Category Archives: Advisories

ZDI-24-1181: Axis Communications Autodesk Plugin Exposure of Sensitive Information Authentication Bypass Vulnerability

Read Time:10 Second

This vulnerability allows remote attackers to bypass authentication on affected services of Axis Communications Autodesk Plugin. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.6.

Read More

ZDI-24-1180: Apple macOS AMDRadeonX6000MTLDriver KTX Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability

Read Time:16 Second

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. Interaction with the Metal framework is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-27857.

Read More

ZDI-24-1179: Apple macOS AMDRadeonX6000MTLDriver KTX Parsing Out-Of-Bounds Read Information Disclosure Vulnerability

Read Time:16 Second

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple macOS. Interaction with the Metal framework is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The ZDI has assigned a CVSS rating of 3.3. The following CVEs are assigned: CVE-2024-27857.

Read More

OXAS-ADV-2024-0003: OX App Suite Security Advisory

Read Time:23 Second

Posted by Martin Heiland via Fulldisclosure on Aug 22

Dear subscribers,

We’re sharing our latest advisory with you and like to thank everyone who contributed in finding and solving those
vulnerabilities. Feel free to join our bug bounty programs for OX App Suite, Dovecot and PowerDNS at YesWeHack.

This advisory has also been published at
https://documentation.open-xchange.com/appsuite/security/advisories/html/2024/oxas-adv-2024-0003.html.

Yours sincerely,
Martin Heiland, Open-Xchange…

Read More

OXAS-ADV-2024-0004: OX App Suite Security Advisory

Read Time:23 Second

Posted by Martin Heiland via Fulldisclosure on Aug 22

Dear subscribers,

We’re sharing our latest advisory with you and like to thank everyone who contributed in finding and solving those
vulnerabilities. Feel free to join our bug bounty programs for OX App Suite, Dovecot and PowerDNS at YesWeHack.

This advisory has also been published at
https://documentation.open-xchange.com/appsuite/security/advisories/html/2024/oxas-adv-2024-0004.html.

Yours sincerely,
Martin Heiland, Open-Xchange GmbH…

Read More

[SYSS-2024-042] DiCal-RED – Exposure of Sensitive Information to an Unauthorized Actor

Read Time:17 Second

Posted by Sebastian Hamann via Fulldisclosure on Aug 22

Advisory ID: SYSS-2024-042
Product: DiCal-RED
Manufacturer: Swissphone Wireless AG
Affected Version(s): Unknown
Tested Version(s): 4009
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Risk Level: Medium
Solution Status: Open
Manufacturer Notification: 2024-04-16
Solution Date: None
Public Disclosure:…

Read More

[SYSS-2024-041] DiCal-RED – Use of Unmaintained Third Party Components

Read Time:18 Second

Posted by Sebastian Hamann via Fulldisclosure on Aug 22

Advisory ID: SYSS-2024-041
Product: DiCal-RED
Manufacturer: Swissphone Wireless AG
Affected Version(s): Unknown
Tested Version(s): 4009
Vulnerability Type: Use of Unmaintained Third Party Components (CWE-1104)
Risk Level: High
Solution Status: Open
Manufacturer Notification: 2024-04-16
Solution Date: None
Public Disclosure: 2024-08-20…

Read More

[SYSS-2024-040] DiCal-RED – Improper Authentication

Read Time:17 Second

Posted by Sebastian Hamann via Fulldisclosure on Aug 22

Advisory ID: SYSS-2024-040
Product: DiCal-RED
Manufacturer: Swissphone Wireless AG
Affected Version(s): Unknown
Tested Version(s): 4009
Vulnerability Type: Improper Authentication (CWE-287)
Risk Level: High
Solution Status: Open
Manufacturer Notification: 2024-04-16
Solution Date: None
Public Disclosure: 2024-08-20
CVE Reference:…

Read More

[SYSS-2024-039] DiCal-RED – Path Traversal

Read Time:17 Second

Posted by Sebastian Hamann via Fulldisclosure on Aug 22

Advisory ID: SYSS-2024-039
Product: DiCal-RED
Manufacturer: Swissphone Wireless AG
Affected Version(s): Unknown
Tested Version(s): 4009
Vulnerability Type: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) (CWE-22)
Risk Level: High
Solution Status: Open
Manufacturer Notification: 2024-04-16
Solution Date:…

Read More