Wazuh

Wazuh

28 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 15.22%
  • Veröffentlicht 19.04.2024 15:15:50
  • Zuletzt bearbeitet 09.01.2025 17:41:36

Wazuh is a free and open source platform used for threat prevention, detection, and response. A wrong validation in the `host_deny` script allows to write any string in the `hosts.deny` file, which can end in an arbitrary command execution on the tar...

Exploit
  • EPSS 0.3%
  • Veröffentlicht 19.04.2024 15:15:49
  • Zuletzt bearbeitet 09.01.2025 17:42:46

Wazuh is a free and open source platform used for threat prevention, detection, and response. A NULL pointer dereference was detected during fuzzing of the analysis engine, allowing malicious clients to DoS the analysis engine. The bug occurs when `a...

  • EPSS 0.07%
  • Veröffentlicht 12.01.2024 21:15:09
  • Zuletzt bearbeitet 21.11.2024 08:22:36

Wazuh is a free and open source platform used for threat prevention, detection, and response. This bug introduced a stack overflow hazard that could allow a local privilege escalation. This vulnerability was patched in version 4.5.3.

  • EPSS 2.3%
  • Veröffentlicht 28.09.2022 00:15:09
  • Zuletzt bearbeitet 21.05.2025 15:16:00

Wazuh v3.6.1 - v3.13.5, v4.0.0 - v4.2.7, and v4.3.0 - v4.3.7 were discovered to contain an authenticated remote code execution (RCE) vulnerability via the Active Response endpoint.

Exploit
  • EPSS 8.31%
  • Veröffentlicht 22.11.2021 07:15:07
  • Zuletzt bearbeitet 21.11.2024 06:30:20

In the wazuh-slack active response script in Wazuh 4.2.x before 4.2.5, untrusted user agents are passed to a curl command line, potentially resulting in remote code execution.

Exploit
  • EPSS 0.47%
  • Veröffentlicht 29.09.2021 23:15:07
  • Zuletzt bearbeitet 21.11.2024 06:26:49

Wazuh Manager in Wazuh through 4.1.5 is affected by a remote Integer Underflow vulnerability that might lead to denial of service. A crafted message must be sent from an authenticated agent to the manager.

  • EPSS 64.02%
  • Veröffentlicht 06.03.2021 02:15:12
  • Zuletzt bearbeitet 21.11.2024 05:56:51

Wazuh API in Wazuh from 4.0.0 to 4.0.3 allows authenticated users to execute arbitrary code with administrative privileges via /manager/files URI. An authenticated user to the service may exploit incomplete input validation on the /manager/files API ...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 29.11.2018 08:29:00
  • Zuletzt bearbeitet 21.11.2024 03:58:23

The agent in OSSEC through 3.1.0 on Windows allows local users to gain NT AUTHORITY\SYSTEM access via Directory Traversal by leveraging full access to the associated OSSEC server.