Page 3 of 18 results (0.004 seconds)

CVSS: 6.5EPSS: 0%CPEs: 21EXPL: 0

An authenticated remote attacker can cause a null pointer dereference in the CmpSettings component of the affected CODESYS products which leads to a crash. Un atacante remoto autenticado puede causar una desreferencia de puntero null en el componente CmpSettings de los productos CODESYS afectados, lo que conlleva a un bloqueo • https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17093&token=15cd8424832ea10dcd4873a409a09a539ee381ca&download= • CWE-476: NULL Pointer Dereference •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

An uncontrolled resource consumption vulnerability exists in Citrix ADC <13.0-83.27, <12.1-63.22 and 11.1-65.23 that could allow an attacker with access to NSIP or SNIP with management interface access to cause a temporary disruption of the Management GUI, Nitro API, and RPC communication. Se presenta una vulnerabilidad de consumo no controlado de recursos en Citrix ADC versiones anteriores a 13.0-83.27, versiones anteriores a 12.1-63.22 y 11.1-65.23 que podría permitir a un atacante con acceso a NSIP o SNIP con acceso a la interfaz de administración causar una interrupción temporal de la GUI de administración, la API Nitro y la comunicación RPC • https://support.citrix.com/article/CTX330728 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

A unauthenticated denial of service vulnerability exists in Citrix ADC <13.0-83.27, <12.1-63.22 and 11.1-65.23 when configured as a VPN (Gateway) or AAA virtual server could allow an attacker to cause a temporary disruption of the Management GUI, Nitro API, and RPC communication. Se presenta una vulnerabilidad de denegación de servicio no autenticada en Citrix ADC versiones anteriores a 13.0-83.27, versiones anteriores a 12.1-63.22 y 11.1-65.23 que, cuando es configurado como servidor virtual VPN (Gateway) o AAA, podría permitir a un atacante causar una interrupción temporal de la GUI de administración, la API Nitro y la comunicación RPC • https://support.citrix.com/article/CTX330728 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 9.0EPSS: 1%CPEs: 2EXPL: 2

An issue was discovered in CipherMail Community Gateway and Professional/Enterprise Gateway 1.0.1 through 4.7.1-0 and CipherMail Webmail Messenger 1.1.1 through 3.1.1-0. Attackers with administrative access to the web interface have multiple options to escalate their privileges to the Unix root account. Se detectó un problema en CipherMail Community Gateway y Professional/Enterprise Gateway versiones 1.0.1 hasta 4.7.1-0 y CipherMail Webmail Messenger versiones 1.1.1 hasta 3.1.1-0. Los atacantes con acceso administrativo a la interfaz web presentan múltiples opciones para escalar sus privilegios a la cuenta root de Unix CipherMail Community Virtual Appliance version 4.6.2 suffers from remote command execution and file injection vulnerabilities. • http://packetstormsecurity.com/files/158001/CipherMail-Community-Virtual-Appliance-4.6.2-Code-Execution.html https://www.ciphermail.com/blog/ciphermail-cve-2020-12713_2020-12714.html https://www.ciphermail.com/gateway.html https://www.ciphermail.com/news.html https://www.ciphermail.com/secure-webmail.html https://www.coresecurity.com/core-labs/advisories/ciphermail-multiple-vulnerabilities • CWE-269: Improper Privilege Management •

CVSS: 5.9EPSS: 0%CPEs: 2EXPL: 2

An issue was discovered in CipherMail Community Gateway Virtual Appliances and Professional/Enterprise Gateway Virtual Appliances versions 1.0.1 through 4.7.1-0 and CipherMail Webmail Messenger Virtual Appliances 1.1.1 through 3.1.1-0. A Diffie-Hellman parameter of insufficient size could allow man-in-the-middle compromise of communications between CipherMail products and external SMTP clients. Se detectó un problema en CipherMail Community Gateway Virtual Appliances y Professional/Enterprise Gateway Virtual Appliances versiones 1.0.1 hasta 4.7.1-0 y CipherMail Webmail Messenger Virtual Appliances versiones 1.1.1 hasta 3.1.1-0. Un parámetro Diffie-Hellman de tamaño insuficiente podría permitir un compromiso de tipo man-in-the-middle de las comunicaciones entre los productos CipherMail y clientes SMTP externos CipherMail Community Virtual Appliance version 4.6.2 suffers from remote command execution and file injection vulnerabilities. • https://packetstormsecurity.com/files/158001/CipherMail-Community-Virtual-Appliance-4.6.2-Code-Execution.html https://www.ciphermail.com/blog/ciphermail-cve-2020-12713_2020-12714.html https://www.ciphermail.com/gateway.html https://www.ciphermail.com/news.html https://www.ciphermail.com/secure-webmail.html https://www.coresecurity.com/core-labs/advisories/ciphermail-multiple-vulnerabilities • CWE-326: Inadequate Encryption Strength •