Title: Oracle VirtualBox Guest Additions Arbitrary Write Privilege Escalation
Advisory ID: KL-001-2014-001
Publication Date: 07.15.2014
Publication URL:
https://www.korelogic.com/Resources/Advisories/KL-001-2014-001.txt
1. Vulnerability Details
Affected Vendor: Oracle
Affected Product: VirtualB
Title: Microsoft XP SP3 BthPan.sys Arbitrary Write Privilege Escalation
Advisory ID: KL-001-2014-002
Publication Date: 2014-07-18
Publication URL:
https://www.korelogic.com/Resources/Advisories/KL-001-2014-002.txt
1. Vulnerability Details
Affected Vendor: Microsoft
Affected Product: B
Title: Microsoft XP SP3 MQAC.sys Arbitrary Write Privilege Escalation
Advisory ID: KL-001-2014-003
Publication Date: 2014.07.18
Publication URL:
https://www.korelogic.com/Resources/Advisories/KL-001-2014-003.txt
1. Vulnerability Details
Affected Vendor: Microsoft
Affected Product: MQ
Title: VMWare vmx86.sys Arbitrary Kernel Read
Advisory ID: KL-001-2014-004
Publication Date: 2014.11.04
Publication URL:
https://www.korelogic.com/Resources/Advisories/KL-001-2014-004.txt
1. Vulnerability Details
Affected Vendor: VMWare
Affected Product: Workstation
Affected Vers
KL-001-2015-001 : Microsoft Windows Server 2003 SP2 Arbitrary Write Privilege
Escalation
Title: Microsoft Windows Server 2003 SP2 Arbitrary Write Privilege Escalation
Advisory ID: KL-001-2015-001
Publication Date: 2015.01.28
Publication URL:
https://www.korelogic.com/Resources/Advisories/KL-001-
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
KL-001-2015-003 : SiS Windows VGA Display Manager Multiple Privilege
Escalation
Title: SiS Windows VGA Display Manager Multiple Privilege Escalation
Advisory ID: KL-001-2015-003
Publication Date: 2015.09.01
Publication URL:
https://www.korelogic.com
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
KL-001-2015-004 : XGI Windows VGA Display Manager Arbitrary Write
Privilege Escalation
Title: XGI Windows VGA Display Manager Arbitrary Write Privilege Escalation
Advisory ID: KL-001-2015-004
Publication Date: 2015.09.01
Publication URL:
https://www
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
KL-001-2015-005 : VBox Satellite Express Arbitrary Write Privilege Escalation
Title: VBox Satellite Express Arbitrary Write Privilege Escalation
Advisory ID: KL-001-2015-005
Publication Date: 2015.09.16
Publication URL:
https://www.korelogic.com/Re
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
KL-001-2015-006 : Linksys EA6100 Wireless Router Authentication Bypass
Title: Linksys EA6100 Wireless Router Authentication Bypass
Advisory ID: KL-001-2015-006
Publication Date: 2015.12.04
Publication URL:
https://www.korelogic.com/Resources/Adviso
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
KL-001-2015-008 : Dell Pre-Boot Authentication Driver Uncontrolled Write to
Arbitrary Address
Title: Dell Pre-Boot Authentication Driver Uncontrolled Write to Arbitrary
Address
Advisory ID: KL-001-2015-008
Publication Date: 2015.12.18
Publication
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
KL-001-2015-007 : Seagate GoFlex Satellite Remote Telnet Default Password
Title: Seagate GoFlex Satellite Remote Telnet Default Password
Advisory ID: KL-001-2015-007
Publication Date: 2015.12.18
Publication URL:
https://www.korelogic.com/Resources/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
KL-001-2016-001 : Arris DG1670A Cable Modem Remote Command Execution
Title: Arris DG1670A Cable Modem Remote Command Execution
Advisory ID: KL-001-2016-001
Publication Date: 2016.02.12
Publication URL:
https://www.korelogic.com/Resources/Advisories
KL-001-2018-008 : HPE VAN SDN Unauthenticated Remote Root Vulnerability
Title: HPE VAN SDN Unauthenticated Remote Root Vulnerability
Advisory ID: KL-001-2018-008
Publication Date: 2018.06.25
Publication URL: https://korelogic.com/Resources/Advisories/KL-001-2018-008.txt
1. Vulnerability Details
KL-001-2018-009 : Dell OpenManage Network Manager Multiple Vulnerabilities
Title: Dell OpenManage Network Manager Multiple Vulnerabilities
Advisory ID: KL-001-2018-009
Publication Date: 2018.11.05
Publication URL:
https://www.korelogic.com/Resources/Advisories/KL-001-2018-009.txt
1. Vulnerabili
KL-001-2016-002 : Ubiquiti Administration Portal CSRF to Remote Command
Execution
Title: Ubiquiti Administration Portal CSRF to Remote Command Execution
Advisory ID: KL-001-2016-002
Publication Date: 2016.06.28
Publication URL:
https://www.korelogic.com/Resources/Advisories/KL-001-2016-002.txt
KL-001-2016-003 : SQLite Tempdir Selection Vulnerability
Title: SQLite Tempdir Selection Vulnerability
Advisory ID: KL-001-2016-003
Publication Date: 2016.07.01
Publication URL:
https://www.korelogic.com/Resources/Advisories/KL-001-2016-003.txt
1. Vulnerability Details
Affected Vendor: SQ
KL-001-2016-004 : Cisco Firepower Threat Management Console Authenticated Denial
of Service
Title: Cisco Firepower Threat Management Console Authenticated Denial of Service
Advisory ID: KL-001-2016-004
Publication Date: 2016.10.05
Publication URL:
https://www.korelogic.com/Resources/Advisories/KL
KL-001-2016-005 : Cisco Firepower Threat Management Console Hard-coded MySQL
Credentials
Title: Cisco Firepower Threat Management Console Hard-coded MySQL Credentials
Advisory ID: KL-001-2016-005
Publication Date: 2016.10.05
Publication URL:
https://www.korelogic.com/Resources/Advisories/KL-001-2
KL-001-2016-008 : Sophos Web Appliance Privilege Escalation
Title: Sophos Web Appliance Privilege Escalation
Advisory ID: KL-001-2016-008
Publication Date: 2016.11.03
Publication URL:
https://www.korelogic.com/Resources/Advisories/KL-001-2016-008.txt
1. Vulnerability Details
Affected Vend
KL-001-2016-009 : Sophos Web Appliance Remote Code Execution
Title: Sophos Web Appliance Remote Code Execution
Advisory ID: KL-001-2016-009
Publication Date: 2016.11.03
Publication URL:
https://www.korelogic.com/Resources/Advisories/KL-001-2016-009.txt
1. Vulnerability Details
Affected Ve
KL-001-2017-001 : Trendmicro InterScan Arbitrary File Write
Title: Trendmicro InterScan Arbitrary File Write
Advisory ID: KL-001-2017-001
Publication Date: 2017.02.15
Publication URL:
https://www.korelogic.com/Resources/Advisories/KL-001-2017-001.txt
1. Vulnerability Details
Affected Vend
KL-001-2017-003 : Trendmicro InterScan Remote Root Access Vulnerability
Title: Trendmicro InterScan Remote Root Access Vulnerability
Advisory ID: KL-001-2017-003
Publication Date: 2017.02.15
Publication URL:
https://www.korelogic.com/Resources/Advisories/KL-001-2017-003.txt
1. Vulnerability Det
KL-001-2017-005 : Solarwinds LEM Privilege Escalation via Controlled Sudo Path
Title: Solarwinds LEM Privilege Escalation via Controlled Sudo Path
Advisory ID: KL-001-2017-005
Publication Date: 2017.04.24
Publication URL:
https://www.korelogic.com/Resources/Advisories/KL-001-2017-005.txt
1. Vul
KL-001-2017-006 : Solarwinds LEM Privilege Escalation via Sudo Script Abuse
Title: Solarwinds LEM Privilege Escalation via Sudo Script Abuse
Advisory ID: KL-001-2017-006
Publication Date: 2017.04.24
Publication URL:
https://www.korelogic.com/Resources/Advisories/KL-001-2017-006.txt
1. Vulnerabi
KL-001-2017-007 : Solarwinds LEM Management Shell Escape via Command Injection
Title: Solarwinds LEM Management Shell Escape via Command Injection
Advisory ID: KL-001-2017-007
Publication Date: 2017.04.24
Publication URL:
https://www.korelogic.com/Resources/Advisories/KL-001-2017-007.txt
1. Vul
KL-001-2017-008 : Solarwinds LEM Management Shell Arbitrary File Read
Title: Solarwinds LEM Management Shell Arbitrary File Read
Advisory ID: KL-001-2017-008
Publication Date: 2017.04.24
Publication URL:
https://www.korelogic.com/Resources/Advisories/KL-001-2017-008.txt
1. Vulnerability Details
KL-001-2017-009 : Solarwinds LEM Database Listener with Hardcoded Credentials
Title: Solarwinds LEM Database Listener with Hardcoded Credentials
Advisory ID: KL-001-2017-009
Publication Date: 2017.04.24
Publication URL:
https://www.korelogic.com/Resources/Advisories/KL-001-2017-009.txt
1. Vulne
KL-001-2017-011 : Barracuda WAF Internal Development Credential Disclosure
Title: Barracuda WAF Internal Development Credential Disclosure
Advisory ID: KL-001-2017-011
Publication Date: 2017.07.06
Publication URL:
https://www.korelogic.com/Resources/Advisories/KL-001-2017-011.txt
1. Vulnerabili
KL-001-2017-012 : Barracuda WAF Grub Password Complexity
Title: Barracuda WAF Grub Password Complexity
Advisory ID: KL-001-2017-012
Publication Date: 2017.07.06
Publication URL:
https://www.korelogic.com/Resources/Advisories/KL-001-2017-012.txt
1. Vulnerability Details
Affected Vendor: Ba
KL-001-2017-015 : Solarwinds LEM Hardcoded Credentials
Title: Solarwinds LEM Hardcoded Credentials
Advisory ID: KL-001-2017-015
Publication Date: 2017.07.06
Publication URL:
https://www.korelogic.com/Resources/Advisories/KL-001-2017-015.txt
1. Vulnerability Details
Affected Vendor: Solarw
KL-001-2017-014 : Barracuda WAF Support Tunnel Hijack
Title: Barracuda WAF Support Tunnel Hijack
Advisory ID: KL-001-2017-014
Publication Date: 2017.07.06
Publication URL:
https://www.korelogic.com/Resources/Advisories/KL-001-2017-014.txt
1. Vulnerability Details
Affected Vendor: Barracud
KL-001-2017-017 : Infoblox NetMRI Administration Shell Escape and Privilege
Escalation
Title: Infoblox NetMRI Administration Shell Escape and Privilege Escalation
Advisory ID: KL-001-2017-017
Publication Date: 2017.10.24
Publication URL:
https://www.korelogic.com/Resources/Advisories/KL-001-2017
KL-001-2017-020 : Sophos UTM 9 loginuser Privilege Escalation via Insecure
Directory Permissions
Title: Sophos UTM 9 loginuser Privilege Escalation via Insecure Directory
Permissions
Advisory ID: KL-001-2017-020
Publication Date: 2017.10.24
Publication URL:
https://www.korelogic.com/Resources/A
KL-001-2017-022 : Splunk Local Privilege Escalation
Title: Splunk Local Privilege Escalation
Advisory ID: KL-001-2017-022
Publication Date: 2017.11.03
Publication URL:
https://www.korelogic.com/Resources/Advisories/KL-001-2017-022.txt
1. Vulnerability Details
Affected Vendor: Splunk
KL-001-2018-001 : Sophos Web Gateway Persistent Cross Site Scripting
Vulnerability
Title: Sophos Web Gateway Persistent Cross Site Scripting Vulnerability
Advisory ID: KL-001-2018-001
Publication Date: 2018.01.26
Publication URL:
https://www.korelogic.com/Resources/Advisories/KL-001-2018-001.txt
KL-001-2018-002 : NetEx HyperIP Authentication Bypass
Title: NetEx HyperIP Authentication Bypass
Advisory ID: KL-001-2018-002
Publication Date: 2018.02.08
Publication URL:
https://www.korelogic.com/Resources/Advisories/KL-001-2018-002.txt
1. Vulnerability Details
Affected Vendor: NetEx
KL-001-2018-006 : Trend Micro IMSVA Management Portal Authentication Bypass
Title: Trend Micro IMSVA Management Portal Authentication Bypass
Advisory ID: KL-001-2018-006
Publication Date: 2018.02.08
Publication URL:
https://www.korelogic.com/Resources/Advisories/KL-001-2018-006.txt
1. Vulnerabi
KL-001-2018-003 : NetEx HyperIP Post-Auth Command Execution
Title: NetEx HyperIP Post-Auth Command Execution
Advisory ID: KL-001-2018-003
Publication Date: 2018.02.08
Publication URL:
https://www.korelogic.com/Resources/Advisories/KL-001-2018-003.txt
1. Vulnerability Details
Affected Vend
KL-001-2018-004 : NetEx HyperIP Privilege Escalation Vulnerability
Title: NetEx HyperIP Privilege Escalation Vulnerability
Advisory ID: KL-001-2018-004
Publication Date: 2018.02.08
Publication URL:
https://www.korelogic.com/Resources/Advisories/KL-001-2018-004.txt
1. Vulnerability Details
KL-001-2018-005 : NetEx HyperIP Local File Inclusion Vulnerability
Title: NetEx HyperIP Local File Inclusion Vulnerability
Advisory ID: KL-001-2018-005
Publication Date: 2018.02.08
Publication URL:
https://www.korelogic.com/Resources/Advisories/KL-001-2018-005.txt
1. Vulnerability Details
KL-001-2018-007 : Sophos UTM 9 loginuser Privilege Escalation via confd Service
Title: Sophos UTM 9 loginuser Privilege Escalation via confd Service
Advisory ID: KL-001-2018-007
Publication Date: 2018.03.02
Publication URL:
https://www.korelogic.com/Resources/Advisories/KL-001-2018-007.txt
1. V
KL-001-2018-007 : Sophos UTM 9 loginuser Privilege Escalation via confd Service
Title: Sophos UTM 9 loginuser Privilege Escalation via confd Service
Advisory ID: KL-001-2018-007
Publication Date: 2018.03.02
Publication URL:
https://www.korelogic.com/Resources/Advisories/KL-001-2018-007.txt
1. V
42 matches
Mail list logo