Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ossec ossec vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-50260
Wazuh is a free and open source platform used for threat prevention, detection, and response. A wrong validation in the `host_deny` script allows to write any string in the `hosts.deny` file, which can end in an arbitrary command execution on the target system. This vulnerability...
5
CVSSv2
CVE-2021-28040
An issue exists in OSSEC 3.6.0. An uncontrolled recursion vulnerability in os_xml.c occurs when a large number of opening and closing XML tags is used. Because recursion is used in _ReadElem without restriction, an attacker can trigger a segmentation fault once unmapped memory is...
Ossec Ossec 3.6.0
1 Github repository
6.5
CVSSv2
CVE-2020-8442
In OSSEC-HIDS 2.7 up to and including 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to a heap-based buffer overflow in the rootcheck decoder component via an authenticated client.
Ossec Ossec
7.5
CVSSv2
CVE-2020-8443
In OSSEC-HIDS 2.7 up to and including 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to an off-by-one heap-based buffer overflow during the cleaning of crafted syslog msgs (received from authenticated remote agents and delivered to the an...
Ossec Ossec
2.1
CVSSv2
CVE-2020-8446
In OSSEC-HIDS 2.7 up to and including 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to path traversal (with write access) via crafted syscheck messages written directly to the analysisd UNIX domain socket by a local user.
Ossec Ossec
7.5
CVSSv2
CVE-2020-8447
In OSSEC-HIDS 2.7 up to and including 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to a use-after-free during processing of syscheck formatted msgs (received from authenticated remote agents and delivered to the analysisd processing que...
Ossec Ossec
2.1
CVSSv2
CVE-2020-8448
In OSSEC-HIDS 2.7 up to and including 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to a denial of service (NULL pointer dereference) via crafted messages written directly to the analysisd UNIX domain socket by a local user.
Ossec Ossec
7.5
CVSSv2
CVE-2020-8444
In OSSEC-HIDS 2.7 up to and including 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to a use-after-free during processing of ossec-alert formatted msgs (received from authenticated remote agents and delivered to the analysisd processing ...
Ossec Ossec
10
CVSSv2
CVE-2020-8445
In OSSEC-HIDS 2.7 up to and including 3.5.0, the OS_CleanMSG function in ossec-analysisd doesn't remove or encode terminal control characters or newlines from processed log messages. In many cases, those characters are later logged. Because newlines (\n) are permitted in mes...
Ossec Ossec
7.2
CVSSv2
CVE-2018-19666
The agent in OSSEC up to and including 3.1.0 on Windows allows local users to gain NT AUTHORITY\SYSTEM access via Directory Traversal by leveraging full access to the associated OSSEC server.
Ossec Ossec
Wazuh Wazuh
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-52710
arbitrary
CVE-2024-5272
CVE-2024-2961
brute force
remote
CVE-2024-32944
CVE-2024-36241
CVE-2024-5274
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »