CVE-2023-50260
- EPSS 15.22%
- Veröffentlicht 19.04.2024 15:15:50
- Zuletzt bearbeitet 09.01.2025 17:41:36
Wazuh is a free and open source platform used for threat prevention, detection, and response. A wrong validation in the `host_deny` script allows to write any string in the `hosts.deny` file, which can end in an arbitrary command execution on the tar...
CVE-2023-49275
- EPSS 0.3%
- Veröffentlicht 19.04.2024 15:15:49
- Zuletzt bearbeitet 09.01.2025 17:42:46
Wazuh is a free and open source platform used for threat prevention, detection, and response. A NULL pointer dereference was detected during fuzzing of the analysis engine, allowing malicious clients to DoS the analysis engine. The bug occurs when `a...
CVE-2023-42463
- EPSS 0.07%
- Veröffentlicht 12.01.2024 21:15:09
- Zuletzt bearbeitet 21.11.2024 08:22:36
Wazuh is a free and open source platform used for threat prevention, detection, and response. This bug introduced a stack overflow hazard that could allow a local privilege escalation. This vulnerability was patched in version 4.5.3.
CVE-2022-40497
- EPSS 2.3%
- Veröffentlicht 28.09.2022 00:15:09
- Zuletzt bearbeitet 21.05.2025 15:16:00
Wazuh v3.6.1 - v3.13.5, v4.0.0 - v4.2.7, and v4.3.0 - v4.3.7 were discovered to contain an authenticated remote code execution (RCE) vulnerability via the Active Response endpoint.
CVE-2021-44079
- EPSS 8.31%
- Veröffentlicht 22.11.2021 07:15:07
- Zuletzt bearbeitet 21.11.2024 06:30:20
In the wazuh-slack active response script in Wazuh 4.2.x before 4.2.5, untrusted user agents are passed to a curl command line, potentially resulting in remote code execution.
CVE-2021-41821
- EPSS 0.47%
- Veröffentlicht 29.09.2021 23:15:07
- Zuletzt bearbeitet 21.11.2024 06:26:49
Wazuh Manager in Wazuh through 4.1.5 is affected by a remote Integer Underflow vulnerability that might lead to denial of service. A crafted message must be sent from an authenticated agent to the manager.
CVE-2021-26814
- EPSS 64.02%
- Veröffentlicht 06.03.2021 02:15:12
- Zuletzt bearbeitet 21.11.2024 05:56:51
Wazuh API in Wazuh from 4.0.0 to 4.0.3 allows authenticated users to execute arbitrary code with administrative privileges via /manager/files URI. An authenticated user to the service may exploit incomplete input validation on the /manager/files API ...
CVE-2018-19666
- EPSS 0.02%
- Veröffentlicht 29.11.2018 08:29:00
- Zuletzt bearbeitet 21.11.2024 03:58:23
The agent in OSSEC through 3.1.0 on Windows allows local users to gain NT AUTHORITY\SYSTEM access via Directory Traversal by leveraging full access to the associated OSSEC server.