Stormshield Management Center vulnerabilities
8 known vulnerabilities affecting stormshield/stormshield_management_center.
Total CVEs
8
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH5MEDIUM3
Vulnerabilities
Page 1 of 1
CVE-2023-0401HIGHCVSS 7.5fixed in 3.3.32023-02-08
CVE-2023-0401 [HIGH] CWE-476 CVE-2023-0401: A NULL pointer can be dereferenced when signatures are being
verified on PKCS7 signed or signedAndEn
A NULL pointer can be dereferenced when signatures are being
verified on PKCS7 signed or signedAndEnveloped data. In case the hash
algorithm used for the signature is known to the OpenSSL library but
the implementation of the hash algorithm is not available the digest
initialization will fail. There is a missing check for the return
value from the initi
nvd
CVE-2023-0286HIGHCVSS 7.4fixed in 3.3.32023-02-08
CVE-2023-0286 [HIGH] CWE-843 CVE-2023-0286: There is a type confusion vulnerability relating to X.400 address processing
inside an X.509 General
There is a type confusion vulnerability relating to X.400 address processing
inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but
the public structure definition for GENERAL_NAME incorrectly specified the type
of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by
the OpenSSL function GENERAL_NAME_cmp
nvd
CVE-2023-0216HIGHCVSS 7.5fixed in 3.3.32023-02-08
CVE-2023-0216 [HIGH] CWE-476 CVE-2023-0216: An invalid pointer dereference on read can be triggered when an
application tries to load malformed
An invalid pointer dereference on read can be triggered when an
application tries to load malformed PKCS7 data with the
d2i_PKCS7(), d2i_PKCS7_bio() or d2i_PKCS7_fp() functions.
The result of the dereference is an application crash which could
lead to a denial of service attack. The TLS implementation in OpenSSL
does not call this function however third
nvd
CVE-2023-0215HIGHCVSS 7.5fixed in 3.3.32023-02-08
CVE-2023-0215 [HIGH] CWE-416 CVE-2023-0215: The public API function BIO_new_NDEF is a helper function used for streaming
ASN.1 data via a BIO. I
The public API function BIO_new_NDEF is a helper function used for streaming
ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the
SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by
end user applications.
The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter
BIO onto the fro
nvd
CVE-2022-32215MEDIUMCVSS 6.5fixed in 3.3.22022-07-14
CVE-2022-32215 [MEDIUM] CWE-444 CVE-2022-32215: The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not correctly
The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not correctly handle multi-line Transfer-Encoding headers. This can lead to HTTP Request Smuggling (HRS).
nvd
CVE-2022-32214MEDIUMCVSS 6.5fixed in 3.3.02022-07-14
CVE-2022-32214 [MEDIUM] CWE-444 CVE-2022-32214: The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not strictly
The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS).
nvd
CVE-2022-32213MEDIUMCVSS 6.5fixed in 3.3.22022-07-14
CVE-2022-32213 [MEDIUM] CWE-444 CVE-2022-32213: The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not correctly
The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not correctly parse and validate Transfer-Encoding headers and can lead to HTTP Request Smuggling (HRS).
nvd
CVE-2002-20001HIGHCVSS 7.5fixed in 3.3.32021-11-11
CVE-2002-20001 [HIGH] CWE-400 CVE-2002-20001: The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arb
The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers that are actually not public keys, and trigger expensive server-side DHE modular-exponentiation calculations, aka a D(HE)at or D(HE)ater attack. The client needs very little CPU resources and network bandwidth. The attack may be more disr
nvd