Security Advisories
We protect our customers by investigating all vulnerability reports and working quickly to address any issues. Please take the time to review the vulnerability information below, how it impacts your system, and how to protect yourself.
SAN | Severity | Title | Updated |
---|---|---|---|
SAN24-006 | No Impact |
Vulnerability in OpenSSH (CVE-2024-6409) |
2024-07-10 |
SAN24-005 | No Impact |
‘RegreSSHion’ vulnerability in OpenSSH (CVE-2024-6387) |
2024-07-02 |
SAN24-004 | No Impact |
Continuation frame flood vulnerability in HTTP/2 (CVE-2023-45288) |
2024-04-24 |
SAN24-003 | No Impact |
Implementations of UDP application protocol are vulnerable to network loops (CVE-2024-2169) |
2024-04-22 |
SAN24-002 | No Impact | Vulnerability in XZ Utils targeting SSH connections (CVE-2024-3094) | 2024-04-09 |
SAN24-001 | Low | ‘Terrapin Attack’ vulnerability in OpenSSH related to the SSH transport protocol (CVE-2023-48795) | 2024-01-08 |
SAN23-004 | High | Intel processor vulnerability may allow escalation of privilege and/or information disclosure via local access (CVE-2023-23583) | 2023-12-06 |
SAN23-003 | High | VMware vCenter Server out-of-bounds write and information disclosure vulnerabilities (CVE-2023-34048, CVE-2023-34056) | 2023-12-06 |
SAN23-002 | High | Webp Vulnerability Impact on Zultys UC Clients (CVE-2023-4863) | 2023-10-18 |
SAN23-001 | Critical | Unauthorized Administrative Access Vulnerabilities (CVE-2023-43742, CVE-2023-43743, CVE-2023-43744) | 2023-10-13 |