Security Advisories

  • 2023-006: Critical Security Flaw in Jira Service Management Server and Data Center

    Friday, February 03, 2023 07:20:00 PM CEST

    A critical security flaw has been discovered in Jira Service Management Server and Data Center that can be exploited by an attacker to impersonate another user and gain unauthorized access to instances. The vulnerability is tracked as CVE-2023-22501 with a CVSS score of 9.4.

  • 2023-005: Critical Code Injection Vulnerability in QNAP Devices

    Tuesday, January 31, 2023 05:55:00 PM CEST

    On January 30th, 2023, QNAP published an advisory related to a critical vulnerability, identified as CVE-2022-27596, allowing remote attackers to inject malicious code on QNAP NAS devices.

  • 2023-004: Critical Vulnerability in Several ManageEngine Products

    Monday, January 30, 2023 10:15:00 AM CEST

    On January 18th, ManageEngine released updates to several ManageEngine OnPremise products. The potentially vulnerable products use outdated versions of the open-source library Apache Santuario (XML Security for Java). Products must have enabled Single-Sign-On (SSO) using the Security Assertion Markup Language (SAML) to be vulnerable. For some products, the SSO must be active, while for others, it is sufficient that SSO was active once. As a result, the vulnerability allows an unauthenticated adversary to execute arbitrary code. Additionally, a Proof-of-Concept exploit is available.

  • 2023-003: Critical Vulnerability in VMware vRealize Log Insight

    Thursday, January 26, 2023 11:55:00 AM CEST

    On January 24, 2022, VMWare released a new security advisory revealing multiple vulnerabilities in VMware vRealize Log Insight. There are two critical vulnerabilities including a directory traversal vulnerability (CVE-2022-31706) and a broken access control vulnerability (CVE-2022-31704). Both of them have the CVSS score of 9.8 out of 10.
    It is highly recommended applying the last version.

  • 2023-002: Multiple critical Vulnerabilities in Git

    Thursday, January 19, 2023 10:50:00 PM CEST

    During a code audit, X41 discovered several vulnerabilities in the version control system git. On January 17, the git project resolved the two most critical security vulnerabilities (CVE-2022-23521 and CVE-2022-41903) that could allow the remote execution of arbitrary code. GitHub and GitLab have also issued updates for their products, including the latest version of git. A third vulnerability (CVE-2022-41953) affects the Windows version of the Git GUI software and could also lead to the execution of arbitrary code. CERT-EU highly recommend upgrading to the latest version of git. In addition, if you are running on-premise GitHub or GitLab servers, we recommend updating them.

  • 2023-001: Zero-day and Critical Vulnerabilities in Microsoft Windows

    Wednesday, January 11, 2023 05:50:00 PM CEST

    On January 10, 2023, on their first Patch Tuesday of 2023, Microsoft fixed an actively exploited zero-day Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability and a total of 98 flaws. Eleven of them were classified as critical by Microsoft as they allow remote code execution, bypass security features, or elevate privileges. It is highly recommended applying the fixes as soon as possible.

We got cookies

We only use cookies that are necessary for the technical functioning of our website. Find out more on here.