VARIoT IoT vulnerabilities database
| VAR-202106-1082 | CVE-2021-32565 | Apache Traffic Server In HTTP Request Smuggling Vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Invalid values in the Content-Length header sent to Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 7.0.0 to 7.1.12, 8.0.0 to 8.1.1, 9.0.0 to 9.0.1. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4957-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
August 13, 2021 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : trafficserver
CVE ID : CVE-2021-27577 CVE-2021-32566 CVE-2021-32567
CVE-2021-35474 CVE-2021-32565
Several vulnerabilities were discovered in Apache Traffic Server, a
reverse and forward proxy server, which could result in denial of
service, HTTP request smuggling or cache poisoning.
For the stable distribution (buster), these problems have been fixed in
version 8.0.2+ds-1+deb10u5.
We recommend that you upgrade your trafficserver packages.
For the detailed security status of trafficserver please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/trafficserver
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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=4fML
-----END PGP SIGNATURE-----
| VAR-202108-0279 | CVE-2021-22400 | Huawei smartphone OxfordS-AN00A Input confirmation vulnerability |
CVSS V2: 4.3 CVSS V3: 5.5 Severity: MEDIUM |
Some Huawei Smartphones has an insufficient input validation vulnerability due to the lack of parameter validation. An attacker may trick a user into installing a malicious APP. The app can modify specific parameters, causing the system to crash. Affected product include:OxfordS-AN00A 10.0.1.10(C00E10R1P1),10.0.1.105(C00E103R3P3),10.0.1.115(C00E110R3P3),10.0.1.123(C00E121R3P3),10.0.1.135(C00E130R3P3),10.0.1.135(C00E130R4P1),10.0.1.152(C00E140R4P1),10.0.1.160(C00E160R4P1),10.0.1.167(C00E166R4P1),10.0.1.173(C00E172R5P1),10.0.1.178(C00E175R5P1) and 10.1.0.202(C00E79R5P1). Huawei smartphone OxfordS-AN00A Is vulnerable to input validation.Denial of service (DoS) It may be put into a state. Huawei OxfordS-AN00A is a smart phone of China's Huawei (Huawei) company. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202108-1025 | CVE-2021-26098 | Pillow Buffer error vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
An instance of small space of random values in the RPC API of FortiSandbox before 4.0.0 may allow an attacker in possession of a few information pieces about the state of the device to possibly predict valid session IDs. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202108-1893 | CVE-2021-37163 | HMI3 Control Panel trust management issue vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
An insecure permissions issue was discovered in HMI3 Control Panel in Swisslog Healthcare Nexus operated by released versions of software before Nexus Software 7.2.5.7. The device has two user accounts with passwords that are hardcoded. Swisslog Healthcare Nexus Panel is a medical device of Swisslog Healthcare. No detailed vulnerability details are currently provided. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202108-0999 | CVE-2021-34532 | ASP.NET Core and Microsoft Visual Studio Vulnerability to disclose information in |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
ASP.NET Core and Visual Studio Information Disclosure Vulnerability. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: .NET Core 3.1 on RHEL 7 security and bugfix update
Advisory ID: RHSA-2021:3143-01
Product: .NET Core on Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2021:3143
Issue date: 2021-08-11
CVE Names: CVE-2021-26423 CVE-2021-34485 CVE-2021-34532
=====================================================================
1. Summary:
An update for .NET Core 3.1 is now available for .NET Core on Red Hat
Enterprise Linux.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
.NET Core on Red Hat Enterprise Linux Server (v. 7) - x86_64
.NET Core on Red Hat Enterprise Linux Workstation (v. 7) - x86_64
3. Description:
.NET is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address security vulnerabilities are now
available. The updated versions are .NET SDK 3.1.118 and .NET Runtime
3.1.18.
Security Fix(es):
* dotnet: ASP.NET Core WebSocket frame processing DoS (CVE-2021-26423)
* dotnet: Dump file created world-readable (CVE-2021-34485)
* dotnet: ASP.NET Core JWT token logging (CVE-2021-34532)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1990286 - CVE-2021-34485 dotnet: Dump file created world-readable
1990295 - CVE-2021-26423 dotnet: ASP.NET Core WebSocket frame processing DoS
1990300 - CVE-2021-34532 dotnet: ASP.NET Core JWT token logging
6. Package List:
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
rh-dotnet31-dotnet-3.1.118-1.el7_9.src.rpm
x86_64:
rh-dotnet31-aspnetcore-runtime-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-aspnetcore-targeting-pack-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-3.1.118-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-apphost-pack-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-debuginfo-3.1.118-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-host-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-hostfxr-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-runtime-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-sdk-3.1-3.1.118-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-targeting-pack-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-templates-3.1-3.1.118-1.el7_9.x86_64.rpm
rh-dotnet31-netstandard-targeting-pack-2.1-3.1.118-1.el7_9.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Server (v. 7):
Source:
rh-dotnet31-dotnet-3.1.118-1.el7_9.src.rpm
x86_64:
rh-dotnet31-aspnetcore-runtime-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-aspnetcore-targeting-pack-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-3.1.118-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-apphost-pack-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-debuginfo-3.1.118-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-host-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-hostfxr-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-runtime-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-sdk-3.1-3.1.118-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-targeting-pack-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-templates-3.1-3.1.118-1.el7_9.x86_64.rpm
rh-dotnet31-netstandard-targeting-pack-2.1-3.1.118-1.el7_9.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Workstation (v. 7):
Source:
rh-dotnet31-dotnet-3.1.118-1.el7_9.src.rpm
x86_64:
rh-dotnet31-aspnetcore-runtime-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-aspnetcore-targeting-pack-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-3.1.118-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-apphost-pack-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-debuginfo-3.1.118-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-host-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-hostfxr-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-runtime-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-sdk-3.1-3.1.118-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-targeting-pack-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-templates-3.1-3.1.118-1.el7_9.x86_64.rpm
rh-dotnet31-netstandard-targeting-pack-2.1-3.1.118-1.el7_9.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2021-26423
https://access.redhat.com/security/cve/CVE-2021-34485
https://access.redhat.com/security/cve/CVE-2021-34532
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=JpAp
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
| VAR-202108-1006 | CVE-2021-34485 | plural Microsoft Vulnerability to disclose information in products |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
.NET Core and Visual Studio Information Disclosure Vulnerability. plural Microsoft The product contains a vulnerability that exposes information.Information may be disclosed. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Low: .NET Core 2.1 on Red Hat Enterprise Linux security and bugfix update
Advisory ID: RHSA-2021:3144-01
Product: .NET Core on Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2021:3144
Issue date: 2021-08-11
CVE Names: CVE-2021-34485
=====================================================================
1. Summary:
An update for .NET Core 2.1 is now available for .NET Core on Red Hat
Enterprise Linux.
Red Hat Product Security has rated this update as having a security impact
of Low. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
.NET Core on Red Hat Enterprise Linux Server (v. 7) - x86_64
.NET Core on Red Hat Enterprise Linux Workstation (v. 7) - x86_64
3. Description:
.NET Core is a managed-software framework. It implements a subset of the
.NET framework APIs and several new APIs, and it includes a CLR
implementation. The updated versions are .NET Core SDK 2.1.525 and .NET Core
Runtime 2.1.29.
Security Fix(es):
* dotnet: Dump file created world-readable (CVE-2021-34485)
Default inclusions for applications built with .NET Core have been updated
to reference the newest versions and their security fixes.
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1990286 - CVE-2021-34485 dotnet: Dump file created world-readable
6. Package List:
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
rh-dotnet21-2.1-28.el7_9.src.rpm
rh-dotnet21-dotnet-2.1.525-1.el7_9.src.rpm
x86_64:
rh-dotnet21-2.1-28.el7_9.x86_64.rpm
rh-dotnet21-dotnet-2.1.525-1.el7_9.x86_64.rpm
rh-dotnet21-dotnet-debuginfo-2.1.525-1.el7_9.x86_64.rpm
rh-dotnet21-dotnet-host-2.1.29-1.el7_9.x86_64.rpm
rh-dotnet21-dotnet-runtime-2.1-2.1.29-1.el7_9.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1-2.1.525-1.el7_9.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1.5xx-2.1.525-1.el7_9.x86_64.rpm
rh-dotnet21-runtime-2.1-28.el7_9.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Server (v. 7):
Source:
rh-dotnet21-2.1-28.el7_9.src.rpm
rh-dotnet21-dotnet-2.1.525-1.el7_9.src.rpm
x86_64:
rh-dotnet21-2.1-28.el7_9.x86_64.rpm
rh-dotnet21-dotnet-2.1.525-1.el7_9.x86_64.rpm
rh-dotnet21-dotnet-debuginfo-2.1.525-1.el7_9.x86_64.rpm
rh-dotnet21-dotnet-host-2.1.29-1.el7_9.x86_64.rpm
rh-dotnet21-dotnet-runtime-2.1-2.1.29-1.el7_9.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1-2.1.525-1.el7_9.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1.5xx-2.1.525-1.el7_9.x86_64.rpm
rh-dotnet21-runtime-2.1-28.el7_9.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Workstation (v. 7):
Source:
rh-dotnet21-2.1-28.el7_9.src.rpm
rh-dotnet21-dotnet-2.1.525-1.el7_9.src.rpm
x86_64:
rh-dotnet21-2.1-28.el7_9.x86_64.rpm
rh-dotnet21-dotnet-2.1.525-1.el7_9.x86_64.rpm
rh-dotnet21-dotnet-debuginfo-2.1.525-1.el7_9.x86_64.rpm
rh-dotnet21-dotnet-host-2.1.29-1.el7_9.x86_64.rpm
rh-dotnet21-dotnet-runtime-2.1-2.1.29-1.el7_9.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1-2.1.525-1.el7_9.x86_64.rpm
rh-dotnet21-dotnet-sdk-2.1.5xx-2.1.525-1.el7_9.x86_64.rpm
rh-dotnet21-runtime-2.1-28.el7_9.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2021-34485
https://access.redhat.com/security/updates/classification/#low
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=rDt/
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
| VAR-202108-0797 | CVE-2021-32991 | DIAEnergie cross-site request forgery vulnerability |
CVSS V2: 4.3 CVSS V3: 4.3 Severity: MEDIUM |
Delta Electronics DIAEnergie Version 1.7.5 and prior is vulnerable to cross-site request forgery, which may allow an attacker to cause a user to carry out an action unintentionally. DIAEnergie is an industrial energy management system launched by Delta Electronics.
DIAEnergie 1.7.5 and earlier versions have cross-site request forgery vulnerabilities. Attackers can use this vulnerability to perform unauthorized operations. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202108-1361 | CVE-2021-39375 | Philips Healthcare Tasy Electronic Medical Record In SQL Injection vulnerability |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
Philips Healthcare Tasy Electronic Medical Record (EMR) 3.06 allows SQL injection via the WAdvancedFilter/getDimensionItemsByCode FilterValue parameter. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202108-1895 | CVE-2021-37165 | Nexus Control Panel buffer overflow vulnerability (CNVD-2021-62179) |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A buffer overflow issue was discovered in HMI3 Control Panel in Swisslog Healthcare Nexus Panel operated by released versions of software before Nexus Software 7.2.5.7. When a message is sent to the HMI TCP socket, it is forwarded to the hmiProcessMsg function through the pendingQ, and may lead to remote code execution. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202108-1026 | CVE-2021-26423 | plural Microsoft Service operation interruption in the product (DoS) Vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
.NET Core and Visual Studio Denial of Service Vulnerability. plural Microsoft The product interferes with service operation (DoS) A vulnerability exists.Denial of service (DoS) It may be put into a state. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: .NET Core 3.1 on RHEL 7 security and bugfix update
Advisory ID: RHSA-2021:3143-01
Product: .NET Core on Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2021:3143
Issue date: 2021-08-11
CVE Names: CVE-2021-26423 CVE-2021-34485 CVE-2021-34532
=====================================================================
1. Summary:
An update for .NET Core 3.1 is now available for .NET Core on Red Hat
Enterprise Linux.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
.NET Core on Red Hat Enterprise Linux Server (v. 7) - x86_64
.NET Core on Red Hat Enterprise Linux Workstation (v. 7) - x86_64
3. Description:
.NET is a managed-software framework. It implements a subset of the .NET
framework APIs and several new APIs, and it includes a CLR implementation.
New versions of .NET that address security vulnerabilities are now
available. The updated versions are .NET SDK 3.1.118 and .NET Runtime
3.1.18.
Security Fix(es):
* dotnet: ASP.NET Core WebSocket frame processing DoS (CVE-2021-26423)
* dotnet: Dump file created world-readable (CVE-2021-34485)
* dotnet: ASP.NET Core JWT token logging (CVE-2021-34532)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1990286 - CVE-2021-34485 dotnet: Dump file created world-readable
1990295 - CVE-2021-26423 dotnet: ASP.NET Core WebSocket frame processing DoS
1990300 - CVE-2021-34532 dotnet: ASP.NET Core JWT token logging
6. Package List:
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
rh-dotnet31-dotnet-3.1.118-1.el7_9.src.rpm
x86_64:
rh-dotnet31-aspnetcore-runtime-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-aspnetcore-targeting-pack-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-3.1.118-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-apphost-pack-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-debuginfo-3.1.118-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-host-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-hostfxr-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-runtime-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-sdk-3.1-3.1.118-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-targeting-pack-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-templates-3.1-3.1.118-1.el7_9.x86_64.rpm
rh-dotnet31-netstandard-targeting-pack-2.1-3.1.118-1.el7_9.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Server (v. 7):
Source:
rh-dotnet31-dotnet-3.1.118-1.el7_9.src.rpm
x86_64:
rh-dotnet31-aspnetcore-runtime-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-aspnetcore-targeting-pack-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-3.1.118-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-apphost-pack-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-debuginfo-3.1.118-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-host-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-hostfxr-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-runtime-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-sdk-3.1-3.1.118-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-targeting-pack-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-templates-3.1-3.1.118-1.el7_9.x86_64.rpm
rh-dotnet31-netstandard-targeting-pack-2.1-3.1.118-1.el7_9.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Workstation (v. 7):
Source:
rh-dotnet31-dotnet-3.1.118-1.el7_9.src.rpm
x86_64:
rh-dotnet31-aspnetcore-runtime-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-aspnetcore-targeting-pack-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-3.1.118-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-apphost-pack-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-debuginfo-3.1.118-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-host-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-hostfxr-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-runtime-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-sdk-3.1-3.1.118-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-targeting-pack-3.1-3.1.18-1.el7_9.x86_64.rpm
rh-dotnet31-dotnet-templates-3.1-3.1.118-1.el7_9.x86_64.rpm
rh-dotnet31-netstandard-targeting-pack-2.1-3.1.118-1.el7_9.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2021-26423
https://access.redhat.com/security/cve/CVE-2021-34485
https://access.redhat.com/security/cve/CVE-2021-34532
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=JpAp
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
| VAR-202107-1010 | CVE-2021-34527 | Microsoft Windows Print Spooler allows for RCE via AddPrinterDriverEx() |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
<p>A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p>
<p>UPDATE July 7, 2021: The security update for Windows Server 2012, Windows Server 2016 and Windows 10, Version 1607 have been released. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. If you are unable to install these updates, see the FAQ and Workaround sections in this CVE for information on how to help protect your system from this vulnerability.</p>
<p>In addition to installing the updates, in order to secure your system, you must confirm that the following registry settings are set to 0 (zero) or are not defined (<strong>Note</strong>: These registry keys do not exist by default, and therefore are already at the secure setting.), also that your Group Policy setting are correct (see FAQ):</p>
<ul>
<li>HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint</li>
<li>NoWarningNoElevationOnInstall = 0 (DWORD) or not defined (default setting)</li>
<li>UpdatePromptSettings = 0 (DWORD) or not defined (default setting)</li>
</ul>
<p><strong>Having NoWarningNoElevationOnInstall set to 1 makes your system vulnerable by design.</strong></p>
<p>UPDATE July 6, 2021: Microsoft has completed the investigation and has released security updates to address this vulnerability. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. If you are unable to install these updates, see the FAQ and Workaround sections in this CVE for information on how to help protect your system from this vulnerability. See also <a href="https://support.microsoft.com/topic/31b91c02-05bc-4ada-a7ea-183b129578a7">KB5005010: Restricting installation of new printer drivers after applying the July 6, 2021 updates</a>.</p>
<p>Note that the security updates released on and after July 6, 2021 contain protections for CVE-2021-1675 and the additional remote code execution exploit in the Windows Print Spooler service known as “PrintNightmare”, documented in CVE-2021-34527.</p>
. Print Spooler The service is a service for realizing the waiting for printing in printing. RpcAddPrinterDriverEx() The function is used by the above services to install the printer driver. Parameters DRIVER_CONTAINER Objects and parameters dwFileCopyFlags Controls the printer driver to be installed and how to copy files. If you are an authenticated user RpcAddPrinterDriverEx() The function can be executed. Therefore, an attacker who has obtained the authentication information can specify and install the driver on the remote server.By an authenticated remote third party SYSTEM Arbitrary code can be executed with privileges. Windows Print Spooler is a printer spooler for Windows.
Microsoft Windows Print Spooler Components 存在安全漏洞,攻击者可以通过该漏洞绕过PfcAddPrinterDriver的安全验证,并在打印服务器中安装恶意的驱动程序。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809 for ARM64-based Systems,Windows Server 2019,Windows Server 2019 (Server Core installation),Windows 10 Version 1909 for 32-bit Systems,Windows 10 Version 1909 for x64-based Systems,Windows 10 Version 1909 for ARM64-based Systems,Windows Server, version 1909 (Server Core installation),Windows 10 Version 21H1 for x64-based Systems,Windows 10 Version 21H1 for ARM64-based Systems,Windows 10 Version 21H1 for 32-bit Systems,Windows 10 Version 2004 for 32-bit Systems,Windows 10 Version 2004 for ARM64-based Systems,Windows 10 Version 2004 for x64-based Systems,Windows Server, version 2004 (Server Core installation),Windows 10 Version 20H2 for x64-based Systems,Windows 10 Version 20H2 for 32-bit Systems,Windows 10 Version 20H2 for ARM64-based Systems,Windows Server, version 20H2 (Server Core Installation),Windows 10 for 32-bit Systems,Windows 10 for x64-based Systems,Windows 10 Version 1607 for 32-bit Systems,Windows 10 Version 1607 for x64-based Systems,Windows Server 2016,Windows Server 2016 (Server Core installation),Windows 7 for 32-bit Systems Service Pack 1,Windows 7 for x64-based Systems Service Pack 1,Windows 8.1 for 32-bit systems,Windows 8.1 for x64-based systems,Windows RT 8.1,Windows Server 2008 for 32-bit Systems Service Pack 2,Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation),Windows Server 2008 for x64-based Systems Service Pack 2,Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation),Windows Server 2008 R2 for x64-based Systems Service Pack 1,Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation),Windows Server 2012,Windows Server 2012 (Server Core installation),Windows Server 2012 R2,Windows Server 2012 R2 (Server Core installation). Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202108-1890 | CVE-2021-37160 | Nexus Control Panel code issue vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A firmware validation issue was discovered in HMI3 Control Panel in Swisslog Healthcare Nexus Panel operated by released versions of software before Nexus Software 7.2.5.7. There is no firmware validation (e.g., cryptographic signature validation) during a File Upload for a firmware update. No detailed vulnerability details are currently provided. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202108-1556 | CVE-2021-37166 | Nexus Control Panel authorization issue vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
A buffer overflow issue leading to denial of service was discovered in HMI3 Control Panel in Swisslog Healthcare Nexus Panel operated by released versions of software before Nexus Software 7.2.5.7. When HMI3 starts up, it binds a local service to a TCP port on all interfaces of the device, and takes extensive time for the GUI to connect to the TCP socket, allowing the connection to be hijacked by an external attacker. Swisslog Healthcare Nexus Panel is a medical device of Swisslog Healthcare. The vulnerability stems from an improper method used to bind local services to ports on the device interface. Attackers can use this vulnerability to hijack the connection. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202108-1362 | CVE-2021-39376 | Philips Healthcare Tasy Electronic Medical Record In SQL Injection vulnerability |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
Philips Healthcare Tasy Electronic Medical Record (EMR) 3.06 allows SQL injection via the CorCad_F2/executaConsultaEspecifico IE_CORPO_ASSIST or CD_USUARIO_CONVENIO parameter. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202104-0768 | CVE-2021-20090 | Arcadyan-based routers and modems vulnerable to authentication bypass |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A path traversal vulnerability in the web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 could allow unauthenticated remote attackers to bypass authentication. A path traversal vulnerability exists in numerous routers manufactured by multiple vendors using Arcadyan based software. This vulnerability allows an unauthenticated user access to sensitive information and allows for the alteration of the router configuration.CVE-2021-20090 AffectedCVE-2021-20090 Affected. Arcadyan Directory traversal vulnerabilities in many routers that use software CWE-22 , CVE-2021-20090 ) Exists.A remote third party may evade authentication and view sensitive information, including valid access tokens. As a result, the router settings can be tampered with. Buffalo WSR-2533DHPL2 and WSR-2533DHP3 are routers of Japan Buffalo Company.
Buffalo WSR-2533DHPL2 and WSR-2533DHP3 have path traversal vulnerabilities. The vulnerabilities are caused by input validation errors when processing the directory traversal sequence in the web interface. Attackers can use the vulnerabilities to bypass authentication. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202108-1051 | CVE-2021-31401 | NicheStack embedded TCP/IP has vulnerabilities |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
An issue was discovered in tcp_rcv() in nptcp.c in HCC embedded InterNiche 4.0.1. The TCP header processing code doesn't sanitize the value of the IP total length field (header length + data length). With a crafted IP packet, an integer overflow occurs whenever the value of the IP data length is calculated by subtracting the length of the header from the total length of the IP packet. HCC Embedded's software called InterNiche stack (NicheStack) and NicheLite, which provides TCP/IP networking capability to embedded systems, is impacted by multiple vulnerabilities. The Forescout and JFrog researchers who discovered this set of vulnerabilities have identified these as "INFRA:HALT"CVE-2020-25767 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-02-19
CVE-2020-25926 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-03-02
CVE-2020-25927 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-02-19
CVE-2020-25928 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-02-19
CVE-2020-35683 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_ipv4 module version 1.5.
A fix for this will be available from HCC on 2021-03-02
CVE-2020-35684 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-03-16
CVE-2020-35685 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-03-16
CVE-2021-27565 Affected
Vendor Statement:
The infinite loop entered in case this occurs is really for the user to implement when integrating the software. But whatever their implementation this code should not be structured like this.
CVE-2021-31226 Affected
Vendor Statement:
This is an issue in all versions of Nichestack <4.3,
This issue is fixed in Nichestack v4.3 with in_httpsvr module v1.7.
CVE-2021-31227 Affected
Vendor Statement:
This is an issue in all versions of Nichestack <4.3,
This issue is fixed in Nichestack v4.3 with in_httpsvr module v1.7.
CVE-2021-31228 Affected
Vendor Statement:
This is an issue in all versions of Nichestack <4.3,
This issue is fixed in Nichestack v4.3 with in_httpsvr module v1.7.
CVE-2021-31400 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-02-26
CVE-2021-31401 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-03-16
CVE-2021-36762 Unknown
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is fixed in in_tftp module version 1.2CVE-2020-25767 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-02-19
CVE-2020-25926 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-03-02
CVE-2020-25927 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-02-19
CVE-2020-25928 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_common module version 1.15.
A fix for this will be available from HCC on 2021-02-19
CVE-2020-35683 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_ipv4 module version 1.5.
A fix for this will be available from HCC on 2021-03-02
CVE-2020-35684 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-03-16
CVE-2020-35685 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-03-16
CVE-2021-27565 Affected
Vendor Statement:
The infinite loop entered in case this occurs is really for the user to implement when integrating the software. But whatever their implementation this code should not be structured like this.
CVE-2021-31226 Affected
Vendor Statement:
This is an issue in all versions of Nichestack <4.3,
This issue is fixed in Nichestack v4.3 with in_httpsvr module v1.7.
CVE-2021-31227 Affected
Vendor Statement:
This is an issue in all versions of Nichestack <4.3,
This issue is fixed in Nichestack v4.3 with in_httpsvr module v1.7.
CVE-2021-31228 Affected
Vendor Statement:
This is an issue in all versions of Nichestack <4.3,
This issue is fixed in Nichestack v4.3 with in_httpsvr module v1.7.
CVE-2021-31400 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-02-26
CVE-2021-31401 Affected
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is present in the in_tcp module version 1.9.
A fix for this will be available from HCC on 2021-03-16
CVE-2021-36762 Unknown
Vendor Statement:
This issue is present in all versions of Nichestack prior to 4.3.
The global version number for Nichestack is now frozen at 4.3 and we now maintain version numbers for each module.
The issue is fixed in in_tftp module version 1.2. HCC Embedded InterNiche is a newsletter software.
The HCC Embedded InterNiche stack has an input verification error vulnerability. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Siemens Security Advisory
| VAR-202108-0329 | CVE-2021-1610 | Cisco Small Business RV340 and Cisco Small Business command injection vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
Multiple vulnerabilities in the web-based management interface of the Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an attacker to do the following: Execute arbitrary code Cause a denial of service (DoS) condition Execute arbitrary commands For more information about these vulnerabilities, see the Details section of this advisory. (DoS) It may be in a state. Cisco Small Business RV340 and Cisco Small Business are both products of Cisco (Cisco). Cisco Small Business RV340 is a router. A hardware device that connects two or more networks and acts as a gateway between the networks. Cisco Small Business is a switch.
Cisco Small Business RV340 and Cisco Small Business have command injection vulnerabilities. The vulnerability stems from the program's failure to properly verify the HTTP request. Remote attackers without authentication can use this vulnerability to execute arbitrary commands through specially crafted HTTP requests. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202108-0575 | CVE-2021-24014 | Pillow Buffer error vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Multiple instances of improper neutralization of input during web page generation vulnerabilities in FortiSandbox before 4.0.0 may allow an unauthenticated attacker to perform an XSS attack via specifically crafted request parameters. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
| VAR-202106-0973 | CVE-2021-27577 | Apache Traffic Server Environmental Issues Vulnerability (CNVD-2021-70101) |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Incorrect handling of url fragment vulnerability of Apache Traffic Server allows an attacker to poison the cache. This issue affects Apache Traffic Server 7.0.0 to 7.1.12, 8.0.0 to 8.1.1, 9.0.0 to 9.0.1. Apache Traffic Server (ATS) is a set of scalable HTTP proxy and cache servers of the Apache Foundation in the United States. An attacker can use this vulnerability to affect the cache of the target service. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4957-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
August 13, 2021 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : trafficserver
CVE ID : CVE-2021-27577 CVE-2021-32566 CVE-2021-32567
CVE-2021-35474 CVE-2021-32565
Several vulnerabilities were discovered in Apache Traffic Server, a
reverse and forward proxy server, which could result in denial of
service, HTTP request smuggling or cache poisoning.
For the stable distribution (buster), these problems have been fixed in
version 8.0.2+ds-1+deb10u5.
We recommend that you upgrade your trafficserver packages.
For the detailed security status of trafficserver please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/trafficserver
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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=4fML
-----END PGP SIGNATURE-----
| VAR-202108-0568 | CVE-2021-1522 | Pillow Buffer error vulnerability |
CVSS V2: 4.0 CVSS V3: 4.3 Severity: MEDIUM |
A vulnerability in the change password API of Cisco Connected Mobile Experiences (CMX) could allow an authenticated, remote attacker to alter their own password to a value that does not comply with the strong authentication requirements that are configured on an affected device. This vulnerability exists because a password policy check is incomplete at the time a password is changed at server side using the API. An attacker could exploit this vulnerability by sending a specially crafted API request to the affected device. A successful exploit could allow the attacker to change their own password to a value that does not comply with the configured strong authentication requirements. Pillow is a Python-based image processing library.
There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Cisco Connected Mobile Experiences is an interconnected mobile experience of Cisco (Cisco)