Apache Commons Compress ZIP Archive denial of service [CVE-2021-36090]
A vulnerability classified as problematic has been found in Apache Commons Compress (the affected version unknown). This affects some unknown
A vulnerability classified as problematic has been found in Apache Commons Compress (the affected version unknown). This affects some unknown
A vulnerability has been found in Huawei P30 (Smartphone Operating System) and classified as problematic. Affected by this vulnerability is
A vulnerability was found in Stormshield Endpoint Security up to 2.0.x and classified as problematic. Affected by this issue is
A vulnerability classified as problematic was found in Moddable (affected version unknown). Affected by this vulnerability is the function fxParserTree.
A vulnerability was found in Stormshield SES Evolution up to 2.0.x. It has been classified as problematic. This affects some
A vulnerability classified as problematic was found in Siemens JT Utilities up to 13.0.1.x. Affected by this vulnerability is an
A vulnerability has been found in Backdoor.Win32.Surila.j (Remote Access Software) (affected version unknown) and classified as problematic. Affected by this
A vulnerability was found in Apache Tomcat up to 8.5.64/9.0.44/10.0.4 (Application Server Software). It has been declared as problematic. This
A vulnerability was found in Fortinet FortiMail up to 6.2.6/6.4.4. It has been rated as problematic. Affected by this issue
A vulnerability was found in Halo 0.4.3. It has been declared as problematic. This vulnerability affects the function delBackup. There
A vulnerability was found in Aruba ClearPass Policy Manager up to 6.8.8/6.9.5 (Policy Management Software). It has been classified as
This vulnerability affects the following Cisco products if they are running a vulnerable release of Cisco IOS Software or Cisco IOS XE Software and the BFD feature is enabled:
Catalyst 4500 Supervisor Engine 6-E (K5)
Catalyst 4500 Supervisor Engine 6L-E (K10)
Catalyst 4500 Supervisor Engine 7-E (K10)
Catalyst 4500 Supervisor Engine 7L-E (K10)
Catalyst 4500E Supervisor Engine 8-E (K10)
Catalyst 4500E Supervisor Engine 8L-E (K10)
Catalyst 4500E Supervisor Engine 9-E (K10)
Catalyst 4500-X Series Switches (K10)
Catalyst 4900M Switch (K5)
Catalyst 4948E Ethernet Switch (K5)
This vulnerability can be exploited only if the BFD feature is enabled on an affected device. The BFD feature is enabled by default in Cisco IOS Software and Cisco IOS XE Software if the software is running an IP Base (ipbase) package license or a higher license. The BFD feature is not supported by a LAN Base (lanbase) package license. For more information, see LAN Base, IP Base, and Enterprise Services Image Support.
For information about which Cisco IOS and IOS XE Software releases are vulnerable, see the Fixed Software section of this advisory.
Determining Whether the BFD Feature Is Enabled
To determine whether the BFD feature is enabled on a device, administrators can use the show running-config | include feature bfd command in privileged EXEC mode. The following example shows the output of the show running-config | include feature bfd command on a Cisco Catalyst Switch that has the BFD feature disabled:
switch# show running-config | include feature bfd platform module all feature bfd disable platform module feature bfd disable platform feature bfd disable feature bfd disable
Empty output from the show running-config | include feature bfd command would indicate that the BFD feature is enabled.
Determining Which Package License Is Enabled
To determine which package license is enabled on a device, administrators can use the show license feature command in privileged EXEC mode. The following example shows the output of the show license feature command on a Cisco Catalyst Switch that has the IP Base (ipbase) package license enabled:
C4500# show license feature
Feature name Enforcement Evaluation Clear Allowed Enabled Right…
——————————————————————————
entservices true true true false true
ipbase true false true true false
lanbase false false true false false
internal_service true false true false false
If a software release does not support the show license feature command, administrators can determine which package license is enabled on a device by identifying the type of software image that is currently running on the device. To identify the type of software image that is running on a device, administrators can use the show version | include image command in privileged EXEC mode. The following example shows the output of the show version | include image command on a Cisco Catalyst Switch that is running a software image that has the LAN Base (lanbase) package license enabled:
C4948E# show version | include image
System image file is “bootflash:cat4500e-lanbasek9-mz.151-2.SG3.bin”
Determining the Cisco IOS Software Release
To determine which Cisco IOS Software release is running on a device, administrators can log in to the device, use the show version command in the CLI, and then refer to the system banner that appears. If the device is running Cisco IOS Software, the system banner displays text similar to Cisco Internetwork Operating System Software or Cisco IOS Software. The banner also displays the installed image name in parentheses, followed by the Cisco IOS Software release number and release name. Some Cisco devices do not support the show version command or may provide different output.
The following example shows the output of the command for a device that is running Cisco IOS Software Release 15.5(2)T1 and has an installed image name of C2951-UNIVERSALK9-M:
Router > show version
Cisco IOS Software, C2951 Software (C2951-UNIVERSALK9-M), Version 15.5(2)T1, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2015 by Cisco Systems, Inc.
Compiled Mon 22-Jun-15 09:32 by prod_rel_team
.
.
.
For information about the naming and numbering conventions for Cisco IOS Software releases, see the Cisco IOS and NX-OS Software Reference Guide.Determining the Cisco IOS XE Software Release
To determine which Cisco IOS XE Software release is running on a device, administrators can log in to the device, use the show version command in the CLI, and then refer to the system banner that appears. If the device is running Cisco IOS XE Software, the system banner displays Cisco IOS Software, Cisco IOS XE Software, or similar text.
The following example shows the output of the command for a device that is running Cisco IOS XE Software Release 16.2.1 and has an installed image name of CAT3K_CAA-UNIVERSALK9-M:
ios-xe-device# show version
Cisco IOS Software, Catalyst L3 Switch Software (CAT3K_CAA-UNIVERSALK9-M), Version Denali 16.2.1, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2016 by Cisco Systems, Inc.
Compiled Sun 27-Mar-16 21:47 by mcpre
.
.
.
For information about the naming and numbering conventions for Cisco IOS XE Software releases, see the Cisco IOS and NX-OS Software Reference Guide.
No other Cisco products are currently known to be affected by this vulnerability.
Cisco has confirmed that this vulnerability does not affect the Cisco Catalyst 4500 Series Supervisor Engine V-10GE (K2) or the Cisco Catalyst 4948 Switch (K2).
Cisco has also confirmed that this vulnerability does not affect Cisco IOS XR Software or Cisco NX-OS Software.
A vulnerability was found in Avahi avahi-daemon 0.8. It has been rated as problematic. This issue affects an unknown code
A vulnerability was found in MikroTik RouterOS 6.44.5 (Router Operating System). It has been rated as problematic. Affected by this
A vulnerability has been found in MikroTik RouterOS up to 6.46 (Router Operating System) and classified as problematic. Affected by
A vulnerability was found in Pexip Infinity up to 24.1 and classified as problematic. Affected by this issue is an
A vulnerability was found in Pexip Infinity up to 25.3. It has been declared as problematic. This vulnerability affects some
A vulnerability, which was classified as problematic, has been found in Realtek HDA Driver up to 9150 (Hardware Driver Software).
A vulnerability was found in GitLab Community Edition and Enterprise Edition 8.0 (Bug Tracking Software). It has been rated as
A vulnerability, which was classified as problematic, was found in MediaWiki up to 1.36 (Content Management System). This affects an
A vulnerability was found in Huawei Smartphone (Smartphone Operating System) (version unknown). It has been classified as problematic. Affected is
A vulnerability was found in NVIDIA Jetson (the affected version is unknown). It has been declared as critical. This vulnerability
A vulnerability, which was classified as problematic, was found in Huawei Smartphone (Smartphone Operating System) (the affected version unknown). This
A vulnerability was found in Xen (Virtualization Software) (affected version unknown). It has been declared as problematic. Affected by this