Todas as vulnerabilidades

  • 19-036 (July 2, 2019)
     Data de publicação:  03 julho 2019
    * indicates a new version of an existing rule

    Deep Packet Inspection Rules:

    DHCP Client
    1009476 - Microsoft Windows DHCP Client Remote Code Execution Vulnerability (CVE-2019-0547)


    HP Intelligent Management Center (IMC)
    1009799 - HPE Intelligent Management Center 'AccessMgrServlet ClassName' Insecure Deserialization (CVE-2019-11945)


    Web Application Common
    1000608* - Generic SQL Injection Prevention


    Web Client Common
    1009829 - Microsoft Windows Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-0908)
    1009770 - OpenOffice Information Disclosure Vulnerability (CVE-2018-10583)
    1009762 - mIRC Remote Command Execution Vulnerability (CVE-2019-6453)


    Web Client Internet Explorer/Edge
    1009655* - Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability (CVE-2019-0752)


    Web Client Mozilla Firefox
    1009828 - Mozilla Firefox Type Confusion Vulnerability (CVE-2019-11707)


    Web Client VNC
    1009494 - LibVNC LibVNCClient CoRRE Heap-based Buffer Overflow Vulnerability (CVE-2018-20020)


    Web Server Common
    1000763* - URI Length Restriction


    Web Server Miscellaneous
    1008104* - Apache ActiveMQ Multiple Remote Code Execution Vulnerabilities (CVE-2016-3088)


    Web Server RealVNC
    1004146* - RealVNC 'ClientCutText' Message Memory Corruption


    Integrity Monitoring Rules:

    There are no new or updated Integrity Monitoring Rules in this Security Update.


    Log Inspection Rules:

    There are no new or updated Log Inspection Rules in this Security Update.
  • Quest InTrust ArDoc.dll ActiveX Control Remote File Creation
     Schweregrad: :    
     Data de publicação:  03 outubro 2018
    An insecure method in the ARDoc ActiveX Control (ARDoc.dll) can be exploited to overwrite arbitrary files with the contents of exported documents via a call to the "SaveToFile()" method with a specially crafted "bstrFileName" argument. Successful exploitation of this vulnerability allows execution of arbitrary code.
  • Quest InTrust 'AnnotateX.dll' Uninitialized Pointer Code Execution Vulnerability
     Schweregrad: :    
     Data de publicação:  11 maio 2018
    Quest InTrust is prone to a remote code-execution vulnerability because the application fails to perform adequate boundary checks on user-supplied data. Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application (typically Internet Explorer) using the ActiveX control. Failed exploit attempts will likely result in denial-of-service conditions.
  • PowerDNS Authoritative Server Long Qname Denial Of Service Vulnerability (CVE-2016-5426)
     Schweregrad: :    
     Data de publicação:  11 janeiro 2017
    A denial-of-service vulnerability exists in PowerDNS Authoritative Server. The vulnerability is due to an error in processing queries with overly long qnames. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted DNS packet to the target application. A successful attack could lead to excessive resources being consumed, resulting in a denial of service condition.
  • NTP Oversized UDP Packet Denial Of Service Vulnerability (CVE-2016-9312)
     Schweregrad: :    
     Data de publicação:  11 janeiro 2017
    A denial of service vulnerability exists in the Windows port of Network Time Foundation's NTP Daemon. An attacker can exploit this vulnerability by sending a large UDP packet to the target server. Successful exploitation results in denial of service conditions on the target server.
  • NTP Daemon CRYPTO_NAK Denial Of Service Vulnerability (CVE-2016-4957)
     Schweregrad: :    
     Data de publicação:  11 janeiro 2017
    A denial of service vulnerability exists in the Network Time Protocol daemon (NTPD). The vulnerability is due to a null pointer dereference when handling crypto-NAK packets. A remote attacker can exploit this vulnerability by sending an unsolicited crypto-NAK packet to the target service. Successful exploitation may result in denial-of-service conditions.
  • Nginx DNS UDP Packet Handler Crash Denial Of Service Vulnerability (CVE-2016-0742)
     Schweregrad: :    
     Data de publicação:  11 janeiro 2017
    A denial-of-service vulnerability has been reported in NGINX. The vulnerability is due to nginx dereferencing an invalid pointer while processing certain DNS packets. A remote attacker could exploit this vulnerability by forging UDP packets as if from a trusted DNS server. Successful exploitation attempt may result in denial-of-service condition.
  • A denial of service vulnerability exists in the way the Local Security Authority Subsystem Service (LSASS) handles authentication requests. An attacker who successfully exploited the vulnerability could cause a denial of service on the target system's LSASS service, which triggers an automatic reboot of the system.
  • Microsoft Office Memory Corruption Vulnerability (CVE-2017-0003)
     Schweregrad: :    
     Data de publicação:  11 janeiro 2017
    A memory corruption vulnerability exists in Microsoft Office. An attacker who successfully exploited this vulnerability could use a specially crafted file to perform remote code execution in the security context of the current user.
  • Openssl RSA Downgrade Vulnerability (CVE-2015-0204)
     Schweregrad: :    
     Data de publicação:  11 janeiro 2017
    The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role.