Stormshield Management Center vulnerabilities

8 known vulnerabilities affecting stormshield/stormshield_management_center.

Total CVEs
8
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH5MEDIUM3

Vulnerabilities

Page 1 of 1
CVE-2023-0401HIGHCVSS 7.5fixed in 3.3.32023-02-08
CVE-2023-0401 [HIGH] CWE-476 CVE-2023-0401: A NULL pointer can be dereferenced when signatures are being verified on PKCS7 signed or signedAndEn A NULL pointer can be dereferenced when signatures are being verified on PKCS7 signed or signedAndEnveloped data. In case the hash algorithm used for the signature is known to the OpenSSL library but the implementation of the hash algorithm is not available the digest initialization will fail. There is a missing check for the return value from the initi
nvd
CVE-2023-0286HIGHCVSS 7.4fixed in 3.3.32023-02-08
CVE-2023-0286 [HIGH] CWE-843 CVE-2023-0286: There is a type confusion vulnerability relating to X.400 address processing inside an X.509 General There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp
nvd
CVE-2023-0216HIGHCVSS 7.5fixed in 3.3.32023-02-08
CVE-2023-0216 [HIGH] CWE-476 CVE-2023-0216: An invalid pointer dereference on read can be triggered when an application tries to load malformed An invalid pointer dereference on read can be triggered when an application tries to load malformed PKCS7 data with the d2i_PKCS7(), d2i_PKCS7_bio() or d2i_PKCS7_fp() functions. The result of the dereference is an application crash which could lead to a denial of service attack. The TLS implementation in OpenSSL does not call this function however third
nvd
CVE-2023-0215HIGHCVSS 7.5fixed in 3.3.32023-02-08
CVE-2023-0215 [HIGH] CWE-416 CVE-2023-0215: The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. I The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the fro
nvd
CVE-2022-32215MEDIUMCVSS 6.5fixed in 3.3.22022-07-14
CVE-2022-32215 [MEDIUM] CWE-444 CVE-2022-32215: The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not correctly The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not correctly handle multi-line Transfer-Encoding headers. This can lead to HTTP Request Smuggling (HRS).
nvd
CVE-2022-32214MEDIUMCVSS 6.5fixed in 3.3.02022-07-14
CVE-2022-32214 [MEDIUM] CWE-444 CVE-2022-32214: The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not strictly The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS).
nvd
CVE-2022-32213MEDIUMCVSS 6.5fixed in 3.3.22022-07-14
CVE-2022-32213 [MEDIUM] CWE-444 CVE-2022-32213: The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not correctly The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does not correctly parse and validate Transfer-Encoding headers and can lead to HTTP Request Smuggling (HRS).
nvd
CVE-2002-20001HIGHCVSS 7.5fixed in 3.3.32021-11-11
CVE-2002-20001 [HIGH] CWE-400 CVE-2002-20001: The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arb The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers that are actually not public keys, and trigger expensive server-side DHE modular-exponentiation calculations, aka a D(HE)at or D(HE)ater attack. The client needs very little CPU resources and network bandwidth. The attack may be more disr
nvd