    Date Published
    September 27, 2022
    Vendor Reference
    Mariner_2.0_6422-1
    CVE Reference
    CVE-1999-0612
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    CBL-Mariner 2.0 is an internal Linux distribution for cloud infrastructure and edge products and services of Microsoft.
    CBL-Mariner has released a security update for finger to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution

    CBL-Mariner has issued updated packages to fix this vulnerability. For more information about the vulnerability and obtaining patches, refer to the following CBL-Mariner 2.0 security advisories:https://github.com/microsoft/CBL-Mariner/tree/2.0

    Patches
    CBL-Mariner Linux 2\\.0 6422-1
  • CVE-2022-41317
    QID: 690944
    Recently Published

    Free Berkeley Software Distribution (FreeBSD) Security Update for squid (f9ada0b5-3d80-11ed-9330-080027f5fec9)

    Severity
    Critical4
    Qualys ID
    690944
    Date Published
    September 27, 2022
    Vendor Reference
    f9ada0b5-3d80-11ed-9330-080027f5fec9
    CVE Reference
    CVE-2022-41317
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    FreeBSD has released a security update for squid to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to FreeBSD security advisory f9ada0b5-3d80-11ed-9330-080027f5fec9 for updates and patch information.
    Patches
    "FreeBSD" f9ada0b5-3d80-11ed-9330-080027f5fec9
  • CVE-2022-2793+
    QID: 591059
    Recently Published

    Emerson Proficy Machine Edition Multiple Vulnerabilities (ICSA-22-228-06)

    Severity
    Critical4
    Qualys ID
    591059
    Date Published
    September 27, 2022
    Vendor Reference
    icsa-22-228-06
    CVE Reference
    CVE-2022-2793, CVE-2022-2792, CVE-2022-2791, CVE-2022-2790, CVE-2022-2789, CVE-2022-2788
    CVSS Scores
    Base 7.8 / Temporal 6.9
    Description

    AFFECTED PRODUCTS
    The following versions of Proficy Machine Edition, an engineering workstation that is part of the PACSystems control system software platform, are affected: Proficy Machine Edition Version 9.80 and prior

    QID Detection Logic (Authenticated)
    QID checks for the Vulnerable version using windows registry keys

    Consequence
    Successful exploitation of these vulnerabilities could allow for remote hidden code execution on the connected programmable logic controller (PLC) and for malicious files to be uploaded from the PLC to connected workstations.
    Solution

    Customers are advised to refer to Schneider Electric MITIGATIONS section icsa-22-228-06 for affected packages and patching details.

  • CVE-2018-25047+
    QID: 710622
    Recently Published

    Gentoo Linux Smarty Multiple Vulnerabilities (GLSA 202209-09)

    Severity
    Critical4
    Qualys ID
    710622
    Date Published
    September 26, 2022
    Vendor Reference
    GLSA 202209-09
    CVE Reference
    CVE-2018-25047, CVE-2021-29454, CVE-2022-29221, CVE-2021-21408
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description
    Gentoo has released a security update for smarty to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Gentoo security advisory GLSA 202209-09 for updates and patch information.
    Patches
    Gentoo GLSA 202209-09
  • CVE-2022-36041+
    QID: 710620
    Recently Published

    Gentoo Linux Rizin Multiple Vulnerabilities (GLSA 202209-06)

    Severity
    Critical4
    Qualys ID
    710620
    Date Published
    September 26, 2022
    Vendor Reference
    GLSA 202209-06
    CVE Reference
    CVE-2022-36041, CVE-2022-36039, CVE-2022-36042, CVE-2022-36044, CVE-2022-34612, CVE-2022-36043, CVE-2022-36040
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    Gentoo has released a security update for rizin to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Gentoo security advisory GLSA 202209-06 for updates and patch information.
    Patches
    Gentoo GLSA 202209-06
  • CVE-2022-38784+
    QID: 181075
    Recently Published

    Debian Security Update for poppler (DLA 3120-1)

    Severity
    Critical4
    Qualys ID
    181075
    Date Published
    September 26, 2022
    Vendor Reference
    DLA 3120-1
    CVE Reference
    CVE-2022-38784, CVE-2019-9903, CVE-2020-27778, CVE-2022-27337, CVE-2018-19058, CVE-2018-18897, CVE-2019-9959, CVE-2019-14494, CVE-2018-20650
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    Debian has released a security update for poppler to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Debian security advisory DLA 3120-1 for updates and patch information.
    Patches
    Debian DLA 3120-1
  • CVE-2021-39272+
    QID: 710623
    Recently Published

    Gentoo Linux Fetchmail Multiple Vulnerabilities (GLSA 202209-14)

    Severity
    Critical4
    Qualys ID
    710623
    Date Published
    September 26, 2022
    Vendor Reference
    GLSA 202209-14
    CVE Reference
    CVE-2021-39272, CVE-2021-36386
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    Gentoo has released a security update for fetchmail to fix the vulnerabilities.
    Consequence
    Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.
    Solution
    Refer to Gentoo security advisory GLSA 202209-14 for updates and patch information.
    Patches
    Gentoo GLSA 202209-14
  • CVE-2021-33057
    QID: 630825
    In Development

    QQ application For Android Missing Authorization Vulnerability

    Severity
    Critical4
    Qualys ID
    630825
    Vendor Reference
    CVE-2021-33057
    CVE Reference
    CVE-2021-33057
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    The QQ application 8.7.1 for Android and iOS does not enforce the permission requirements (e.g., android.permission.ACCESS_FINE_LOCATION) for determining the device's physical location. An attacker can use qq.createMapContext to create a MapContext object, use MapContext.moveToLocation to move the center of the map to the device's location, and use MapContext.getCenterLocation to get the latitude and longitude of the current map center.
    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to CVE-2021-33057 to address this issue and obtain more information.
    Patches
    Android CVE-2021-33057
  • CVE-2021-36173
    QID: 43912
    Under Investigation

    FortiOS Heap-based Buffer Overflow Vulnerability (FG-IR-21-115)

    Severity
    Serious3
    Qualys ID
    43912
    Vendor Reference
    FG-IR-21-115
    CVE Reference
    CVE-2021-36173
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description
    A heap-based buffer overflow [CWE-122] in the firmware signature verification function of FortiOS may allow an attacker to execute arbitrary code via specially crafted installation images.

    Affected Products:
    FortiGate E-series and F-series models released in 2019 and later (specifically: 40F, 60F, 200F, 400E, 600E, 1100E, 1800F, 2200E, 2600F, 3300E, 3400E, 3500F, 3600E and 7121F) that are running the following versions of FortiOS:
    FortiOS version 7.0.1 and below
    FortiOS version 6.4.6 and below
    FortiOS version 6.2.9 and below
    FortiOS version 6.0.13 and below
    FortiOS-6K7K version 6.4.2 and below
    FortiOS-6K7K version 6.2.7 and below
    FortiOS-6K7K version 6.0.10 and below

    QID Detection Logic (Authenticated):
    Detection checks for vulnerable version of FortiOS.

    Consequence
    Vulnerable version of FortiOS may allow an attacker to execute arbitrary code via specially crafted installation images.
    Solution

    Vendor has released fixes to address this vulnerability
    For more details refer advisory FG-IR-21-115

    Patches
    FG-IR-21-115
  • CVE-2022-22299
    QID: 43906
    Under Investigation

    FortiOS Format String Vulnerability in Command Line Interpreter (FG-IR-21-235)

    Severity
    Serious3
    Qualys ID
    43906
    Vendor Reference
    FG-IR-21-235
    CVE Reference
    CVE-2022-22299
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    A format string vulnerability [CWE-134] in the command line interpreter of FortiOS may allow an authenticated user to execute unauthorized code or commands via specially crafted command arguments.

    Affected Products:
    FortiOS version 6.0.0 through 6.0.14
    FortiOS version 6.2.0 through 6.2.10
    FortiOS version 6.4.0 through 6.4.8
    FortiOS version 7.0.0 through 7.0.2

    QID Detection Logic (Authenticated):
    Detection checks for vulnerable version of FortiOS.

    Consequence
    Vulnerable FortiOS may allow an authenticated user to execute unauthorized code or commands via specially crafted command arguments.
    Solution

    Vendor has released fixes to address this vulnerability
    For more details refer advisory FG-IR-21-235

    Patches
    FG-IR-21-235
  • CVE-2022-22299
    QID: 377609
    Under Investigation

    FortiMail - Format String Vulnerability in Command Line Interpreter (FG-IR-21-235)

    Severity
    Serious3
    Qualys ID
    377609
    Vendor Reference
    FG-IR-21-235
    CVE Reference
    CVE-2022-22299
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    A format string vulnerability [CWE-134] in the command line interpreter of FortiMail may allow an authenticated user to execute unauthorized code or commands via specially crafted command arguments.

    Affected Products:

    QID Detection Logic (Authenticated):
    Detection checks for vulnerable version of FortiOS.

    Consequence
    Vulnerable FortiOS may allow an authenticated user to execute unauthorized code or commands via specially crafted command arguments.
    Solution

    Vendor has released fixes to address this vulnerability
    For more details refer advisory FG-IR-21-235

    Patches
    FG-IR-21-235
  • CVE-2021-26108
    QID: 43914
    Under Investigation

    FortiOS Hard-Coded Cryptographic Key Vulnerability (FG-IR-21-051)

    Severity
    Serious3
    Qualys ID
    43914
    Vendor Reference
    FG-IR-21-051
    CVE Reference
    CVE-2021-26108
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    A use of hard-coded cryptographic key vulnerability [CWE 321] in FortiOS SSLVPN may allow an attacker to retrieve the key by reverse engineering.

    Affected Products:
    Only when SSLVPN is enabled: FortiOS 6.4.5 and below
    FortiOS 6.2.8 and below
    FortiOS 6.0.12 and below
    FortiOS 5.6.13 and below
    FortiOS-6K7K version 6.4.2
    FortiOS-6K7K version 6.2.6 and below

    QID Detection Logic (Authenticated):
    Detection checks for vulnerable version of FortiOS.

    Consequence
    Vulnerable version of FortiOS may allow an attacker to retrieve the key by reverse engineering when SSLVPN is enabled.
    Solution

    Vendor has released fixes to address this vulnerability
    For more details refer advisory FG-IR-21-051

    Patches
    FG-IR-21-051
  • CVE-2021-41024
    QID: 43909
    Under Investigation

    FortiOS Path Traversal Vulnerability (FG-IR-21-181)

    Severity
    Serious3
    Qualys ID
    43909
    Vendor Reference
    FG-IR-21-181
    CVE Reference
    CVE-2021-41024
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    A relative path traversal [CWE-23] vulnerability in FortiOS may allow an unauthenticated, unauthorized attacker to inject path traversal character sequences to disclose sensitive information of the server via the GET request of the login page.

    Affected Products:
    FortiOS version7.0.1 and 7.0.0

    QID Detection Logic (Authenticated):
    Detection checks for vulnerable version of FortiOS.

    Consequence
    Vulnerable FortiOS may allow an unauthenticated, unauthorized attacker to inject path traversal character sequences to disclose sensitive information of the server via the GET request of the login page.

    Solution

    Vendor has released fixes to address this vulnerability
    For more details refer advisory FG-IR-21-181

    Patches
    FG-IR-21-181
  • CVE-2021-44170
    QID: 43910
    Under Investigation

    FortiOS Stack-Based Buffer Overflow Vulnerability (FG-IR-21-179)

    Severity
    Serious3
    Qualys ID
    43910
    Vendor Reference
    FG-IR-21-179
    CVE Reference
    CVE-2021-44170
    CVSS Scores
    Base 6.7 / Temporal 5.8
    Description
    A stack-based buffer overflow vulnerability [CWE-121] in the command line interpreter of FortiOS and FortiProxy may allow an authenticated attacker to execute unauthorized code or commands via specially crafted command line arguments.

    Affected Products:
    FortiOS version 6.0.0 through 6.0.14
    FortiOS version 6.2.0 through 6.2.10
    FortiOS version 6.4.0 through 6.4.8
    FortiOS version 7.0.0 through 7.0.2

    QID Detection Logic (Authenticated):
    Detection checks for vulnerable version of FortiOS.

    Consequence
    Vulnerable FortiOS may allow an authenticated attacker to execute unauthorized code or commands via specially crafted command line arguments.
    Solution

    Vendor has released fixes to address this vulnerability
    For more details refer advisory FG-IR-21-179

    Patches
    FG-IR-21-179
  • CVE-2022-28755
    QID: 630822
    In Development

    For ios Vulnerability CVE-2022-28755

    Severity
    Serious3
    Qualys ID
    630822
    Vendor Reference
    CVE-2022-28755
    CVE Reference
    CVE-2022-28755
    CVSS Scores
    Base 6.1 / Temporal 5.3
    Description
    The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.11.0 are susceptible to a URL parsing vulnerability. If a malicious Zoom meeting URL is opened, the malicious link may direct the user to connect to an arbitrary network address, leading to additional attacks including the potential for remote code execution through launching executables from arbitrary paths.
    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to CVE-2022-28755 to address this issue and obtain more information.
    Patches
    iOS CVE-2022-28755
  • CVE-2022-23438
    QID: 43913
    Under Investigation

    FortiOS Cross-Site Scripting (XSS) Vulnerability (FG-IR-21-057)

    Severity
    Serious3
    Qualys ID
    43913
    Vendor Reference
    FG-IR-21-057
    CVE Reference
    CVE-2022-23438
    CVSS Scores
    Base 6.1 / Temporal 5.3
    Description
    An improper neutralization of input during web page generation ('Cross-site Scripting') [CWE-79] vulnerability in FortiOS may allow an unauthenticated remote attacker to perform a reflected cross site scripting (XSS) attack in the captive portal authentication replacement page.

    Affected Products:
    FortiOS version 7.0.0 through 7.0.5
    FortiOS version 6.4.0 through 6.4.9

    QID Detection Logic (Authenticated):
    Detection checks for vulnerable version of FortiOS.

    Consequence
    Vulnerable version of FortiOS may allow an unauthenticated remote attacker to perform a reflected cross site scripting (XSS) attack in the captive portal authentication replacement page.
    Solution

    Vendor has released fixes to address this vulnerability
    For more details refer advisory FG-IR-21-057

    Patches
    FG-IR-21-057
  • CVE-2021-43081
    QID: 43908
    Under Investigation

    FortiOS Cross-Site Scripting (XSS) Vulnerability in Web Filter Block Override Form (FG-IR-21-230)

    Severity
    Serious3
    Qualys ID
    43908
    Vendor Reference
    FG-IR-21-230
    CVE Reference
    CVE-2021-43081
    CVSS Scores
    Base 6.1 / Temporal 5.3
    Description
    An improper neutralization of input during web page generation vulnerability [CWE-79] in FortiProxy and FortiOS web filter override form may allow an unauthenticated attacker to perform an XSS attack via crafted HTTP GET requests.

    Affected Products:
    FortiOS version 7.0.3 and below
    FortiOS version 6.4.8 and below
    FortiOS version 6.2.10 and below
    FortiOS version 6.0.14 to 6.0.0

    QID Detection Logic (Authenticated):
    Detection checks for vulnerable version of FortiOS.

    Consequence
    Vulnerable FortiOS may allow an unauthenticated attacker to perform an XSS attack via crafted HTTP GET requests.
    Solution

    Vendor has released fixes to address this vulnerability
    For more details refer advisory FG-IR-21-230

    Patches
    FG-IR-21-230
  • CVE-2021-41032
    QID: 43911
    Under Investigation

    FortiOS Improper Inter-Virtual domains (VDOM) Access Control Vulnerability (FG-IR-21-147)

    Severity
    Serious3
    Qualys ID
    43911
    Vendor Reference
    FG-IR-21-147
    CVE Reference
    CVE-2021-41032
    CVSS Scores
    Base 5.4 / Temporal 4.7
    Description
    An improper access control vulnerability [CWE-284] in FortiOS may allow an authenticated attacker with a restricted user profile to gather sensitive information and modify the SSL-VPN tunnel status of other VDOMs using specific CLI commands.

    Affected Products:
    FortiOS version 6.2.0 through 6.2.10

    QID Detection Logic (Authenticated):
    Detection checks for vulnerable version of FortiOS.

    Consequence
    Vulnerable version of FortiOS may allow an authenticated attacker with a restricted user profile to gather sensitive information and modify the SSL-VPN tunnel status of other VDOMs using specific CLI commands.
    Solution

    Vendor has released fixes to address this vulnerability
    For more details refer advisory FG-IR-21-147

    Patches
    FG-IR-21-147
  • CVE-2022-1495
    QID: 630829
    Recently Published

    Google Chrome For Android Authentication Bypass Vulnerability

    Severity
    Serious3
    Qualys ID
    630829
    Date Published
    September 29, 2022
    Vendor Reference
    CVE-2022-1495
    CVE Reference
    CVE-2022-1495
    CVSS Scores
    Base 4.3 / Temporal 3.8
    Description
    Incorrect security UI in Downloads in Google Chrome on Android prior to 101.0.4951.41 allowed a remote attacker to spoof the APK downloads dialog via a crafted HTML page.
    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to CVE-2022-1495 to address this issue and obtain more information.
    Patches
    Android CVE-2022-1495
  • CVE-2022-2479
    QID: 630828
    Recently Published

    Google Chrome For Android Exposure of Resource Vulnerability

    Severity
    Medium2
    Qualys ID
    630828
    Date Published
    September 29, 2022
    Vendor Reference
    CVE-2022-2479
    CVE Reference
    CVE-2022-2479
    CVSS Scores
    Base 4.3 / Temporal 3.8
    Description
    Insufficient validation of untrusted input in File in Google Chrome on Android prior to 103.0.5060.134 allowed an attacker who convinced a user to install a malicious app to obtain potentially sensitive information from internal file directories via a crafted HTML page.
    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to CVE-2022-2479 to address this issue and obtain more information.
    Patches
    Android CVE-2022-2479
  • CVE-2022-2048
    QID: 730615
    Recently Published

    Jenkins Denial of Service (DoS) Vulnerability (Jenkins Security Advisory 2022-09-09)

    Severity
    Critical4
    Qualys ID
    730615
    Date Published
    September 29, 2022
    Vendor Reference
    Jenkins Security Advisory 2022-09-09
    CVE Reference
    CVE-2022-2048
    CVSS Scores
    Base 7.5 / Temporal 6.5
    <