CVE-2021-29242
https://notcve.org/view.php?id=CVE-2021-29242
CODESYS Control Runtime system before 3.5.17.0 has improper input validation. Attackers can send crafted communication packets to change the router's addressing scheme and may re-route, add, remove or change low level communication packages. El sistema CODESYS Control Runtime versiones anteriores a 3.5.17.0, presenta una comprobación inapropiada de entrada. Los atacantes pueden enviar paquetes de comunicación diseñados para cambiar el esquema de direccionamiento del enrutador y pueden redireccionar, agregar, eliminar o cambiar paquetes de comunicación de bajo nivel. • https://customers.codesys.com/index.php https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=14640&token=623b6fceb0579ef0f7505e29beefa5b3f8ac7873&download= https://www.codesys.com/security/security-reports.html • CWE-20: Improper Input Validation •
CVE-2021-29241
https://notcve.org/view.php?id=CVE-2021-29241
CODESYS Gateway 3 before 3.5.16.70 has a NULL pointer dereference that may result in a denial of service (DoS). CODESYS Gateway versiones 3 anteriores a 3.5.16.70 tiene una derivación de puntero NULL que puede resultar en una denegación de servicio (DoS) • https://customers.codesys.com/index.php https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=14637&token=8dbd75ae7553ae3be25e22f741db783b31e14799&download= https://www.codesys.com/security/security-reports.html • CWE-476: NULL Pointer Dereference •
CVE-2020-12713 – CipherMail Community Virtual Appliance 4.6.2 Code Execution
https://notcve.org/view.php?id=CVE-2020-12713
An issue was discovered in CipherMail Community Gateway and Professional/Enterprise Gateway 1.0.1 through 4.7.1-0 and CipherMail Webmail Messenger 1.1.1 through 3.1.1-0. Attackers with administrative access to the web interface have multiple options to escalate their privileges to the Unix root account. Se detectó un problema en CipherMail Community Gateway y Professional/Enterprise Gateway versiones 1.0.1 hasta 4.7.1-0 y CipherMail Webmail Messenger versiones 1.1.1 hasta 3.1.1-0. Los atacantes con acceso administrativo a la interfaz web presentan múltiples opciones para escalar sus privilegios a la cuenta root de Unix CipherMail Community Virtual Appliance version 4.6.2 suffers from remote command execution and file injection vulnerabilities. • http://packetstormsecurity.com/files/158001/CipherMail-Community-Virtual-Appliance-4.6.2-Code-Execution.html https://www.ciphermail.com/blog/ciphermail-cve-2020-12713_2020-12714.html https://www.ciphermail.com/gateway.html https://www.ciphermail.com/news.html https://www.ciphermail.com/secure-webmail.html https://www.coresecurity.com/core-labs/advisories/ciphermail-multiple-vulnerabilities • CWE-269: Improper Privilege Management •
CVE-2020-12714 – CipherMail Community Virtual Appliance 4.6.2 Code Execution
https://notcve.org/view.php?id=CVE-2020-12714
An issue was discovered in CipherMail Community Gateway Virtual Appliances and Professional/Enterprise Gateway Virtual Appliances versions 1.0.1 through 4.7.1-0 and CipherMail Webmail Messenger Virtual Appliances 1.1.1 through 3.1.1-0. A Diffie-Hellman parameter of insufficient size could allow man-in-the-middle compromise of communications between CipherMail products and external SMTP clients. Se detectó un problema en CipherMail Community Gateway Virtual Appliances y Professional/Enterprise Gateway Virtual Appliances versiones 1.0.1 hasta 4.7.1-0 y CipherMail Webmail Messenger Virtual Appliances versiones 1.1.1 hasta 3.1.1-0. Un parámetro Diffie-Hellman de tamaño insuficiente podría permitir un compromiso de tipo man-in-the-middle de las comunicaciones entre los productos CipherMail y clientes SMTP externos CipherMail Community Virtual Appliance version 4.6.2 suffers from remote command execution and file injection vulnerabilities. • https://packetstormsecurity.com/files/158001/CipherMail-Community-Virtual-Appliance-4.6.2-Code-Execution.html https://www.ciphermail.com/blog/ciphermail-cve-2020-12713_2020-12714.html https://www.ciphermail.com/gateway.html https://www.ciphermail.com/news.html https://www.ciphermail.com/secure-webmail.html https://www.coresecurity.com/core-labs/advisories/ciphermail-multiple-vulnerabilities • CWE-326: Inadequate Encryption Strength •
CVE-2020-13414
https://notcve.org/view.php?id=CVE-2020-13414
An issue was discovered in Aviatrix Controller before 5.4.1204. It contains credentials unused by the software. Se detectó un problema en Aviatrix Controller versiones anteriores a 5.4.1204. Contiene credenciales no utilizadas por el software. • https://docs.aviatrix.com/HowTos/security_bulletin_article.html#clean-up-old-code https://www.criticalstart.com/multiple-vulnerabilities-discovered-in-aviatrix • CWE-798: Use of Hard-coded Credentials •