3.3
CVE-2023-39341
- EPSS 0.03%
- Veröffentlicht 09.08.2023 03:15:43
- Zuletzt bearbeitet 21.11.2024 08:15:11
- Quelle vultures@jpcert.or.jp
- Teams Watchlist Login
- Unerledigt Login
"FFRI yarai", "FFRI yarai Home and Business Edition" and their OEM products handle exceptional conditions improperly, which may lead to denial-of-service (DoS) condition. Affected products and versions are as follows: FFRI yarai versions 3.4.0 to 3.4.6 and 3.5.0, FFRI yarai Home and Business Edition version 1.4.0, InfoTrace Mark II Malware Protection (Mark II Zerona) versions 3.0.1 to 3.2.2, Zerona / Zerona PLUS versions 3.2.32 to 3.2.36, ActSecure χ versions 3.4.0 to 3.4.6 and 3.5.0, Dual Safe Powered by FFRI yarai version 1.4.1, EDR Plus Pack (Bundled FFRI yarai versions 3.4.0 to 3.4.6 and 3.5.0), and EDR Plus Pack Cloud (Bundled FFRI yarai versions 3.4.0 to 3.4.6 and 3.5.0).
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Ffri ≫ Ffri Yarai SwEdition- Version >= 3.4.0 <= 3.4.6
Ffri ≫ Ffri Yarai Version1.4.0 SwEditionhome_and_business
Ffri ≫ Ffri Yarai Version3.5.0 SwEdition-
Soliton ≫ Infotrace Mark Ii Malware Protection Version >= 3.0.1 <= 3.2.2
Soliton ≫ Zerona Plus Version >= 3.2.32 <= 3.2.36
Nec ≫ Actsecure X Managed Security Service Version >= 3.4.0 <= 3.4.6
Nec ≫ Actsecure X Managed Security Service Version3.5.0
Skygroup ≫ Edr Plus Pack Version >= 3.4.0 <= 3.4.6
Skygroup ≫ Edr Plus Pack Version3.5.0
Skygroup ≫ Edr Plus Pack Cloud Version >= 3.4.0 <= 3.4.6
Skygroup ≫ Edr Plus Pack Cloud Version3.5.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.058 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 3.3 | 1.8 | 1.4 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
|
CWE-755 Improper Handling of Exceptional Conditions
The product does not handle or incorrectly handles an exceptional condition.