Important: bind security update
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security....
7.5CVSS
7.2AI Score
0.001EPSS
An update is available for bind. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list The Berkeley Internet Name Domain (BIND) is an implementation of the Domain...
7.5CVSS
6.8AI Score
0.001EPSS
FreeIPA - XML Entity Injection
Access to external entities when parsing XML documents can lead to XML external entity (XXE) attacks. This flaw allows a remote attacker to potentially retrieve the content of arbitrary files by sending specially crafted HTTP...
7.5CVSS
7.4AI Score
0.035EPSS
CentOS: Security Advisory for bind (CESA-2023:4152)
The remote host is missing an update for...
7.5CVSS
8.1AI Score
0.001EPSS
CentOS Errata and Security Advisory CESA-2023:4152 The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying...
7.5CVSS
6.9AI Score
0.001EPSS
(RHSA-2023:4332) Important: bind security update
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security....
6.9AI Score
0.001EPSS
bd-journal.com Cross Site Scripting vulnerability OBB-3552668
Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified the website operator about its existence. Technical details of the vulnerability are currently...
6.1AI Score
Bashfuscator - A Fully Configurable And Extendable Bash Obfuscation Framework
Documentation What is Bashfuscator? Bashfuscator is a modular and extendable Bash obfuscation framework written in Python 3. It provides numerous different ways of making Bash one-liners or scripts much more difficult to understand. It accomplishes this by generating convoluted, randomized Bash...
7.1AI Score
A vulnerability in the DHCPv6 feature of the Cisco Nexus 9000 Series Fabric Switches in Application-Centric Infrastructure (ACI) Mode could allow an unauthenticated, remote attacker to cause the device to run low on system memory, which could result in a Denial of Service (DoS) condition on an...
7.5CVSS
6.8AI Score
0.001EPSS
[SECURITY] Fedora 38 Update: grpc-1.48.4-8.fc38
gRPC is a modern open source high performance RPC framework that can run in a ny environment. It can efficiently connect services in and across data centers with pluggable support for load balancing, tracing, health checking and authentication. It is also applicable in last mile of distributed...
5.3CVSS
5.6AI Score
0.001EPSS
[SECURITY] Fedora 37 Update: grpc-1.48.4-8.fc37
gRPC is a modern open source high performance RPC framework that can run in a ny environment. It can efficiently connect services in and across data centers with pluggable support for load balancing, tracing, health checking and authentication. It is also applicable in last mile of distributed...
5.3CVSS
5.6AI Score
0.001EPSS
(RHSA-2023:4154) Important: bind security update
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security....
7.5AI Score
0.001EPSS
(RHSA-2023:4153) Important: bind security update
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security....
7.5AI Score
0.001EPSS
(RHSA-2023:4152) Important: bind security update
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security....
6.9AI Score
0.001EPSS
(RHSA-2023:4102) Important: bind security update
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security....
6.9AI Score
0.001EPSS
(RHSA-2023:4101) Important: bind security and bug fix update
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security....
6.9AI Score
0.001EPSS
(RHSA-2023:4100) Important: bind9.16 security update
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security....
6.9AI Score
0.001EPSS
(RHSA-2023:4099) Important: bind security update
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security....
7.5AI Score
0.001EPSS
Important: bind9.16 security update
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security....
7.5CVSS
7.2AI Score
0.001EPSS
Important: bind security update
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security....
7.5CVSS
6.9AI Score
0.001EPSS
Important: bind security update
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security....
7.5CVSS
7.7AI Score
0.001EPSS
Important: bind security update
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security....
7.5CVSS
7.2AI Score
0.001EPSS
Important: bind9.16 security update
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security....
7.5CVSS
7.7AI Score
0.001EPSS
Important: bind security update
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security....
7.5CVSS
7.2AI Score
0.001EPSS
Fedora: Security Advisory for cups (FEDORA-2023-9dbd5b28d4)
The remote host is missing an update for...
7.1CVSS
7.2AI Score
0.0004EPSS
[SECURITY] Fedora 37 Update: cups-2.4.6-1.fc37
CUPS printing system provides a portable printing layer for UNIX=EF=BF=BD=EF=BF=BD operating systems. It has been developed by Apple Inc. to promote a standard printing solution for all UNIX vendors and users. CUPS provides the System V and Berkeley command-line...
7.1CVSS
6.3AI Score
0.0004EPSS
The data flowing between the PCU and its modules is insecure. A threat actor with physical access could potentially read or modify data by attaching a specially crafted device while an infusion is...
6.1CVSS
0.001EPSS
A malicious file could be uploaded into a System Manager User Import Function resulting in a hijacked...
8.2CVSS
0.001EPSS
Alaris Systems Manager does not perform input validation during the Device Import...
6.9CVSS
6.7AI Score
0.0004EPSS
An insecure connection between Systems Manager and CQI Reporter application could expose infusion data to an...
3.5CVSS
0.0004EPSS
An insecure connection between Systems Manager and CQI Reporter application could expose infusion data to an...
3.5CVSS
4.2AI Score
0.0004EPSS
The data flowing between the PCU and its modules is insecure. A threat actor with physical access could potentially read or modify data by attaching a specially crafted device while an infusion is...
6.1CVSS
6AI Score
0.001EPSS
A malicious file could be uploaded into a System Manager User Import Function resulting in a hijacked...
8.2CVSS
8AI Score
0.001EPSS
A GRE dataset file within Systems Manager can be tampered with and distributed to...
6.7CVSS
6.5AI Score
0.0004EPSS
A GRE dataset file within Systems Manager can be tampered with and distributed to...
6.7CVSS
0.0004EPSS
Alaris Systems Manager does not perform input validation during the Device Import...
6.9CVSS
0.0004EPSS
The data flowing between the PCU and its modules is insecure. A threat actor with physical access could potentially read or modify data by attaching a specially crafted device while an infusion is...
6.1CVSS
6.7AI Score
0.001EPSS
An insecure connection between Systems Manager and CQI Reporter application could expose infusion data to an...
3.5CVSS
5.2AI Score
0.0004EPSS
A malicious file could be uploaded into a System Manager User Import Function resulting in a hijacked...
8.2CVSS
8.6AI Score
0.001EPSS
Alaris Systems Manager does not perform input validation during the Device Import...
6.9CVSS
7.4AI Score
0.0004EPSS
A GRE dataset file within Systems Manager can be tampered with and distributed to...
6.7CVSS
7.1AI Score
0.0004EPSS
The configuration from the PCU can be modified without authentication using physical connection to the...
6.8CVSS
0.001EPSS
The configuration from the PCU can be modified without authentication using physical connection to the...
6.8CVSS
6.5AI Score
0.001EPSS
The configuration from the PCU can be modified without authentication using physical connection to the...
6.8CVSS
7.2AI Score
0.001EPSS
CVE-2023-30565 CQI Data Sniffing
An insecure connection between Systems Manager and CQI Reporter application could expose infusion data to an...
3.5CVSS
4.4AI Score
0.0004EPSS
CVE-2023-30564 Stored Cross-Site Scripting on Device Import Functionality
Alaris Systems Manager does not perform input validation during the Device Import...
6.9CVSS
6.9AI Score
0.0004EPSS
CVE-2023-30563 Stored Cross-Site Scripting on User Import Functionality
A malicious file could be uploaded into a System Manager User Import Function resulting in a hijacked...
8.2CVSS
8.3AI Score
0.001EPSS
CVE-2023-30562 Lack of Dataset Integrity Checking
A GRE dataset file within Systems Manager can be tampered with and distributed to...
3CVSS
6.7AI Score
0.0004EPSS
CVE-2023-30561 Lack of Cryptographic Security of IUI Bus
The data flowing between the PCU and its modules is insecure. A threat actor with physical access could potentially read or modify data by attaching a specially crafted device while an infusion is...
6.1CVSS
6.2AI Score
0.001EPSS
CVE-2023-30560 PCU Configuration Lacks Authentication
The configuration from the PCU can be modified without authentication using physical connection to the...
6.8CVSS
6.8AI Score
0.001EPSS