The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 29240 Open redirect via user-controlled query parameter. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 29240Ĭleartext transmission of sensitive information. This affects Goverlan Reach Console before 10.5.1, Reach Server before 3.70.1, and Reach Client Agents before 10.1.11.Ĭleartext transmission of sensitive information. This allows remote attackers to bypass firewall blocking rules for a time period of up to 30 seconds.
#Phoenix viewer spawn a platform update
In certain Goverlan products, the Windows Firewall is temporarily turned off upon a Goverlan agent update operation. On Linux and UNIX, it can lead to a denial of service by specifying the /dev/zero filename. On Windows, this can lead to capture of credentials over SMB. Paymentrequest.py in Electrum before 4.2.2 allows a file:// URL in the r parameter of a payment request (e.g., within QR code data).
In KNIME Analytics Platform below 4.6.0, the Windows installer sets improper filesystem permissions. Typically, after the BSOD, the victim SMBv3 server will reboot. For most systems, this attack requires authentication, except in the special case of Windows Domain Controllers, where unauthenticated users can always open named pipes as long as they can establish an SMB session. By sending a malformed FileNormalizedNameInformation SMBv3 request over a named pipe, an attacker can cause a Blue Screen of Death (BSOD) crash of the Windows kernel.
#Phoenix viewer spawn a platform Patch
Microsoft Windows SMBv3 suffers from a null pointer dereference in versions of Windows prior to the April, 2022 patch set. When a user opens manipulated Windows Bitmap (.bmp, 2d.x3d) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application. This allows attackers to execute arbitrary commands via a crafted string. The function that calls the diff tool in Diffy 3.4.1 does not properly handle double quotes in a filename when run in a windows environment. NOTE: as of, the release corrects this vulnerability in a new installation, but not in an upgrade installation. When installing, Microsoft SQL Express 2019 installs by default with an SQL instance running as SYSTEM with BUILTIN\Users as sysadmin, thus enabling unprivileged Windows users to execute commands locally as NT AUTHORITY\SYSTEM, aka NX-I674 (sub-issue 2). An issue was discovered in TitanFTP (aka Titan FTP) NextGen before.