Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ossec ossec vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-50260
Wazuh is a free and open source platform used for threat prevention, detection, and response. A wrong validation in the `host_deny` script allows to write any string in the `hosts.deny` file, which can end in an arbitrary command execution on the target system. This vulnerability...
7.5
CVSSv3
CVE-2021-28040
An issue exists in OSSEC 3.6.0. An uncontrolled recursion vulnerability in os_xml.c occurs when a large number of opening and closing XML tags is used. Because recursion is used in _ReadElem without restriction, an attacker can trigger a segmentation fault once unmapped memory is...
Ossec Ossec 3.6.0
1 Github repository
5.5
CVSSv3
CVE-2020-8448
In OSSEC-HIDS 2.7 up to and including 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to a denial of service (NULL pointer dereference) via crafted messages written directly to the analysisd UNIX domain socket by a local user.
Ossec Ossec
8.8
CVSSv3
CVE-2020-8442
In OSSEC-HIDS 2.7 up to and including 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to a heap-based buffer overflow in the rootcheck decoder component via an authenticated client.
Ossec Ossec
5.5
CVSSv3
CVE-2020-8446
In OSSEC-HIDS 2.7 up to and including 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to path traversal (with write access) via crafted syscheck messages written directly to the analysisd UNIX domain socket by a local user.
Ossec Ossec
9.8
CVSSv3
CVE-2020-8447
In OSSEC-HIDS 2.7 up to and including 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to a use-after-free during processing of syscheck formatted msgs (received from authenticated remote agents and delivered to the analysisd processing que...
Ossec Ossec
9.8
CVSSv3
CVE-2020-8444
In OSSEC-HIDS 2.7 up to and including 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to a use-after-free during processing of ossec-alert formatted msgs (received from authenticated remote agents and delivered to the analysisd processing ...
Ossec Ossec
9.8
CVSSv3
CVE-2020-8445
In OSSEC-HIDS 2.7 up to and including 3.5.0, the OS_CleanMSG function in ossec-analysisd doesn't remove or encode terminal control characters or newlines from processed log messages. In many cases, those characters are later logged. Because newlines (\n) are permitted in mes...
Ossec Ossec
9.8
CVSSv3
CVE-2020-8443
In OSSEC-HIDS 2.7 up to and including 3.5.0, the server component responsible for log analysis (ossec-analysisd) is vulnerable to an off-by-one heap-based buffer overflow during the cleaning of crafted syslog msgs (received from authenticated remote agents and delivered to the an...
Ossec Ossec
7.8
CVSSv3
CVE-2018-19666
The agent in OSSEC up to and including 3.1.0 on Windows allows local users to gain NT AUTHORITY\SYSTEM access via Directory Traversal by leveraging full access to the associated OSSEC server.
Ossec Ossec
Wazuh Wazuh
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »