Vulnerability Detection Pipeline

Upcoming and New QIDs

Browse, filter by detection status, or search by CVE to get visibility into upcoming and new detections (QIDs) for all severities.

Detection Status

  • Under investigation: We are researching a detection and will publish one if it is feasible.
  • In development: We are coding a detection and will typically publish it within a few days.
  • Recently published: We have published the detection on the date indicated, and it will typically be available in the KnowledgeBase on shared platforms within a day.

Non-Qualys customers can audit their network for all published vulnerabilities by signing up for a Qualys Free Trial or Qualys Community Edition.

85 results
CVE
Title
Severity
  • CVE-2021-2218+
    Recently Published

    Oracle PeopleSoft Enterprise PeopleTools Product Multiple Vulnerabilities (CPUAPR2021)

    Severity
    Critical4
    Qualys ID
    375482
    Date Published
    April 21, 2021
    Vendor Reference
    Peoplesoft Enterprise PeopleTools CPUAPR2021
    CVE Reference
    CVE-2021-2218, CVE-2020-28052, CVE-2020-8286, CVE-2017-18640, CVE-2021-2219, CVE-2019-10086, CVE-2017-1000061, CVE-2021-2151, CVE-2021-2216, CVE-2020-27193, CVE-2020-11022, CVE-2020-1971
    CVSS Scores
    Base 8.1 / Temporal 7.1
    Description
    Oracle's PeopleSoft applications are designed to address the most complex business requirements. PeopleSoft PeopleTools provides a comprehensive development toolset that supports the development and runtime of PeopleSoft applications.

    Affected Versions:
    Oracle PeopleSoft Enterprise PeopleTools 8.56
    Oracle PeopleSoft Enterprise PeopleTools 8.57
    Oracle PeopleSoft Enterprise PeopleTools 8.58

    QID Detection Logic (Authenticated):
    The authenticated check looks for the installed version of PeopleTools and it's corresponding patch.

    Consequence
    Successful exploitation of this vulnerability allows unauthorized disclosure of information, unauthorized modification and disruption of service.
    Solution
    Newer versions are available to download. For more information about this product or to check for new releases, go to the Oracle PeopleSoft Products.
    Patches
    cpuapr2021
  • CVE-2021-2277+
    Recently Published

    Oracle Coherence April 2021 Critical Patch Update

    Severity
    Critical4
    Qualys ID
    375483
    Date Published
    April 21, 2021
    Vendor Reference
    CPUAPR2021
    CVE Reference
    CVE-2021-2277, CVE-2020-25649
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    Oracle Coherence is an in-memory data grid solution that enables organizations to predictably scale mission-critical applications by providing fast access to frequently used data.

    Oracle Coherence is affected by CVE-2021-2277,CVE-2020-25649.

    Affected Versions:
    Oracle Coherence, version(s) 3.7, 12.1.3.0, 12.2.1.3, 12.2.1.4 and 14.1.1.0

    QID Detection Logic (Authenticated):
    Operating System: Linux
    This QID checks to see if Oracle Coherence process is listening on any of the TCP port. The version is checked via product.xml under the install location of coherence. The patches for 12.x are checked under "Install Location"/invetory/patches.

    QID Detection Logic (Authenticated):
    Operating System: Windows
    The QID checks the "Oracle_Home" path with help of the registry key "HKLM\Software\Oracle". The QID verifies if the affected Oracle Coherence version is installed on the host and then checks if the corresponding patch is applied or not.

    Patch IDs checked:
    Coherence 3.7.1.0, Patch 32581736
    Coherence 12.1.3.0.0 Patch 32581818
    Coherence 12.2.1.3.0 Patch 32581838
    Coherence 12.2.1.4.0 Patch 32581859
    Coherence 14.1.1.0.0 Patch 32581868

    Consequence
    Successful exploitation could allow an attacker to execute arbitrary code on the target system.
    Solution
    The vendor has released patches for these issues. Customers are advised to refer to Oracle CPUAPR2021 for detailed information.

    Patches
    CPUAPR2021
  • CVE-2020-5360+
    In Development

    Oracle HTTP Server Multiple Vulnerabilities(CPUAPR2021)

    Severity
    Critical4
    Qualys ID
    375480
    Vendor Reference
    cpuapr2021
    CVE Reference
    CVE-2020-5360, CVE-2021-2315
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description

    Oracle HTTP Server is the Web server component for Oracle Fusion Middleware. It provides a listener for Oracle WebLogic Server and the framework for hosting static pages, dynamic pages, and applications over the Web.

    Affected Versions:
    Oracle HTTP Server, versions 11.1.1.9.0, 12.2.1.3.0, 12.2.1.4.0

    QID Detection Logic (Authenticated):
    This QID checks the vulnerable version of Oracle HTTP Server from file "inventory.xml" from the Home Directory.

    Consequence
    Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle HTTP Server accessible data.
    Solution
    Refer to vendor advisory Oracle HTTP Server APR 2021
    Patches
    CPUAPR2021
  • CVE-2021-23994+
    Under Investigation

    Mozilla Firefox ESR Multiple Vulnerabilities (MFSA2021-15)

    Severity
    Critical4
    Qualys ID
    375479
    Vendor Reference
    MFSA2021-15
    CVE Reference
    CVE-2021-23994, CVE-2021-23995, CVE-2021-23998, CVE-2021-23961, CVE-2021-23999, CVE-2021-24002, CVE-2021-29945, CVE-2021-29946
    CVSS Scores
    Base 7.4 / Temporal 6.4
    Description
    Firefox is a free and open-source web browser developed for Windows, OS X, and Linux, with a mobile version for Android.

    Affected Products:
    Prior to Firefox ESR 78.10

    QID Detection Logic (Authenticated) :
    This checks for vulnerable version of Firefox browser.

    Consequence
    On successful exploitation it could allow an attacker to execute code.

    Solution
    Vendor has released fix to address these vulnerabilities. Refer to MFSA2021-15
    Patches
    MFSA2021-15
  • CVE-2021-2294+
    Recently Published

    Oracle WebLogic Server Multiple Vulnerabilities (CPUAPR2021) (WebLogic Server Unix Authentication Record)

    Severity
    Critical4
    Qualys ID
    375484
    Date Published
    April 21, 2021
    Vendor Reference
    CPUAPR2021
    CVE Reference
    CVE-2021-2294, CVE-2019-3740, CVE-2021-2211, CVE-2021-2135, CVE-2021-2204, CVE-2021-2136, CVE-2021-2214, CVE-2021-2157, CVE-2021-2142, CVE-2019-10086
    CVSS Scores
    Base 7.3 / Temporal 6.4
    Description
    Oracle WebLogic Server (formerly known as BEA WebLogic Server) is an application server for building and deploying enterprise applications and services.
    The Oracle WebLogic Server component in Oracle Fusion Middleware for versions 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0 has fixes for multiple vulnerabilities.

    Affected Versions:
    Oracle WebLogic Server, version(s) 12.2.1.3,12.2.1.4

    QID Detection Logic (Authenticated):
    Operating System: Linux
    Detection reads the WebLogic Server Location from WebLogic server record.
    For version 12.x the QID navigates to that directory and reads "registry.xml" and the patch files found in the directory "Oracle_Home"\inventory\patches to check if the installed version is patched.

    Patch IDs checked:
    WebLogic Server 12.2.1.4 - Patch 32698246
    WebLogic Server 12.2.1.3 - Patch 32697734

    NOTE: For Oracle WebLogic Server 14.x we don't have support so we are looking only for Web logic 12.x vulnerable version for this Detection.

    Consequence
    Successful exploitation could allow an attacker to affect the confidentiality, integrity and availability of data on the target system.

    Solution
    The vendor has released patches for these issues. Customers are advised to refer to Oracle CPUAPR2021 for detailed information.

    Patches
    CPUAPR2021
  • CVE-2021-23994+
    Under Investigation

    Mozilla Firefox Multiple Vulnerabilities (MFSA2021-16)

    Severity
    Critical4
    Qualys ID
    375478
    Vendor Reference
    MFSA2021-16
    CVE Reference
    CVE-2021-23994, CVE-2021-23995, CVE-2021-23996, CVE-2021-23997, CVE-2021-23998, CVE-2021-23999, CVE-2021-24000, CVE-2021-24001, CVE-2021-24002, CVE-2021-29945, CVE-2021-29944, CVE-2021-29946, CVE-2021-29947
    CVSS Scores
    Base 0 / Temporal 0
    Description
    Firefox is a free and open-source web browser developed for Windows, OS X, and Linux, with a mobile version for Android.

    Affected Products:
    Prior to Firefox 88

    QID Detection Logic (Authenticated) :
    This checks for vulnerable version of Firefox browser.

    Consequence
    On successful exploitation it could allow to compromise integrity, availability and confidentiality.

    Solution
    Vendor has released fix to address these vulnerabilities. Refer to MFSA 2021-16
    Patches
    MFSA2021-16
  • CVE-2021-25296
    Recently Published

    Nagios XI Remote command injection vulnerability

    Severity
    Urgent5
    Qualys ID
    375476
    Date Published
    April 21, 2021
    Vendor Reference
    Nagios XI
    CVE Reference
    CVE-2021-25296
    CVSS Scores
    Base 8.8 / Temporal 7.9
    Description
    Nagios Core is a free and open source computer-software application that monitors systems, networks and infrastructure. Nagios offers monitoring and alerting services for servers, switches, applications and services.

    Nagios XI version xi-5.7.5 is affected by OS command injection. The vulnerability exists in the file /usr/local/nagiosxi/html/includes configwizards/windowswmi/windowswmi.inc.php due to improper sanitization of authenticated user-controlled input by a single HTTP request, which can lead to OS command injection on the Nagios XI server.

    Affected versions:
    Version: 5.7.5

    QID Detection Logic:(Authenticated)
    It to check for vulnerable version of Nagios Core from version file.

    Consequence
    Successful exploitation of this vulnerability may allow an authenticated user to execute arbitrary OS commands. The attack in the wild targeting Nagios XI 5.7.5 exploits CVE-2021-25296 and drops a cryptocurrency miner, threatening the security of the systems that have out-of-date Nagios XI software deployed.
    Solution
    The vendor has not released any patch for more information visit here
    Patches
    nagiosxi
  • CVE-2020-5360+
    Recently Published

    Oracle Database 12.1.0.2 Critical Patch Update - April 2021 (Unauthenticated)

    Severity
    Urgent5
    Qualys ID
    20220
    Date Published
    April 21, 2021
    Vendor Reference
    CPUAPR2021
    CVE Reference
    CVE-2020-5360, CVE-2019-3740, CVE-2020-11023, CVE-2021-2234, CVE-2020-7760, CVE-2021-2173, CVE-2021-2175, CVE-2021-2207
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    Oracle Database quarterly patches are proactive cumulative patches containing recommended bug fixes that are released on a regular schedule.

    Affected Software:
    Oracle Database 12.1.0.2

    QID Detection Logic (Unauthenticated):
    This QID connects the remote server's Oracle listener and reviews the Oracle banner version.

    Consequence
    Successful exploitation could allow an attacker to compromise the database.

    Solution
    Customers are requested to refer to CPUAPR2021 to obtain details about how to deploy the update.

    Patches
    CPUAPR2021
  • CVE-2020-5360+
    Recently Published

    Oracle Database 12.1.0.2 Critical Patch Update - April 2021

    Severity
    Urgent5
    Qualys ID
    20219
    Date Published
    April 21, 2021
    Vendor Reference
    CPUAPR2021
    CVE Reference
    CVE-2020-5360, CVE-2019-3740, CVE-2020-11023, CVE-2021-2234, CVE-2020-7760, CVE-2021-2173, CVE-2021-2175, CVE-2021-2207
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    Oracle Database quarterly patches are proactive cumulative patches containing recommended bug fixes that are released on a regular schedule.

    Affected Software:
    Oracle Database 12.1.0.2

    QID Detection Logic (Authenticated):
    Authentication via Oracle Database:
    This QID reviews the Oracle output from the table name DBA_REGISTRY_SQLPATCH for patch information.

    Consequence
    Successful exploitation could allow an attacker to compromise the database.

    Solution
    Customers are requested to refer to CPUAPR2021 to obtain details about how to deploy the update.

    Patches
    CPUAPR2021
  • CVE-2020-5360+
    Recently Published

    Oracle Database 12.2.0.1 Critical Patch Update - April 2021 (Unauthenticated)

    Severity
    Urgent5
    Qualys ID
    20218
    Date Published
    April 21, 2021
    Vendor Reference
    CPUAPR2021
    CVE Reference
    CVE-2020-5360, CVE-2019-3740, CVE-2020-11023, CVE-2021-2234, CVE-2020-7760, CVE-2021-2173, CVE-2021-2175, CVE-2021-2207
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    Oracle Database quarterly patches are proactive cumulative patches containing recommended bug fixes that are released on a regular schedule.

    Affected Software:
    Oracle Database 12.2.0.1

    QID Detection Logic (Unauthenticated):
    This QID connects the remote server's Oracle listener and reviews the Oracle banner version.

    Consequence
    Successful exploitation could allow an attacker to compromise the database.

    Solution
    Customers are requested to refer to CPUAPR2021 to obtain details about how to deploy the update.

    Patches
    CPUAPR2021
  • CVE-2020-5360+
    Recently Published

    Oracle Database 12.2.0.1 Critical Patch Update - April 2021

    Severity
    Urgent5
    Qualys ID
    20217
    Date Published
    April 21, 2021
    Vendor Reference
    CPUAPR2021
    CVE Reference
    CVE-2020-5360, CVE-2019-3740, CVE-2020-11023, CVE-2021-2234, CVE-2020-7760, CVE-2021-2173, CVE-2021-2175, CVE-2021-2207
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    Oracle Database quarterly patches are proactive cumulative patches containing recommended bug fixes that are released on a regular schedule.

    Affected Software:
    Oracle Database 12.2.0.1

    QID Detection Logic (Authenticated):
    Authentication via Oracle Database:
    This QID reviews the Oracle output from the table name DBA_REGISTRY_SQLPATCH for patch information.

    Consequence
    Successful exploitation could allow an attacker to compromise the database.

    Solution
    Customers are requested to refer to CPUAPR2021 to obtain details about how to deploy the update.

    Patches
    CPUAPR2021
  • CVE-2020-5360+
    Recently Published

    Oracle Database 18c Critical Patch Update - April 2021

    Severity
    Urgent5
    Qualys ID
    20216
    Date Published
    April 21, 2021
    Vendor Reference
    CPUAPR2021
    CVE Reference
    CVE-2020-5360, CVE-2020-17527, CVE-2019-3740, CVE-2020-11023, CVE-2021-2234, CVE-2020-7760, CVE-2021-2173, CVE-2021-2175, CVE-2021-2245, CVE-2021-2207
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    Oracle Database quarterly patches are proactive cumulative patches containing recommended bug fixes that are released on a regular schedule.

    Affected Software:
    Oracle Database 18c

    QID Detection Logic (Authenticated):
    Authentication via Oracle Database:
    This QID reviews the Oracle output from the table name DBA_REGISTRY_SQLPATCH for patch information.

    Consequence
    Successful exploitation could allow an attacker to compromise the database.

    Solution
    Customers are requested to refer to CPUAPR2021 to obtain details about how to deploy the update.

    Patches
    CPUAPR2021
  • CVE-2020-5360+
    Recently Published

    Oracle Database 19c Critical Patch Update - April 2021

    Severity
    Urgent5
    Qualys ID
    20215
    Date Published
    April 21, 2021
    Vendor Reference
    CPUAPR2021
    CVE Reference
    CVE-2020-5360, CVE-2020-17527, CVE-2019-3740, CVE-2020-11023, CVE-2021-2234, CVE-2020-7760, CVE-2021-2173, CVE-2021-2175, CVE-2021-2245, CVE-2021-2207
    CVSS Scores
    Base 7.5 / Temporal 6.5
    Description
    Oracle Database quarterly patches are proactive cumulative patches containing recommended bug fixes that are released on a regular schedule.

    Affected Software:
    Oracle Database 19c

    QID Detection Logic (Authenticated):
    Authentication via Oracle Database:
    This QID reviews the Oracle output from the table name DBA_REGISTRY_SQLPATCH for patch information.

    Consequence
    Successful exploitation could allow an attacker to compromise the database.

    Solution
    Customers are requested to refer to CPUAPR2021 to obtain details about how to deploy the update.

    Patches
    CPUAPR2021
  • CVE-2021-22893
    Recently Published

    Pulse Connect Secure Remote Code Execution Vulnerability (SA44784) (Zero Day)

    Severity
    Urgent5
    Qualys ID
    38838
    Date Published
    April 21, 2021
    Vendor Reference
    SA44784
    CVE Reference
    CVE-2021-22893
    CVSS Scores
    Base 10 / Temporal 9.1
    Description
    Pulse Connect Secure provides secure, authenticated access for remote and mobile users from any web-enabled device to corporate resources anytime, anywhere. Pulse Connect Secure is the most widely deployed SSL VPN for organizations of any size, across every major industry.

    Pulse Connect Secure is affected by a vulnerability that can allow an unauthenticated user to perform remote arbitrary file execution on the Pulse Connect Secure gateway.

    Affected Versions:
    Pulse Connect Secure 9.0R3 and Higher QID Detection Logic:(Authenticated)
    This QID checks for vulnerable versions of Pulse Connect Secure with an SNMP request.

    Consequence
    Successful exploitation will allow attackers to perform remote arbitrary file execution on the Pulse Connect Secure gateway.
    Solution
    Please visit SA44784 for more details regarding the vulnerabilities.

  • CVE-2021-2294+
    Recently Published

    Oracle WebLogic Server Multiple Vulnerabilities (CPUAPR2021)

    Severity
    Critical4
    Qualys ID
    87448
    Date Published
    April 21, 2021
    Vendor Reference
    CPUAPR2021
    CVE Reference
    CVE-2021-2294, CVE-2019-3740, CVE-2021-2211, CVE-2021-2135, CVE-2021-2204, CVE-2021-2136, CVE-2021-2214, CVE-2021-2157, CVE-2021-2142, CVE-2019-10086
    CVSS Scores
    Base 7.3 / Temporal 6.4
    Description
    Oracle WebLogic Server (formerly known as BEA WebLogic Server) is an application server for building and deploying enterprise applications and services.
    The Oracle WebLogic Server component in Oracle Fusion Middleware for versions 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0 has fixes for multiple vulnerabilities.

    Affected Versions:
    Oracle WebLogic Server, version(s) 10.3.6.0, 12.1.3.0, 12.2.1.3,12.2.1.4 and 14.1.1.0

    QID Detection Logic (Authenticated):
    Operating System: Linux
    This QID checks to see if Oracle WebLogic Server process is listening on any of the TCP ports. If so, for version 12.x it gets the "Oracle_Home" path, navigates to that directory and reads "registry.xml" and the patch files found in the directory "Oracle_Home"\inventory\patches to check if the installed version is patched.
    For version 10.3.6.x, it gets the "Oracle_Home" path, navigates to that directory and reads "registry.xml" and the file "Oracle_Home"\patch_wls1036\registry\patch-registry.xml to check if the installed version is patched.

    QID Detection Logic (Authenticated):
    Operating System: Windows
    For affected 12.x version
    The QID checks the "Oracle_Home" path with help of the registry key "HKLM\Software\Oracle". The QID verifies if the affected WebLogic version is installed on the host and then checks if the corresponding patch is applied or not.

    For 10.3.6.0
    The QID checks if WebLogic v10.3.6.0 is installed by looking at the file WLS_HOME\wlserver_10.3\.product.properties. The QID then checks if the corresponding patch is applied or not. The WLS_HOME is check using the file "systemdrive"\bea\beahomelist.

    Patch IDs checked:
    WebLogic Server 14.1.1.0 - Patch 32697788
    WebLogic Server 12.2.1.4 - Patch 32698246
    WebLogic Server 12.2.1.3 - Patch 32697734
    WebLogic Server 12.1.3.0 - Patch 32345262
    WebLogic Server 10.3.6.0 - Patch 32403651

    QID Detection Logic (Unauthenticated) :
    The qid sends a "GET console/login/LoginForm.jsp" request to retrieve the WebLogic version installed.

    Consequence
    Successful exploitation could allow an attacker to affect the confidentiality, integrity and availability of data on the target system.

    Solution
    The vendor has released patches for these issues. Customers are advised to refer to Oracle CPUAPR2021 for detailed information.

    Patches
    CPUAPR2021
  • CVE-2021-24026
    Recently Published

    WhatsApp For Android Out-of-bounds Write Vulnerability

    Severity
    Urgent5
    Qualys ID
    630672
    Date Published
    April 20, 2021
    Vendor Reference
    CVE-2021-24026
    CVE Reference
    CVE-2021-24026
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    A missing bounds check within the audio decoding pipeline for WhatsApp calls in WhatsApp for Android prior to v2.21.3, WhatsApp Business for Android prior to v2.21.3, WhatsApp for iOS prior to v2.21.32, and WhatsApp Business for iOS prior to v2.21.32 could have allowed an out-of-bounds write.
    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to CVE-2021-24026 to address this issue and obtain more information.
    Patches
    Android CVE-2021-24026
  • CVE-2020-36288
    Recently Published

    Atlassian Jira Server Cross-Site Scripting Vulnerability(JRASERVER-72115)

    Severity
    Critical4
    Qualys ID
    730054
    Date Published
    April 21, 2021
    Vendor Reference
    JRASERVER-72115
    CVE Reference
    CVE-2020-36288
    CVSS Scores
    Base 8.2 / Temporal 7.1
    Description
    Jira is a proprietary issue tracking product, developed by Atlassian. It provides bug tracking, issue tracking, and project management functions.

    Affected version:
    Atlassian Jira Server and Data Center version prior to 8.5.13
    Atlassian Jira Server and Data Center version from 8.6.0 and prior to 8.13.5
    Atlassian Jira Server and Data Center version from 8.14.0 and prior to 8.15.1

    QID Detection Logic:(Unauthenticated)
    It checks for vulnerable version of Atlassian Jira.

    Consequence
    Allows remote attackers to inject arbitrary HTML or JavaScript via a DOM Cross-Site Scripting (XSS) vulnerability caused by parameter pollution.

    Solution

    Customers are advised to refer to JRASERVER-72115 for updates pertaining to this vulnerability.

    Patches
    JRASERVER-72115
  • Recently Published

    EOL/Obsolete Software: Microsoft ASP.NET 1.0.0-rc1 Detected

    Severity
    Urgent5
    Qualys ID
    105974
    Date Published
    April 20, 2021
    Vendor Reference
    Microsoft ASP.NET End of Life
    CVSS Scores
    Base 8.1 / Temporal 7.4
    Description
    Microsoft ASP.NET 1.0.0-rc1 has reached product End of Life in its support cycle on July 16, 2016.

    No further bug fixes, enhancements, security updates or technical support is available for this version.

    QID Detection Logic (Authenticated):
    The qid looks for sub directories under %programfiles%\dotnet\shared\Microsoft.NETCore.App, %programfiles(x86)%\dotnet\shared\Microsoft.NETCore.App and checks for vulnerable versions in .version file on Windows.

    Consequence
    The system is at high risk of being exposed to security vulnerabilities. Since the vendor no longer provides updates, obsolete software is more vulnerable to viruses and other attacks.
    Solution
    Upgrade to the latest supported Microsoft ASP.NET. Refer to dotnet-core.
  • Recently Published

    EOL/Obsolete Software: Microsoft ASP.NET 2.1-rc1 Detected

    Severity
    Urgent5
    Qualys ID
    105973
    Date Published
    April 20, 2021
    Vendor Reference
    Microsoft ASP.NET End of Life
    CVSS Scores
    Base 8.1 / Temporal 7.4
    Description
    Microsoft ASP.NET 2.1-rc1 has reached product End of Life in its support cycle on June 30, 2018.

    No further bug fixes, enhancements, security updates or technical support is available for this version.

    QID Detection Logic (Authenticated):
    The qid looks for sub directories under %programfiles%\dotnet\shared\Microsoft.NETCore.App, %programfiles(x86)%\dotnet\shared\Microsoft.NETCore.App and checks for vulnerable versions in .version file on Windows.

    Consequence
    The system is at high risk of being exposed to security vulnerabilities. Since the vendor no longer provides updates, obsolete software is more vulnerable to viruses and other attacks.
    Solution
    Upgrade to the latest supported Microsoft ASP.NET. Refer to dotnet-core.
  • CVE-2020-2773+
    Recently Published

    IBM WebSphere Application Server Multiple Vulnerabilities(6415639)

    Severity
    Critical4
    Qualys ID
    375468
    Date Published
    April 20, 2021
    Vendor Reference
    WebSphere Application Server January 2021
    CVE Reference
    CVE-2020-2773, CVE-2020-14782, CVE-2020-27221, CVE-2020-14781
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description

    IBM WebSphere Application Server multiple vulnerabilities

    CVEID: CVE-2020-27221
    DESCRIPTION: Eclipse OpenJ9 is vulnerable to a stack-based buffer overflow when the virtual machine or JNI natives are converting from UTF-8 characters to platform encoding. By sending an overly long string, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
    CVEID: CVE-2020-2773
    DESCRIPTION: An unspecified vulnerability in Java SE related to the Java SE Security component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors.
    CVEID: CVE-2020-14782
    DESCRIPTION: An unspecified vulnerability in Java SE related to the Libraries component could allow an unauthenticated attacker to cause no confidentiality impact, low integrity impact, and no availability impact.
    CVEID: CVE-2020-14781
    DESCRIPTION: An unspecified vulnerability in Java SE related to the JNDI component could allow an unauthenticated attacker to obtain sensitive information resulting in a low confidentiality impact using unknown attack vectors

    Affected Versions:
    Affected Product(s) Version(s) WebSphere Application Server 9.0.0.0 WebSphere Application Server V8.5.5.9 through 8.5.5.19

    QID Detection Logic (Authenticated):
    This QID checks for the vulnerable version of IBM WebSphere Application Server and checks if the patches are installed or not.

    QID Detection Logic (Unauthenticated):
    This QID matches vulnerable versions Java

    Consequence
    An attacker could send a specially-crafted URL request to view arbitrary files on the system but not content.
    Solution
    The vendor has released patches. Please visit IBM WebSphere Application Server(6415639) for more information.
    Patches
    Windows IBM WebSphere Application Server(6415639), Windows IBM WebSphere Application Server(6415639)
  • Recently Published

    Lenovo Xclarity Controller Default Credential Detected

    Severity
    Urgent5
    Qualys ID
    730033
    Date Published
    April 20, 2021
    CVSS Scores
    Base 9.8 / Temporal 9
    Description
    Lenovo XClarity Controller (XCC) provides advanced service-processor control, monitoring, and alerting functions.

    QID Detection Logic:(Unauthenticated)
    This QID sends POST request to api/login and redfish/v1/Systems/1/ with credentials USERID:PASSW0RD.

    Consequence
    A remote attacker could exploit this to perform sensitive actions and take control over the device.
    Solution
    Customers are advised not to use default credentials for Lenovo Xclarity Controller.
  • CVE-2021-0254
    Recently Published

    Juniper Junos Remote Code Execution Vulnerability (JSA11147)

    Severity
    Critical4
    Qualys ID
    43827
    Date Published
    April 19, 2021
    Vendor Reference
    JSA11147
    CVE Reference
    CVE-2021-0254
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Juniper Junos is the network operating system used in Juniper Networks hardware systems.

    A buffer overflow vulnerability exists in the overlayd service of Juniper Networks Junos OS.
    The overlayd daemon handles Overlay OAM packets, such as ping and traceroute, sent to the overlay. The service runs as root by default and listens for UDP connections on port 4789. This issue results from improper buffer size validation, which can lead to a buffer overflow.

    Affected releases are Junos OS:
    15.1X49 versions prior to 15.1X49-D240 on SRX Series;
    15.1 versions prior to 15.1R7-S9;
    17.3 versions prior to 17.3R3-S11;
    17.4 versions prior to 17.4R2-S13, 17.4R3-S4;
    18.1 versions prior to 18.1R3-S12;
    18.2 versions prior to 18.2R2-S8, 18.2R3-S7;
    18.3 versions prior to 18.3R3-S4;
    18.4 versions prior to 18.4R1-S8, 18.4R2-S7, 18.4R3-S7;
    19.1 versions prior to 19.1R2-S2, 19.1R3-S4;
    19.2 versions prior to 19.2R1-S6, 19.2R3-S2;
    19.3 versions prior to 19.3R3-S1;
    19.4 versions prior to 19.4R2-S4, 19.4R3-S1;
    20.1 versions prior to 20.1R2-S1, 20.1R3;
    20.2 versions prior to 20.2R2, 20.2R2-S1, 20.2R3;
    20.3 versions prior to 20.3R1-S1.

    QID detection logic: (Authenticated)
    It checks for vulnerable Junos OS version.

    Consequence
    Successful exploitation allows attacker to execute remote code.

    Solution
    The vendor has released fixes.
    The following software releases have been updated to resolve these specific issues:
    Junos OS 15.1X49-D240, 15.1R7-S9, 17.3R3-S11, 17.4R2-S13, 17.4R3-S4, 18.1R3-S12, 18.2R2-S8, 18.2R3-S7, 18.3R3-S4, 18.4R1-S8, 18.4R2-S7, 18.4R3-S7, 19.1R2-S2, 19.1R3-S4, 19.2R1-S6, 19.2R3-S2, 19.3R3-S1, 19.4R2-S4, 19.4R3-S1, 20.1R2-S1, 20.1R3, 20.2R2, 20.2R2-S1, 20.2R3, 20.3R1-S1, 20.4R1, and all subsequent releases.
    For more information please visit JSA11147.

    Patches
    JSA11147
  • CVE-2021-20277
    Recently Published

    Red Hat Update for libldb (RHSA-2021:1197)

    Severity
    Critical4
    Qualys ID
    239222
    Date Published
    April 19, 2021
    Vendor Reference
    RHSA-2021:1197
    CVE Reference
    CVE-2021-20277
    CVSS Scores
    Base / Temporal
    Description
    The libldb packages provide an extensible library that implements an LDAP-like API to access remote LDAP servers, or use local TDB databases.

    Security Fix(es): samba: Out of bounds read in AD DC LDAP server (CVE-2021-20277)

    Affected Products:

    Red Hat Enterprise Linux for x86_64 8 x86_64
    Red Hat Enterprise Linux for IBM z Systems 8 s390x
    Red Hat Enterprise Linux for Power, little endian 8 ppc64le
    Red Hat Enterprise Linux for ARM 64 8 aarch64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:1197 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:1197
  • CVE-2021-20305
    Recently Published

    Red Hat Update for gnutls and nettle (RHSA-2021:1206)

    Severity
    Critical4
    Qualys ID
    239220
    Date Published
    April 19, 2021
    Vendor Reference
    RHSA-2021:1206
    CVE Reference
    CVE-2021-20305
    CVSS Scores
    Base 8.1 / Temporal 7.1
    Description
    The gnutls packages provide the GNU Transport Layer Security (GnuTLS)
    library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.Nettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space.

    Security Fix(es): nettle: Out of bounds memory access in signature verification (CVE-2021-20305)

    Affected Products:

    Red Hat Enterprise Linux for x86_64 8 x86_64
    Red Hat Enterprise Linux for IBM z Systems 8 s390x
    Red Hat Enterprise Linux for Power, little endian 8 ppc64le
    Red Hat Enterprise Linux for ARM 64 8 aarch64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:1206 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:1206
  • CVE-2021-20277
    Recently Published

    Red Hat Update for libldb (RHSA-2021:1213)

    Severity
    Critical4
    Qualys ID
    239219
    Date Published
    April 19, 2021
    Vendor Reference
    RHSA-2021:1213
    CVE Reference
    CVE-2021-20277
    CVSS Scores
    Base / Temporal
    Description
    The libldb packages provide an extensible library that implements an LDAP-like API to access remote LDAP servers, or use local TDB databases.

    Security Fix(es): samba: Out of bounds read in AD DC LDAP server (CVE-2021-20277)

    Affected Products:

    Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64
    Red Hat Enterprise Linux Server - AUS 8.2 x86_64
    Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x
    Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le
    Red Hat Enterprise Linux Server - TUS 8.2 x86_64
    Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64
    Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.2 ppc64le
    Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.2 x86_64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:1213 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:1213
  • CVE-2021-20277
    Recently Published

    Red Hat Update for libldb (RHSA-2021:1214)

    Severity
    Critical4
    Qualys ID
    239218
    Date Published
    April 19, 2021
    Vendor Reference
    RHSA-2021:1214
    CVE Reference
    CVE-2021-20277
    CVSS Scores
    Base / Temporal
    Description
    The libldb packages provide an extensible library that implements an LDAP-like API to access remote LDAP servers, or use local TDB databases.

    Security Fix(es): samba: Out of bounds read in AD DC LDAP server (CVE-2021-20277)

    Affected Products:

    Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64
    Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x
    Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le
    Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64
    Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le
    Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:1214 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:1214
  • Recently Published

    Debian Security Update for shibboleth-sp (DSA 4872-1)

    Severity
    Critical4
    Qualys ID
    178534
    Date Published
    April 19, 2021
    Vendor Reference
    DSA 4872-1
    CVSS Scores
    Base 6.5 / Temporal 5.7
    Description
    Debian has released security update forshibboleth-sp to fix the vulnerabilities.
    Consequence
    Successful exploitation allows attacker to compromise the system.
    Solution
    Refer to Debian security advisory DSA 4872-1 for patching details.
    Patches
    Debian DSA 4872-1
  • Under Investigation

    EOL/Obsolete Software: Puppet Server Prior to 6.x Detected

    Severity
    Urgent5
    Qualys ID
    730048
    Vendor Reference
    Puppet Lifecycle
    CVSS Scores
    Base 9.8 / Temporal 9
    Description
    Puppet is IT automation software that helps system administrators manage infrastructure throughout its lifecycle, from provisioning and configuration to orchestration and reporting.

    Puppet Server 5.5.x (PE 2018.1.Z) end of life date of January 31, 2021.

    QID Detection Logic:(Unauthenticated)
    This QID sends a crafted GET request to check the vulnerable version of puppet server .

    Consequence
    The system is at high risk of being exposed to security vulnerabilities. Because the vendor no longer provides updates, obsolete software is more vulnerable to viruses and other attacks.

    Solution
    Upgrade to the latest version of Puppet Server. Please refer to Puppet Server
  • CVE-2020-35189
    In Development

    Kong Docker Image Weak Authentication Vulnerability

    Severity
    Urgent5
    Qualys ID
    730047
    Vendor Reference
    Kong Docker
    CVE Reference
    CVE-2020-35189
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Kong is a scalable, open source API Platform (also known as an API Gateway or API Middleware).

    Affected Versions:

    Kong docker images before 1.0.2-alpine (Alpine specific)

    QID Detection Logic:
    This QID checks for the vulnerable version of Kong Docker.

    Consequence
    System using the kong docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.

    Solution
    Upgrade to the Kong docker 1.0.2 or to the latest version of Kong docker. Please refer to Kong docker Website.

    Patches
    Kong Docker
  • CVE-2021-27084
    Recently Published

    Visual Studio Code Java Extension Pack Remote Code Execution Vulnerability

    Severity
    Critical4
    Qualys ID
    375462
    Date Published
    April 19, 2021
    Vendor Reference
    CVE-2021-27084
    CVE Reference
    CVE-2021-27084
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    Visual Studio Code is a lightweight but powerful source code editor which runs on your desktop and is available for Windows, macOS and Linux.

    Affected Versions:
    Java Extension Pack for Visual Studio Code prior to version 0.28.0

    QID Detection Logic(Authenticated):
    This QID checks for the vulnerable versions of Java Extension Pack for Visual Studio Code.

    Consequence
    A local attacker who successfully exploited the vulnerability could inject arbitrary code to run in the context of the current user.
    Solution
    Please refer to Microsoft advisory for Visual Studio Code for more details.
    Patches
    Windows CVE-2021-27084
  • CVE-2020-17159
    Recently Published

    Visual Studio Code Java Extension Pack Remote Code Execution Vulnerability

    Severity
    Critical4
    Qualys ID
    375460
    Date Published
    April 19, 2021
    Vendor Reference
    CVE-2020-17159
    CVE Reference
    CVE-2020-17159
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    Visual Studio Code is a lightweight but powerful source code editor which runs on your desktop and is available for Windows, macOS and Linux.

    Affected Versions:
    Java Extension Pack for Visual Studio Code prior to version 0.72

    QID Detection Logic(Authenticated):
    This QID checks for the vulnerable versions of Java Extension Pack for Visual Studio Code.

    Consequence
    A local attacker who successfully exploited the vulnerability could inject arbitrary code to run in the context of the current user.
    Solution
    Please refer to Microsoft advisory for Visual Studio Code for more details.
    Patches
    WIndows CVE-2020-17159
  • CVE-2021-21100
    In Development

    Adobe Digital Editions Arbitrary File System Write Vulnerability (APSB21-26)

    Severity
    Critical4
    Qualys ID
    375449
    Vendor Reference
    APSB20-26
    CVE Reference
    CVE-2021-21100
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    Adobe Digital Editions is an ebook reader software program from Adobe Systems built using Adobe Flash with support for acquiring, managing and reading eBooks, digital newspapers, and other digital publications. The software supports PDF, XHTML, and Flash-based content.

    Affected Versions:
    Adobe Digital Editions 4.5.11.187245 and below

    QID Detection Logic (Authenticated):
    This QID checks for the vulnerable version of Digital Editions on MacOS

    Consequence
    Successful exploit could allow attacker to arbitrary write file system

    Solution

    Adobe has released a patch to fix this vulnerability. User are advised to upgrade to the latest version of software available. The latest version can be downloaded from APSB20-26

    Patches
    APSB20-26
  • Recently Published

    EOL/Obsolete Software: Microsoft ASP.NET 2.0 Detected

    Severity
    Urgent5
    Qualys ID
    105969
    Date Published
    April 19, 2021
    Vendor Reference
    Microsoft ASP.NET End of Life
    CVSS Scores
    Base 9.8 / Temporal 9
    Description
    Microsoft ASP.NET 2.0 has reached product End of Life in its support cycle on October 1, 2018.

    No further bug fixes, enhancements, security updates or technical support is available for this version.

    QID Detection Logic (Authenticated):
    The qid looks for sub directories under %programfiles%\dotnet\shared\Microsoft.NETCore.App, %programfiles(x86)%\dotnet\shared\Microsoft.NETCore.App and checks for vulnerable versions in .version file on Windows.

    Consequence
    The system is at high risk of being exposed to security vulnerabilities. Since the vendor no longer provides updates, obsolete software is more vulnerable to viruses and other attacks.
    Solution
    Upgrade to the latest supported Microsoft ASP.NET. Refer to dotnet-core.
  • Recently Published

    EOL/Obsolete Software: Microsoft ASP.NET 1.0 Detected

    Severity
    Urgent5
    Qualys ID
    105971
    Date Published
    April 19, 2021
    Vendor Reference
    Microsoft ASP.NET End of Life
    CVSS Scores
    Base 8.1 / Temporal 7.4
    Description
    Microsoft ASP.NET 1.0 has reached product End of Life in its support cycle on June 27, 2019 .

    No further bug fixes, enhancements, security updates or technical support is available for this version.

    QID Detection Logic (Authenticated):
    The qid looks for sub directories under %programfiles%\dotnet\shared\Microsoft.NETCore.App, %programfiles(x86)%\dotnet\shared\Microsoft.NETCore.App and checks for vulnerable versions in .version file on Windows.

    Consequence
    The system is at high risk of being exposed to security vulnerabilities. Since the vendor no longer provides updates, obsolete software is more vulnerable to viruses and other attacks.
    Solution
    Upgrade to the latest supported Microsoft ASP.NET. Refer to dotnet-core.
  • Recently Published

    EOL/Obsolete Software: Microsoft ASP.NET 1.1 Detected

    Severity
    Urgent5
    Qualys ID
    105970
    Date Published
    April 19, 2021
    Vendor Reference
    Microsoft ASP.NET End of Life
    CVSS Scores
    Base 8.1 / Temporal 7.4
    Description
    Microsoft ASP.NET 1.1 has reached product End of Life in its support cycle on June 27, 2019 .

    No further bug fixes, enhancements, security updates or technical support is available for this version.

    QID Detection Logic (Authenticated):
    The qid looks for sub directories under %programfiles%\dotnet\shared\Microsoft.NETCore.App, %programfiles(x86)%\dotnet\shared\Microsoft.NETCore.App and checks for vulnerable versions in .version file on Windows.

    Consequence
    The system is at high risk of being exposed to security vulnerabilities. Since the vendor no longer provides updates, obsolete software is more vulnerable to viruses and other attacks.
    Solution
    Upgrade to the latest supported Microsoft ASP.NET. Refer to dotnet-core.
  • Recently Published

    EOL/Obsolete Software: Microsoft ASP.NET 3.1 Detected

    Severity
    Urgent5
    Qualys ID
    105968
    Date Published
    April 19, 2021
    Vendor Reference
    Microsoft ASP.NET End of Life
    CVSS Scores
    Base 8.1 / Temporal 7.4
    Description
    Microsoft ASP.NET 3.1 has reached product End of Life in its support cycle on December 3, 2020.

    No further bug fixes, enhancements, security updates or technical support is available for this version.

    QID Detection Logic (Authenticated):
    The qid looks for sub directories under %programfiles%\dotnet\shared\Microsoft.NETCore.App, %programfiles(x86)%\dotnet\shared\Microsoft.NETCore.App and checks for vulnerable versions in .version file on Windows.

    Consequence
    The system is at high risk of being exposed to security vulnerabilities. Since the vendor no longer provides updates, obsolete software is more vulnerable to viruses and other attacks.
    Solution
    Upgrade to the latest supported Microsoft ASP.NET. Refer to dotnet-core.
  • Recently Published

    EOL/Obsolete Software: Microsoft ASP.NET 3.0 Detected

    Severity
    Urgent5
    Qualys ID
    105967
    Date Published
    April 19, 2021
    Vendor Reference
    Microsoft ASP.NET End of Life
    CVSS Scores
    Base 8.1 / Temporal 7.4
    Description
    Microsoft ASP.NET 3.0 has reached product End of Life in its support cycle on March 3, 2020.

    No further bug fixes, enhancements, security updates or technical support is available for this version.

    QID Detection Logic (Authenticated):
    The qid looks for sub directories under %programfiles%\dotnet\shared\Microsoft.NETCore.App, %programfiles(x86)%\dotnet\shared\Microsoft.NETCore.App and checks for vulnerable versions in .version file on Windows.

    Consequence
    The system is at high risk of being exposed to security vulnerabilities. Since the vendor no longer provides updates, obsolete software is more vulnerable to viruses and other attacks.
    Solution
    Upgrade to the latest supported Microsoft ASP.NET. Refer to dotnet-core.
  • Recently Published

    EOL/Obsolete Software: Microsoft ASP.NET 2.2 Detected

    Severity
    Urgent5
    Qualys ID
    105966
    Date Published
    April 19, 2021
    Vendor Reference
    Microsoft ASP.NET End of Life
    CVSS Scores
    Base 8.1 / Temporal 7.4
    Description
    Microsoft ASP.NET 2.2 has reached product End of Life in its support cycle on December 23, 2019.

    No further bug fixes, enhancements, security updates or technical support is available for this version.

    QID Detection Logic (Authenticated):
    The qid looks for sub directories under %programfiles%\dotnet\shared\Microsoft.NETCore.App, %programfiles(x86)%\dotnet\shared\Microsoft.NETCore.App and checks for vulnerable versions in .version file on Windows.

    Consequence
    The system is at high risk of being exposed to security vulnerabilities. Since the vendor no longer provides updates, obsolete software is more vulnerable to viruses and other attacks.
    Solution
    Upgrade to the latest supported Microsoft ASP.NET. Refer to dotnet-core.
  • Recently Published

    EOL/Obsolete Software: Microsoft ASP.NET 2.1 Detected

    Severity
    Urgent5
    Qualys ID
    105965
    Date Published
    April 19, 2021
    Vendor Reference
    Microsoft ASP.NET End of Life
    CVSS Scores
    Base 8.1 / Temporal 7.4
    Description
    Microsoft ASP.NET 2.1 has reached product End of Life in its support cycle on August 21, 2021.

    No further bug fixes, enhancements, security updates or technical support is available for this version.

    QID Detection Logic (Authenticated):
    The qid looks for sub directories under %programfiles%\dotnet\shared\Microsoft.NETCore.App, %programfiles(x86)%\dotnet\shared\Microsoft.NETCore.App and checks for vulnerable versions in .version file on Windows.

    Consequence
    The system is at high risk of being exposed to security vulnerabilities. Since the vendor no longer provides updates, obsolete software is more vulnerable to viruses and other attacks.
    Solution
    Upgrade to the latest supported Microsoft ASP.NET. Refer to dotnet-core.
  • CVE-2020-1946
    Recently Published

    Debian Security Update for spamassassin (DSA 4879-1)

    Severity
    Urgent5
    Qualys ID
    178516
    Date Published
    April 19, 2021
    Vendor Reference
    DSA 4879-1
    CVE Reference
    CVE-2020-1946
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Debian has released security update forspamassassin to fix the vulnerabilities.
    Consequence
    Successful exploitation allows attacker to compromise the system.
    Solution
    Refer to Debian security advisory DSA 4879-1 for patching details.
    Patches
    Debian DSA 4879-1
  • CVE-2020-27918+
    Recently Published

    Debian Security Update for webkit2gtk (DSA 4877-1)

    Severity
    Critical4
    Qualys ID
    178515
    Date Published
    April 19, 2021
    Vendor Reference
    DSA 4877-1
    CVE Reference
    CVE-2020-27918, CVE-2020-29623, CVE-2021-1765, CVE-2021-1789, CVE-2021-1799, CVE-2021-1801, CVE-2021-1870, CVE-2020-27918, CVE-2020-29623, CVE-2021-1765, CVE-2021-1789, CVE-2021-1799, CVE-2021-1801, CVE-2021-1870
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Debian has released security update forwebkit2gtk to fix the vulnerabilities.
    Consequence
    Successful exploitation allows attacker to compromise the system.
    Solution
    Refer to Debian security advisory DSA 4877-1 for patching details.
    Patches
    Debian DSA 4877-1
  • CVE-2021-23358
    Recently Published

    Debian Security Update for underscore (DSA 4883-1)

    Severity
    Critical4
    Qualys ID
    178519
    Date Published
    April 19, 2021
    Vendor Reference
    DSA 4883-1
    CVE Reference
    CVE-2021-23358
    CVSS Scores
    Base 7.2 / Temporal 6.3
    Description
    Debian has released security update forunderscore to fix the vulnerabilities.
    Consequence
    Successful exploitation allows attacker to compromise the system.
    Solution
    Refer to Debian security advisory DSA 4883-1 for patching details.
    Patches
    Debian DSA 4883-1
  • CVE-2020-27619
    Recently Published

    Python 3 Denial of Service (DoS) Vulnerability

    Severity
    Critical4
    Qualys ID
    375320
    Date Published
    April 19, 2021
    Vendor Reference
    CVE-2020-27619
    CVE Reference
    CVE-2020-27619
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Python is an interpreted, high-level and general-purpose programming language.

    Python versions 3.0.0 through 3.9.0 are susceptible to a vulnerability which when successfully exploited could lead to disclosure of sensitive information, addition or modification of data, or Denial of Service (DoS).

    Affected Versions
    Python versions 3.0.0 through 3.9.0

    QID Detection Logic(Authenticated):
    This checks for version information from patchlevel.h file.

    Consequence
    On successfully exploited it could lead to disclosure of sensitive information, addition or modification of data, or Denial of Service (DoS).
    Solution
    Vendor has release fix to this issue.
    Refer to issue trackerhere to address this vulnerability and obtain further details.
    Patches
    WIndows CVE-2020-27619
  • Recently Published

    Microsoft Edge Based On Chromium Prior to 90.0.818.41 Multiple Vulnerabilities

    Severity
    Critical4
    Qualys ID
    375463
    Date Published
    April 15, 2021
    Vendor Reference
    Microsoft Edge
    CVSS Scores
    Base 8.8 / Temporal 7.9
    Description
    Google Chrome is a web browser for multiple platforms developed by Google.

    Affected Versions:
    Google Chrome Up to 90.0.818.41

    QID Detection Logic(Authenticated):
    This QID checks for vulnerable versions of Google Chrome on Windows.

    Consequence
    Successful exploitation of this vulnerability affects confidentiality, integrity and availability.

    Solution
    Customers are advised to upgrade to version
    For further details refer to 90.0.818.41 or later
    Patches
    Microsoft Edge
  • CVE-2021-21222+
    Recently Published

    Google Chrome Prior To 90.0.4430.85 Multiple Vulnerabilities

    Severity
    Critical4
    Qualys ID
    375461
    Date Published
    April 15, 2021
    Vendor Reference
    90.0.4430.85
    CVE Reference
    CVE-2021-21222, CVE-2021-21223, CVE-2021-21224, CVE-2021-21225, CVE-2021-21226
    CVSS Scores
    Base 8.8 / Temporal 7.9
    Description
    Google Chrome is a web browser for multiple platforms developed by Google.

    Affected Versions:
    Google Chrome Prior To 90.0.4430.85

    QID Detection Logic(Authenticated):
    This QID checks for vulnerable versions of Google Chrome on Windows.

    Consequence
    Successful exploitation of this vulnerability affects confidentiality, integrity and availability.

    Solution
    Customers are advised to upgrade to latest version90.0.4430.85
    For further details refer to Google Chrome 90.0.4430.85
    Patches
    90.0.4430.85
  • CVE-2020-25097
    Recently Published

    Red Hat Update for squid (RHSA-2021:1135)

    Severity
    Critical4
    Qualys ID
    239216
    Date Published
    April 15, 2021
    Vendor Reference
    RHSA-2021:1135
    CVE Reference
    CVE-2020-25097
    CVSS Scores
    Base 8.6 / Temporal 7.5
    Description
    Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.

    Security Fix(es): squid: improper input validation may allow a trusted client to perform HTTP request smuggling (CVE-2020-25097)

    Affected Products:

    Red Hat Enterprise Linux Server 7 x86_64
    Red Hat Enterprise Linux Workstation 7 x86_64
    Red Hat Enterprise Linux for IBM z Systems 7 s390x
    Red Hat Enterprise Linux for Power, big endian 7 ppc64
    Red Hat Enterprise Linux for Power, little endian 7 ppc64le

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:1135 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:1135
  • CVE-2021-20305
    Recently Published

    Red Hat Update for nettle (RHSA-2021:1145)

    Severity
    Critical4
    Qualys ID
    239215
    Date Published
    April 15, 2021
    Vendor Reference
    RHSA-2021:1145
    CVE Reference
    CVE-2021-20305
    CVSS Scores
    Base 8.1 / Temporal 7.1
    Description
    Nettle is a cryptographic library that is designed to fit easily in almost any context: In crypto toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like LSH or GNUPG, or even in kernel space.

    Security Fix(es): nettle: Out of bounds memory access in signature verification (CVE-2021-20305)

    Affected Products:

    Red Hat Enterprise Linux Server 7 x86_64
    Red Hat Enterprise Linux Workstation 7 x86_64
    Red Hat Enterprise Linux Desktop 7 x86_64
    Red Hat Enterprise Linux for IBM z Systems 7 s390x
    Red Hat Enterprise Linux for Power, big endian 7 ppc64
    Red Hat Enterprise Linux for Scientific Computing 7 x86_64
    Red Hat Enterprise Linux for Power, little endian 7 ppc64le

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:1145 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:1145
  • CVE-2021-27364+
    Recently Published

    CentOS Security Update for kernel (CESA-2021:1071)

    Severity
    Critical4
    Qualys ID
    257073
    Date Published
    April 15, 2021
    Vendor Reference
    CESA-2021:1071 centos 7
    CVE Reference
    CVE-2021-27364, CVE-2021-27365, CVE-2021-27363
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    CentOS has released security update for kernel security update to fix the vulnerabilities.

    Affected Products:

    centos 7

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    This vulnerability could be exploited to gain access to sensitive information also use this vulnerability to change contents or configuration on the system. Additionally this vulnerability can also be used to cause a denial of service in the form of interruptions in resource availability.
    Solution
    To resolve this issue, upgrade to the latest packages which contain a patch. Refer to CentOS advisory centos 7 for updates and patch information.
    Patches
    centos 7 CESA-2021:1071
  • CVE-2021-27363+
    Recently Published

    Red Hat Update for kernel (RHSA-2021:1071)

    Severity
    Critical4
    Qualys ID
    239217
    Date Published
    April 15, 2021
    Vendor Reference
    RHSA-2021:1071
    CVE Reference
    CVE-2021-27363, CVE-2021-27364, CVE-2021-27365
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    The kernel packages contain the Linux kernel, the core of any Linux operating system.

    Security Fix(es): kernel: out-of-bounds read in libiscsi module (CVE-2021-27364) kernel: heap buffer overflow in the iSCSI subsystem (CVE-2021-27365) kernel: iscsi: unrestricted access to sessions and handles (CVE-2021-27363)

    Affected Products:

    Red Hat Enterprise Linux Server 7 x86_64
    Red Hat Enterprise Linux Workstation 7 x86_64
    Red Hat Enterprise Linux Desktop 7 x86_64
    Red Hat Enterprise Linux for IBM z Systems 7 s390x
    Red Hat Enterprise Linux for Power, big endian 7 ppc64
    Red Hat Enterprise Linux for Scientific Computing 7 x86_64
    Red Hat Enterprise Linux for Power, little endian 7 ppc64le
    Red Hat Virtualization Host 4 for RHEL 7 x86_64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:1071 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:1071
  • CVE-2021-27363+
    Recently Published

    Red Hat Update for kernel (RHSA-2021:1171)

    Severity
    Critical4
    Qualys ID
    239214
    Date Published
    April 15, 2021
    Vendor Reference
    RHSA-2021:1171
    CVE Reference
    CVE-2021-27363, CVE-2021-27364, CVE-2021-27365
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    The kernel packages contain the Linux kernel, the core of any Linux operating system.

    Security Fix(es): kernel: out-of-bounds read in libiscsi module (CVE-2021-27364) kernel: heap buffer overflow in the iSCSI subsystem (CVE-2021-27365) kernel: iscsi: unrestricted access to sessions and handles (CVE-2021-27363)

    Affected Products:

    Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64
    Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x
    Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le
    Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64
    Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le
    Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64
    Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.1 x86_64
    Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.1 ppc64le
    Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.1 aarch64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:1171 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:1171
  • CVE-2021-27364+
    Recently Published

    Red Hat Update for kpatch-patch (RHSA-2021:1173)

    Severity
    Critical4
    Qualys ID
    239213
    Date Published
    April 15, 2021
    Vendor Reference
    RHSA-2021:1173
    CVE Reference
    CVE-2021-27364, CVE-2021-27365
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

    Security Fix(es): kernel: out-of-bounds read in libiscsi module (CVE-2021-27364) kernel: heap buffer overflow in the iSCSI subsystem (CVE-2021-27365)

    Affected Products:

    Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64
    Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le
    Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le
    Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:1173 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:1173
  • CVE-2021-20277
    Recently Published

    CentOS Security Update for libldb (CESA-2021:1072)

    Severity
    Critical4
    Qualys ID
    257074
    Date Published
    April 15, 2021
    Vendor Reference
    CESA-2021:1072 centos 7
    CVE Reference
    CVE-2021-20277
    CVSS Scores
    Base 5 / Temporal 4.4
    Description
    CentOS has released security update for libldb security update to fix the vulnerabilities.

    Affected Products:

    centos 7

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    This vulnerability could be exploited to gain access to sensitive information also use this vulnerability to change contents or configuration on the system. Additionally this vulnerability can also be used to cause a denial of service in the form of interruptions in resource availability.
    Solution
    To resolve this issue, upgrade to the latest packages which contain a patch. Refer to CentOS advisory centos 7 for updates and patch information.
    Patches
    centos 7 CESA-2021:1072
  • CVE-2019-1889
    Recently Published

    Cisco Application Policy Infrastructure Controller REST API Privilege Escalation Vulnerability(cisco-sa-20190703-ccapic-restapi)

    Severity
    Urgent5
    Qualys ID
    316924
    Date Published
    April 15, 2021
    Vendor Reference
    cisco-sa-20190703-ccapic-restapi
    CVE Reference
    CVE-2019-1889
    CVSS Scores
    Base 7.2 / Temporal 6.3
    Description

    QID Detection Logic (Authenticated):
    The check matches CiscoCisco APIC version retrieved via Unix Auth using "show version" command.

    Affected Version:
    Cisco APIC Software releases earlier than 3.2(9b) and 4.1(2g).

    Consequence
    A successful exploit could allow an attacker to escalate their privilege level to root. The attacker would need to have the administrator role on the device.
    Solution

    Customers are advised to refer to cisco-sa-20190703-ccapic-restapi for more information.

    Patches
    cisco-sa-20190703-ccapic-restapi
  • CVE-2021-28480+
    Recently Published

    Microsoft Exchange Server Remote Code Execution Vulnerability - April 2021

    Severity
    Urgent5
    Qualys ID
    50109
    Date Published
    April 14, 2021
    Vendor Reference
    KB5001779
    CVE Reference
    CVE-2021-28480, CVE-2021-28481, CVE-2021-28482, CVE-2021-28483
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    Microsoft Exchange Server is prone to remote code execution vulnerability.
    KB Articles associated with this update are: KB5001779

    Affected Versions:
    Microsoft Exchange Server 2013 Cumulative Update 23
    Microsoft Exchange Server 2016 Cumulative Update 19
    Microsoft Exchange Server 2016 Cumulative Update 20
    Microsoft Exchange Server 2019 Cumulative Update 8
    Microsoft Exchange Server 2019 Cumulative Update 9

    QID Detection Logic (authenticated):
    The QID checks for the version of file Exsetup.exe.

    Consequence
    Successful exploitation allows attackers to execute remote code.
    Solution
    Customers are advised to refer to KB5001779 for information pertaining to this vulnerability.
    Patches
    KB5001779
  • CVE-2021-21206+
    Recently Published

    Google Chrome Prior To 89.0.4389.128 Multiple Vulnerabilities

    Severity
    Urgent5
    Qualys ID
    375445
    Date Published
    April 14, 2021
    Vendor Reference
    89.0.4389.128
    CVE Reference
    CVE-2021-21206, CVE-2021-21220
    CVSS Scores
    Base 10 / Temporal 9
    Description
    Google Chrome is a web browser for multiple platforms developed by Google.

    CVE-2021-21206: Use after free in Blink
    CVE-2021-21220: Insufficient validation of untrusted input in V8.

    Affected Versions:
    Google Chrome Prior to 89.0.4389.128

    QID Detection Logic(Authenticated):
    This QID checks for vulnerable versions of Google Chrome on Windows, MAC OS, and Linux OS.

    Consequence
    Successful exploitation of these vulnerabilities could affect Confidentiality, Integrity and Availability.

    Solution
    Customers are advised to upgrade to latest version 89.0.4389.128
    For further details refer to Google Chrome 89.0.4389.128
    Patches
    89.0.4389.128
  • CVE-2021-28466+
    Recently Published

    Microsoft Windows Codecs Library and VP9 Video Extensions Multiple Vulnerabilities

    Severity
    Critical4
    Qualys ID
    91761
    Date Published
    April 14, 2021
    Vendor Reference
    CVE-2021-28464, CVE-2021-28466, CVE-2021-28468
    CVE Reference
    CVE-2021-28466, CVE-2021-28464, CVE-2021-28468
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory.
    Microsoft has disclosed Information Disclosure and Remote Code Execution in Windows Codecs Library and VP9 Video Extensions.

    Affected Product:
    VP9 Video Extensions prior to version 1.0.40631.0
    Raw Image Extension prior to version 1.0.40392.0

    QID detection Logic:
    The gets the version of HEVCVideoExtension by querying wmi class Win32_InstalledStoreProgram.

    Consequence
    An attacker who successfully exploited this vulnerability could obtain information to further compromise the user system.
    Solution
    Users are advised to check CVE-2021-26902 for more information.

    Patches
    Windows CVE-2021-27079, Windows CVE-2021-28317, Windows CVE-2021-28464, Windows CVE-2021-28466, Windows CVE-2021-28468
  • CVE-2021-26413+
    Recently Published

    Microsoft Windows Security Update for April 2021

    Severity
    Critical4
    Qualys ID
    91758
    Date Published
    April 14, 2021
    Vendor Reference
    KB5001330, KB5001332, KB5001335, KB5001337, KB5001339, KB5001340, KB5001342, KB5001347, KB5001382, KB5001383, KB5001387, KB5001389, KB5001392, KB5001393
    CVE Reference
    CVE-2021-26413, CVE-2021-26415, CVE-2021-26416, CVE-2021-26417, CVE-2021-27072, CVE-2021-27079, CVE-2021-27086, CVE-2021-27088, CVE-2021-27089, CVE-2021-27090, CVE-2021-27091, CVE-2021-27092, CVE-2021-27093, CVE-2021-27094, CVE-2021-27095, CVE-2021-27096, CVE-2021-28309, CVE-2021-28310, CVE-2021-28311, CVE-2021-28312, CVE-2021-28313, CVE-2021-28314, CVE-2021-28315, CVE-2021-28316, CVE-2021-28317, CVE-2021-28318, CVE-2021-28319, CVE-2021-28320, CVE-2021-28321, CVE-2021-28322, CVE-2021-28323, CVE-2021-28324, CVE-2021-28325, CVE-2021-28326, CVE-2021-28327, CVE-2021-28328, CVE-2021-28329, CVE-2021-28330, CVE-2021-28331, CVE-2021-28332, CVE-2021-28333, CVE-2021-28334, CVE-2021-28335, CVE-2021-28336, CVE-2021-28337, CVE-2021-28338, CVE-2021-28339, CVE-2021-28340, CVE-2021-28341, CVE-2021-28342, CVE-2021-28343, CVE-2021-28344, CVE-2021-28345, CVE-2021-28346, CVE-2021-28347, CVE-2021-28348, CVE-2021-28349, CVE-2021-28350, CVE-2021-28351, CVE-2021-28352, CVE-2021-28353, CVE-2021-28354, CVE-2021-28355, CVE-2021-28356, CVE-2021-28357, CVE-2021-28358, CVE-2021-28434, CVE-2021-28435, CVE-2021-28436, CVE-2021-28437, CVE-2021-28438, CVE-2021-28439, CVE-2021-28440, CVE-2021-28441, CVE-2021-28442, CVE-2021-28443, CVE-2021-28444, CVE-2021-28445, CVE-2021-28446, CVE-2021-28447, CVE-2021-28464, CVE-2021-28466, CVE-2021-28468
    CVSS Scores
    Base 7.8 / Temporal 7.2
    Description
    Microsoft releases the security update for Windows April 2021

    The KB Articles associated with the update:
    KB5001387
    KB5001382
    KB5001339
    KB5001337
    KB5001347
    KB5001383
    KB5001342
    KB5001392
    KB5001335
    KB5001330
    KB5001389
    KB5001332
    KB5001393
    KB5001340

    This QID checks for the file version of ntoskrnl.exe

    The following versions of ntoskrnl.exe with their corresponding KBs are verified:
    KB5001387 - 6.2.9200.23327
    KB5001382 - 6.3.9600.19994
    KB5001339 - 10.0.17134.2145
    KB5001337 - 10.0.18362.1500
    KB5001347 - 10.0.14393.4350
    KB5001383 - 6.2.9200.23327
    KB5001342 - 10.0.17763.1879
    KB5001392 - 6.1.7601.24576
    KB5001335 - 6.1.7601.24576
    KB5001330 - 10.0.19041.928
    KB5001389 - 6.0.6003.21095
    KB5001332 - 6.0.6003.21095
    KB5001393 - 6.3.9600.19994
    KB5001340 - 10.0.10240.18906

    Consequence
    A remote attacker could exploit this vulnerability and execute code on the target system.
    Solution
    Please refer to the Security Update Guide for more information pertaining to these vulnerabilities.

    Patches
    Windows Microsoft Security Update Guide
  • CVE-2021-27064
    Recently Published

    Microsoft Visual Studio Security Update for April 2021

    Severity
    Critical4
    Qualys ID
    91757
    Date Published
    April 14, 2021
    Vendor Reference
    CVE-2021-27064
    CVE Reference
    CVE-2021-27064
    CVSS Scores
    Base 7.8 / Temporal 7
    Description
    Microsoft has released security update for Visual Studio which resolves multiple security vulnerabilities.

    Affected Software:
    Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
    Microsoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3)
    Microsoft Visual Studio 2019 version 16.7 (includes 16.0 - 16.6)
    Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)

    QID Detection Logic:Authenticated
    This QID detects vulnerable versions of Microsoft Visual Studio by checking file version of devenv.exe.

    Consequence
    Successful exploitation can affect confidentiality, integrity and availability.
    Solution
    Customers are advised to refer to CVE-2021-27064 for more information pertaining to this vulnerability.
    Patches
    WIndows CVE-2021-27064
  • CVE-2021-28472
    Recently Published

    Visual Studio Code Maven for Java Extension Remote Code Execution Vulnerability

    Severity
    Critical4
    Qualys ID
    375455
    Date Published
    April 14, 2021
    Vendor Reference
    CVE-2021-28472
    CVE Reference
    CVE-2021-28472
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    Visual Studio Code is a lightweight but powerful source code editor which runs on your desktop and is available for Windows, macOS and Linux.

    Affected Versions:
    Maven for Java Extension for Visual Studio Code prior to version 0.29.0

    QID Detection Logic(Authenticated):
    This QID checks for the vulnerable versions of Maven for Java Extension for Visual Studio Code.

    Consequence
    A local attacker who successfully exploited the vulnerability could inject arbitrary code to run in the context of the current user.
    Solution
    Please refer to Microsoft advisory for Visual Studio Code for more details.
    Patches
    WIndows CVE-2021-28472
  • CVE-2021-28448
    Recently Published

    Visual Studio Code Kubernetes Tools Remote Code Execution Vulnerability

    Severity
    Critical4
    Qualys ID
    375454
    Date Published
    April 14, 2021
    Vendor Reference
    CVE-2021-28448
    CVE Reference
    CVE-2021-28448
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    Visual Studio Code is a lightweight but powerful source code editor which runs on your desktop and is available for Windows, macOS and Linux.

    Affected Versions:
    Kubernetes Tools for Visual Studio Code prior to version 1.3.0

    QID Detection Logic(Authenticated):
    This QID checks for the vulnerable versions of Kubernetes Tools for Visual Studio Code.

    Consequence
    A local attacker who successfully exploited the vulnerability could inject arbitrary code to run in the context of the current user.
    Solution
    Please refer to Microsoft advisory for Visual Studio Code for more details.
    Patches
    WIndows CVE-2021-28448
  • CVE-2021-28470
    Recently Published

    Visual Studio Code GitHub Pull Requests and Issues Extension Remote Code Execution Vulnerability

    Severity
    Critical4
    Qualys ID
    375453
    Date Published
    April 14, 2021
    Vendor Reference
    CVE-2021-28471
    CVE Reference
    CVE-2021-28470
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    Visual Studio Code is a lightweight but powerful source code editor which runs on your desktop and is available for Windows, macOS and Linux.

    Affected Versions:
    GitHub Pull Requests and Issues Extension for Visual Studio Code prior to version 0.25.1

    QID Detection Logic(Authenticated):
    This QID checks for the vulnerable versions of GitHub Pull Requests and Issues Extension for Visual Studio Code.

    Consequence
    A local attacker who successfully exploited the vulnerability could inject arbitrary code to run in the context of the current user.
    Solution
    Please refer to Microsoft advisory for Visual Studio Code for more details.
    Patches
    WIndows CVE-2021-28470
  • CVE-2021-28469+
    Recently Published

    Visual Studio Code Remote Code Execution Vulnerability

    Severity
    Critical4
    Qualys ID
    375452
    Date Published
    April 14, 2021
    Vendor Reference
    CVE-2021-28469
    CVE Reference
    CVE-2021-28469, CVE-2021-28457, CVE-2021-28477, CVE-2021-28475, CVE-2021-28473, CVE-2021-28471
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    Visual Studio Code is a lightweight but powerful source code editor which runs on your desktop and is available for Windows, macOS and Linux.

    Affected Versions:
    Visual studio code prior to version 1.55.2

    QID Detection Logic(Authenticated):
    This QID checks for the vulnerable versions of visual studio code.

    Consequence
    A local attacker who successfully exploited the vulnerability could inject arbitrary code to run in the context of the current user.
    Solution
    Please refer to Microsoft advisory for Visual Studio Code for more details.
    Patches
    MAC OS X CVE-2021-28469, WIndows CVE-2021-28469
  • CVE-2021-28454+
    Recently Published

    Microsoft Office and Microsoft Office Services and Web Apps Security Update April 2021

    Severity
    Critical4
    Qualys ID
    110379
    Date Published
    April 14, 2021
    Vendor Reference
    KB2553491, KB2589361, KB3017810, KB3178639, KB3178643, KB4493198, KB4493208, KB4493215, KB4493218, KB4504705, KB4504714, KB4504721, KB4504722, KB4504724, KB4504726, KB4504727, KB4504729, KB4504735, KB4504738, KB4504739
    CVE Reference
    CVE-2021-28454, CVE-2021-28453, CVE-2021-28452, CVE-2021-28451, CVE-2021-28449, CVE-2021-28456
    CVSS Scores
    Base 7.3 / Temporal 6.4
    Description
    Microsoft has released April 2021 security updates to fix multiple security vulnerabilities.

    This security update contains the following KBs:

    KB4504727
    KB4493218
    KB4504729
    KB4504735
    KB4504721
    KB4504714
    KB4504726
    KB3178643
    KB3178639
    KB2553491
    KB2589361
    KB4504738
    KB4504705
    KB4493215
    KB4493198
    KB4504739
    KB3017810
    KB4504724
    KB4493208
    KB4504722

    QID Detection Logic:
    This authenticated QID checks the file versions from the Microsoft advisory with the versions on the affected office system.

    Note: Office click-2-run and Office 365 installations need to be updated manually or need to be set to automatic update. There is no direct download for the patch.

    Consequence
    Successful exploitation allows an attacker to execute code remotely.

    Solution
    Refer to Microsoft Security Guidance for more details pertaining to this vulnerability.

    Patches
    Microsoft Office and Microsoft Office Services and Web Apps Security Update April 2021
  • CVE-2021-28450+
    Recently Published

    Microsoft SharePoint Enterprise Server Multiple Vulnerabilities April 2021

    Severity
    Critical4
    Qualys ID
    110377
    Date Published
    April 14, 2021
    Vendor Reference
    KB4493170, KB4493201, KB4504701, KB4504709, KB4504715, KB4504716, KB4504719, KB4504723
    CVE Reference
    CVE-2021-28450, CVE-2021-28453
    CVSS Scores
    Base 7.3 / Temporal 6.4
    Description
    Microsoft has released April 2021 security updates to fix multiple security vulnerabilities.

    This security update contains the following KBs:

    KB4504709
    KB4504716
    KB4493170
    KB4504719
    KB4504701
    KB4504715
    KB4493201
    KB4504723

    QID Detection Logic:
    This authenticated QID checks the file versions from the above Microsoft KB article with the versions on the affected SharePoint system.

    Consequence
    Successful exploitation allows an attacker to execute code remotely.

    Solution
    Refer to Microsoft Security Guidance for more details pertaining to this vulnerability.

    Patches
    Microsoft Office and Microsoft Office Services and Web Apps Security Update April 2021
  • CVE-2021-28452
    Recently Published

    Microsoft Outlook Remote Code Execution Vulnerability Security Update April 2021

    Severity
    Critical4
    Qualys ID
    110378
    Date Published
    April 14, 2021
    Vendor Reference
    KB4493185, KB4504712, KB4504733
    CVE Reference
    CVE-2021-28452
    CVSS Scores
    Base 7.1 / Temporal 6.2
    Description
    Microsoft has released April 2021 security updates for outlook to fix a Remote Code Execution vulnerability.

    This security update contains the following KBs:
    KB4493185
    KB4504733
    KB4504712
    QID Detection Logic:
    This authenticated QID checks the file versions from the Microsoft advisory with the versions on affected outlook applications.

    Note: Office click-2-run and Office 365 installations need to be either updated manually or need to be set to automatic update. There is no direct download for the patch.

    Consequence
    Successful exploitation will lead to Remote Code Execution.

    Solution
    Refer to Microsoft Security Guide for more details pertaining to this vulnerability.

    Patches
    Microsoft Office and Microsoft Office Services and Web Apps Security Update April 2021
  • CVE-2021-21206+
    Recently Published

    Microsoft Edge Based On Chromium Prior to 89.0.774.77 Multiple Vulnerabilities

    Severity
    Critical4
    Qualys ID
    375446
    Date Published
    April 14, 2021
    Vendor Reference
    CVE-2021-21206, CVE-2021-21220
    CVE Reference
    CVE-2021-21206, CVE-2021-21220
    CVSS Scores
    Base 10 / Temporal 9
    Description
    Microsoft Edge based on Chromium is affected by the following vulnerabilities:

    CVE-2021-21206: Use after free in Blink.
    CVE-2021-21220: Insufficient validation of untrusted input in V8 for x86_64.

    Affected Version:
    Microsoft Edge based on Chromium prior to version 89.0.774.77

    QID Detection Logic: (authenticated)
    Operating System: Windows
    The install path is checked via registry "HKLM\SOFTWARE\Clients\StartMenuInternet\Microsoft Edge\shell\open\command". The version is checked via file msedge.exe.

    QID Detection Logic: (authenticated)
    Operating System: MacOS
    The QID checks for vulnerable version of Microsoft Edge from installed application list.

    Consequence
    Successful exploitation of this vulnerability affects confidentiality, integrity and availability.

    Solution
    Customers are advised to upgrade to version
    For further details refer to 89.0.774.77 or later
    Patches
    CVE-2021-21206, CVE-2021-21220
  • Under Investigation

    EOL/Obsolete Software: Apache Tomcat 7.0.x Detected

    Severity
    Urgent5
    Qualys ID
    105972
    Vendor Reference
    Apache Tomcat 7.0
    CVSS Scores
    Base 8.8 / Temporal 8.1
    Description
    Apache Tomcat software is a web server..


    Support for Apache Tomcat 7.0.x ended on March, 31 2021. No further bug fixes, enhancements, security updates or technical support is available for this version.

    QID Detection Logic (Unauthenticated):
    Checks for Apache Tomcat version 7.0.x in the HTTP response.

    QID Detection Logic (Authenticated):
    Operating System: Windows
    Detection checks for Tomcat version from the windows registry and checks for existence of Tomcat4.exe file.

    QID Detection Logic (Authenticated):
    Operating System: Linux
    The QID checks for tomcat instances in the running processes. The QID uses unzip command with -p (prints output to stdout) option to extract the version from catalina.jar file.

    Consequence
    The system is at high risk of being exposed to security vulnerabilities. Because the vendor no longer provides updates, obsolete software is more vulnerable to viruses and other attacks.

    Solution
    Upgrade to the latest version of Apache Tomcat. Please refer to Apache Tomcat.
  • CVE-2020-8172+
    In Development

    IBM Spectrum Control Node js Vulnerability(6261327)

    Severity
    Urgent5
    Qualys ID
    375444
    Vendor Reference
    https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-ibm-java-sdk-affect-ibm-spectrum-control-cve-2020-2654-cve-2020-2781-cve-2020-2800/
    CVE Reference
    CVE-2020-8172, CVE-2020-8174, CVE-2020-11080, CVE-2020-2654, CVE-2020-2781, CVE-2020-2800
    CVSS Scores
    Base 8.1 / Temporal 7.1
    Description

    IBM Spectrum Protect provides automated, centrally scheduled, policy-managed backup, archive, and space-management capabilities for file servers.

    Node.js is vulnerable to a denial of service or could allow a remote attacker to bypass security restrictions. These vulnerabilities may affect IBM Spectrum Control. This vulnerability affects IBM Spectrum Control (formerly Tivoli Storage Productivity Center).

    Affected Versions:
    IBM Spectrum Protect 5.3.1.0 through 5.3.7.0

    QID Detection Logic(Authenticated):
    It checks for vulnerable version of IBM Spectrum Protect (Tivoli Storage Productivity Center).

    Consequence
    On successful exploitation it allows an unauthenticated attacker to cause high confidentiality and integrity impact.
    Solution
    Vendor has released updated version to address this issue. Refer to ibm6261327 for details.
    Patches
    6261327
  • CVE-2019-19006
    In Development

    FreePBX Incorrect Access Control Vulnerability (SEC-2019-001)

    Severity
    Critical4
    Qualys ID
    730044
    Vendor Reference
    SEC-2019-001
    CVE Reference
    CVE-2019-19006
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    FreePBX is a web-based configuration tool for the open-source Asterisk PBX implemented in PHP.

    FreePBX is vulnerable to Incorrect Access Control

    Affected Versions:
    FreePBX 13 prior to v13.0.197.14
    FreePBX 14 prior to v14.0.13.12
    FreePBX 15 prior to v15.0.16.27
    QID Detection Logic:
    This QID checks for the vulnerable version of FreePBX by sending get request to admin/config.php

    Consequence
    Successful exploitation could compromise confidentiality, integrity and availability

    Solution
    The vendor has released advisories and updates to fix these vulnerabilities. Refer to the following link for details: Security Vulnerability Notice.
    Patches
    SEC-2019-001
  • CVE-2011-4969+
    Recently Published

    HPE System Management Homepage Multiple Vulnerabilities (HPESBMU03593)

    Severity
    Critical4
    Qualys ID
    375442
    Date Published
    April 14, 2021
    Vendor Reference
    c05111017
    CVE Reference
    CVE-2011-4969, CVE-2015-3194, CVE-2015-3195, CVE-2016-0705, CVE-2016-0799, CVE-2016-2842, CVE-2015-3237, CVE-2015-7995, CVE-2015-8035, CVE-2007-6750, CVE-2016-2015
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    The HP System Management Homepage (SMH) is a web-based interface that consolidates the management of ProLiant and Integrity servers running Microsoft Windows or Linux, or HP 9000 and HP Integrity servers running HP-UX 11i.

    Multiple potential security vulnerabilities have been identified in HPE System Management Homepage (SMH) on Windows and Linux.

    Affected Versions:
    HPE System Management Homepage versions prior to 7.5.5

    Consequence
    The vulnerabilities could be exploited remotely resulting in Denial of Service (DoS), remote code execution, or disclosure of sensitive information.

    Solution
    Customers are advised to upgrade to HP SMH v7.5.5 or later to remediate these vulnerabilities.
    Patches
    HPESBMU03593
  • CVE-2021-22505
    Recently Published

    Micro Focus Operations Bridge Manager Remote Code Execution Vulnerability(KM03792443)

    Severity
    Urgent5
    Qualys ID
    375440
    Date Published
    April 12, 2021
    Vendor Reference
    KM03792443
    CVE Reference
    CVE-2021-22505
    CVSS Scores
    Base 10 / Temporal 8.7
    Description
    Operations Bridge Manager (OBM) is the core component of the Operations Bridge Suite. It dynamically and automatically discovers and correlates data, event topology, and metrics.

    Affected Versions:
    Operation Bridge Manager versions 10.0x, 10.1x, 10.6x 2018.05, 2018.11, 2019.05, 2019.11, 2020.05, 2020.10

    QID Detection Logic:
    This QID checks the vulnerable officialrelease of Operation Bridge Manager.

    Consequence
    The vulnerability could be exploited to escalate privileges and execute code under the account of the Operations Agent which is installed on OBM.
    Solution

    Customers are advised to refer to KM03792443 for updates pertaining to this vulnerability.

    Patches
    KM03792443
  • CVE-2021-1386
    Recently Published

    Cisco AMP and Immunet Hijacking Vulnerability (cisco-sa-amp-imm-dll-tu79hvkO)

    Severity
    Critical4
    Qualys ID
    375443
    Date Published
    April 12, 2021
    Vendor Reference
    cisco-sa-amp-imm-dll-tu79hvkO
    CVE Reference
    CVE-2021-1386
    CVSS Scores
    Base / Temporal
    Description
    A vulnerability in the dynamic link library (DLL) loading mechanism in Cisco Advanced Malware Protection (AMP) for Endpoints Windows Connector, ClamAV for Windows, and Immunet could allow an authenticated, local attacker to perform a DLL hijacking attack on an affected Windows system. To exploit this vulnerability, the attacker would need valid credentials on the system.

    Affected Versions:
    Cisco AMP for Endpoints Prior to Version 7.3.15

    Immunet Prior to Version 7.4.0

    QID Detection Logic:
    QID checks for the vulnerable version of Cisco AMP and Immunet

    Note: Currently we are not supporting ClamAV software

    Consequence
    Successful exploit could allow an authenticated, local attacker to perform a DLL hijacking attack on an affected Windows system.

    Solution
    Vendor has released fix to address these vulnerabilities. Refer to cisco-sa-amp-imm-dll-tu79hvkO
    Patches
    cisco-sa-amp-imm-dll-tu79hvkO
  • CVE-2021-26701
    Recently Published

    Microsoft .NET Core Security Update March 2021

    Severity
    Critical4
    Qualys ID
    91756
    Date Published
    April 12, 2021
    Vendor Reference
    CVE-2021-26701
    CVE Reference
    CVE-2021-26701
    CVSS Scores
    Base 9.8 / Temporal 8.5
    Description
    A denial of service vulnerability exists when .NET Core improperly handles web requests.
    This security update is rated Important for supported versions of .NET Core.

    Affected versions:
    Any .NET Core 2.1 , 3.1 or .NET 5.0 application running on .NET Core 2.1.25, 3.1.12 or .NET 5.0.3 or lower respectively.

    QID Detection Logic (Authenticated):
    The qid looks for sub directories under %programfiles%\dotnet\shared\Microsoft.NETCore.App, %programfiles(x86)%\dotnet\shared\Microsoft.NETCore.App and checks for vulnerable versions in .version file on Windows.

    Consequence
    Successful exploitation allows attacker to bypass the security feature and allows set a second cookie with the name being percent encoded.
    Solution
    Customers are advised to refer to CVE-2021-26701 for more details pertaining to this vulnerability.
    Patches
    WIndows CVE-2021-26701
  • Recently Published

    SeaMonkey Multiple Vulnerabilities

    Severity
    Critical4
    Qualys ID
    375430
    Date Published
    April 12, 2021
    Vendor Reference
    SeaMonkey Advisory
    CVSS Scores
    Base 8.8 / Temporal 7.7
    Description
    SeaMonkey is a free and open-source Internet suite.It is a suite of applications that includes a browser and an email client.

    SeaMonkey has released new updates to address multiple vulnerabilities.

    Affected Versions:
    SeaMonkey prior to 2.53.7

    QID Detection Logic (Authenticated)
    This QID checks for vulnerable versions of SeaMonkey.

    Note:Mozilla Security Updates also contains Security fixes for SeaMonkey.

    Consequence
    Successful exploitation could affects on integrity, confidentiality and availability

    Solution
    The vendor has released advisory and updates to fix these vulnerabilities. Refer to SeaMonkey Releases for more information.
    Patches
    SeaMonkey Advisory
  • CVE-2021-21381
    Recently Published

    Amazon Linux Security Advisory for flatpak: ALAS2-2021-1625

    Severity
    Critical4
    Qualys ID
    352263
    Date Published
    April 8, 2021
    Vendor Reference
    ALAS-2021-1625
    CVE Reference
    CVE-2021-21381
    CVSS Scores
    Base 8.2 / Temporal 6.6
    Description
    <DIV> Issue Overview:

    A sandbox escape flaw was found in the way flatpak handled special tokens in ".desktop" files. This flaw allows an attacker to gain access to files that are not ordinarily allowed by the app's permissions. The highest threat from this vulnerability is to confidentiality and integrity. (CVE-2021-21381 )

    </DIV>
    Consequence
    Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
    Solution
    Please refer to Amazon advisory ALAS-2021-1625 for affected packages and patching details, or update with your package manager.
    Patches
    Amazon Linux 2 flatpak (1.0.9-10.amzn2.0.1) on aarch64 ALAS-2021-1625, Amazon Linux 2 flatpak (1.0.9-10.amzn2.0.1) on i686 ALAS-2021-1625, Amazon Linux 2 flatpak (1.0.9-10.amzn2.0.1) on src ALAS-2021-1625, Amazon Linux 2 flatpak (1.0.9-10.amzn2.0.1) on x86_64 ALAS-2021-1625
  • CVE-2021-21381
    Recently Published

    Red Hat Update for flatpak (RHSA-2021:1068)

    Severity
    Critical4
    Qualys ID
    239210
    Date Published
    April 8, 2021
    Vendor Reference
    RHSA-2021:1068
    CVE Reference
    CVE-2021-21381
    CVSS Scores
    Base 8.2 / Temporal 7.1
    Description
    Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux.

    Security Fix(es): flatpak: "file forwarding" feature can be used to gain unprivileged access to files (CVE-2021-21381)

    Affected Products:

    Red Hat Enterprise Linux for x86_64 8 x86_64
    Red Hat Enterprise Linux for IBM z Systems 8 s390x
    Red Hat Enterprise Linux for Power, little endian 8 ppc64le
    Red Hat Enterprise Linux for ARM 64 8 aarch64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:1068 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:1068
  • CVE-2021-20277
    Recently Published

    Red Hat Update for libldb (RHSA-2021:1072)

    Severity
    Critical4
    Qualys ID
    239207
    Date Published
    April 8, 2021
    Vendor Reference
    RHSA-2021:1072
    CVE Reference
    CVE-2021-20277
    CVSS Scores
    Base / Temporal
    Description
    The libldb packages provide an extensible library that implements an LDAP-like API to access remote LDAP servers, or use local TDB databases.

    Security Fix(es): samba: Out of bounds read in AD DC LDAP server (CVE-2021-20277)

    Affected Products:

    Red Hat Enterprise Linux Server 7 x86_64
    Red Hat Enterprise Linux Workstation 7 x86_64
    Red Hat Enterprise Linux Desktop 7 x86_64
    Red Hat Enterprise Linux for IBM z Systems 7 s390x
    Red Hat Enterprise Linux for Power, big endian 7 ppc64
    Red Hat Enterprise Linux for Scientific Computing 7 x86_64
    Red Hat Gluster Storage Server for On-premise 3 for RHEL 7 x86_64
    Red Hat Enterprise Linux for Power, little endian 7 ppc64le

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:1072 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:1072
  • CVE-2021-21381
    Recently Published

    Red Hat Update for flatpak (RHSA-2021:1073)

    Severity
    Critical4
    Qualys ID
    239206
    Date Published
    April 8, 2021
    Vendor Reference
    RHSA-2021:1073
    CVE Reference
    CVE-2021-21381
    CVSS Scores
    Base 8.2 / Temporal 7.1
    Description
    Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux.

    Security Fix(es): flatpak: "file forwarding" feature can be used to gain unprivileged access to files (CVE-2021-21381)

    Affected Products:

    Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64
    Red Hat Enterprise Linux Server - AUS 8.2 x86_64
    Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x
    Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le
    Red Hat Enterprise Linux Server - TUS 8.2 x86_64
    Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64
    Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.2 ppc64le
    Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.2 x86_64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:1073 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:1073
  • CVE-2021-21381
    Recently Published

    Red Hat Update for flatpak (RHSA-2021:1074)

    Severity
    Critical4
    Qualys ID
    239205
    Date Published
    April 8, 2021
    Vendor Reference
    RHSA-2021:1074
    CVE Reference
    CVE-2021-21381
    CVSS Scores
    Base 8.2 / Temporal 7.1
    Description
    Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux.

    Security Fix(es): flatpak: "file forwarding" feature can be used to gain unprivileged access to files (CVE-2021-21381)

    Affected Products:

    Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64
    Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x
    Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le
    Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64
    Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le
    Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:1074 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:1074
  • CVE-2020-0466+
    Recently Published

    Red Hat Update for kernel-rt (RHSA-2021:1081)

    Severity
    Critical4
    Qualys ID
    239204
    Date Published
    April 8, 2021
    Vendor Reference
    RHSA-2021:1081
    CVE Reference
    CVE-2020-0466, CVE-2020-27152, CVE-2020-28374, CVE-2021-3347, CVE-2021-26708, CVE-2021-27363, CVE-2021-27364, CVE-2021-27365
    CVSS Scores
    Base 8.1 / Temporal 7.1
    Description
    The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

    Security Fix(es): kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466) kernel: SCSI target (LIO)
    write to any block on ILO backstore (CVE-2020-28374) kernel: Use after free via PI futex state (CVE-2021-3347) kernel: race conditions caused by wrong locking in net/vmw_vsock/af_vsock.c (CVE-2021-26708) kernel: out-of-bounds read in libiscsi module (CVE-2021-27364) kernel: heap buffer overflow in the iSCSI subsystem (CVE-2021-27365) Kernel: KVM: host stack overflow due to lazy update IOAPIC (CVE-2020-27152) kernel: iscsi: unrestricted access to sessions and handles (CVE-2021-27363)

    Affected Products:

    Red Hat Enterprise Linux for Real Time 8 x86_64
    Red Hat Enterprise Linux for Real Time for NFV 8 x86_64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:1081 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:1081
  • CVE-2020-0466+
    Recently Published

    Red Hat Update for kernel (RHSA-2021:1093)

    Severity
    Critical4
    Qualys ID
    239202
    Date Published
    April 8, 2021
    Vendor Reference
    RHSA-2021:1093
    CVE Reference
    CVE-2020-0466, CVE-2020-27152, CVE-2020-28374, CVE-2021-3347, CVE-2021-26708, CVE-2021-27363, CVE-2021-27364, CVE-2021-27365
    CVSS Scores
    Base 8.1 / Temporal 7.1
    Description
    The kernel packages contain the Linux kernel, the core of any Linux operating system.

    Security Fix(es): kernel: use after free in eventpoll.c may lead to escalation of privilege (CVE-2020-0466) kernel: SCSI target (LIO)
    write to any block on ILO backstore (CVE-2020-28374) kernel: Use after free via PI futex state (CVE-2021-3347) kernel: race conditions caused by wrong locking in net/vmw_vsock/af_vsock.c (CVE-2021-26708) kernel: out-of-bounds read in libiscsi module (CVE-2021-27364) kernel: heap buffer overflow in the iSCSI subsystem (CVE-2021-27365) Kernel: KVM: host stack overflow due to lazy update IOAPIC (CVE-2020-27152) kernel: iscsi: unrestricted access to sessions and handles (CVE-2021-27363)

    Affected Products:

    Red Hat Enterprise Linux for x86_64 8 x86_64
    Red Hat Enterprise Linux for IBM z Systems 8 s390x
    Red Hat Enterprise Linux for Power, little endian 8 ppc64le
    Red Hat Enterprise Linux for ARM 64 8 aarch64
    Red Hat CodeReady Linux Builder for x86_64 8 x86_64
    Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le
    Red Hat CodeReady Linux Builder for ARM 64 8 aarch64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:1093 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:1093
  • CVE-2021-27364+
    Recently Published

    Red Hat Update for kpatch-patch (RHSA-2021:1069)

    Severity
    Critical4
    Qualys ID
    239209
    Date Published
    April 8, 2021
    Vendor Reference
    RHSA-2021:1069
    CVE Reference
    CVE-2021-27364, CVE-2021-27365
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.

    Security Fix(es): kernel: out-of-bounds read in libiscsi module (CVE-2021-27364) kernel: heap buffer overflow in the iSCSI subsystem (CVE-2021-27365)

    Affected Products:

    Red Hat Enterprise Linux Server 7 x86_64
    Red Hat Enterprise Linux for Power, little endian 7 ppc64le

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:1069 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:1069
  • CVE-2021-27363+
    Recently Published

    Red Hat Update for kernel-rt (RHSA-2021:1070)

    Severity
    Critical4
    Qualys ID
    239208
    Date Published
    April 8, 2021
    Vendor Reference
    RHSA-2021:1070
    CVE Reference
    CVE-2021-27363, CVE-2021-27364, CVE-2021-27365
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

    Security Fix(es): kernel: out-of-bounds read in libiscsi module (CVE-2021-27364) kernel: heap buffer overflow in the iSCSI subsystem (CVE-2021-27365) kernel: iscsi: unrestricted access to sessions and handles (CVE-2021-27363)

    Affected Products:

    Red Hat Enterprise Linux for Real Time 7 x86_64
    Red Hat Enterprise Linux for Real Time for NFV 7 x86_64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:1070 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:1070
  • CVE-2021-3449
    Recently Published

    Red Hat Update for openssl (RHSA-2021:1131)

    Severity
    Critical4
    Qualys ID
    239201
    Date Published
    April 8, 2021
    Vendor Reference
    RHSA-2021:1131
    CVE Reference
    CVE-2021-3449
    CVSS Scores
    Base 5.9 / Temporal 5.2
    Description
    OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL)
    and Transport Layer Security (TLS)
    protocols, as well as a full-strength general-purpose cryptography library.

    Security Fix(es): openssl: NULL pointer dereference in signature_algorithms processing (CVE-2021-3449)

    Affected Products:

    Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64
    Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x
    Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le
    Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64
    Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.1 ppc64le
    Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.1 x86_64

    Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

    Consequence
    On successful exploitation, it could allow an attacker to execute code.
    Solution
    Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

    Refer to Red Hat security advisory RHSA-2021:1131 to address this issue and obtain more information.

    Patches
    Red Hat Enterprise Linux RHSA-2021:1131
  • CVE-2021-1137+
    Recently Published

    Cisco SD-WAN vManage Software Vulnerabilities (cisco-sa-vmanage-YuTVWqy)

    Severity
    Urgent5
    Qualys ID
    316921
    Date Published
    April 8, 2021
    Vendor Reference
    cisco-sa-vmanage-YuTVWqy
    CVE Reference
    CVE-2021-1137, CVE-2021-1479, CVE-2021-1480
    CVSS Scores
    Base 7.8 / Temporal 6.8
    Description
    A remote code execution vulnerability exists in a remote management component of Cisco SD-WAN vManage Software
    A Privilege Escalation vulnerability exists in the user management function of Cisco SD-WAN Software
    A Privilege Escalation vulnerability exists in the system file transfer functions of Cisco SD-WAN

    Affected Products
    Cisco SD-WAN vManage Software releases earlier than the following releases:
    From 0.0.0 Prior To 19.2.4
    Version 19.3.x all versions
    From 20.0.0 Prior To 20.3.3
    From 20.4.0 Prior To 20.4.1

    Consequence
    Successful exploitation allows attacker to execute arbitrary code on the underlying operating system with root privileges.
    Solution

    Customers are advised to refer to cisco-sa-vmanage-YuTVWqy for more information.

    Patches
    cisco-sa-vmanage-YuTVWqy
Last updated: