Search criteria Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.

3 vulnerabilities by Signiant

CVE-2022-22795 (GCVE-0-2022-22795)

Vulnerability from cvelistv5 – Published: 2022-03-09 14:56 – Updated: 2024-09-17 04:19
VLAI?
Title
Signiant - Manager+Agents XML External Entity (XXE)
Summary
Signiant - Manager+Agents XML External Entity (XXE) - Extract internal files of the affected machine An attacker can read all the system files, the product is running with root on Linux systems and nt/authority on windows systems, which allows him to access and extract any file on the systems, such as passwd, shadow, hosts and so on. By gaining access to these files, attackers can steal sensitive information from the victims machine.
CWE
  • CWE-611 - Improper Restriction of XML External Entity Reference ('XXE')
Assigner
References
Impacted products
Vendor Product Version
Signiant Signiant Affected: Signiant Build 78045 13.5.0
Affected: Signiant Build 79008,14.0.0
Affected: Signiant Build 79687 14.1.0
Affected: Signiant Build 79687 15.0.0
Create a notification for this product.
Date Public ?
2022-03-02 00:00
Credits
Anton Golotin
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T03:21:49.114Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.gov.il/en/departments/faq/cve_advisories"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Signiant",
          "vendor": "Signiant",
          "versions": [
            {
              "status": "affected",
              "version": "Signiant  Build 78045 13.5.0"
            },
            {
              "status": "affected",
              "version": "Signiant  Build 79008,14.0.0"
            },
            {
              "status": "affected",
              "version": "Signiant  Build 79687 14.1.0"
            },
            {
              "status": "affected",
              "version": "Signiant  Build 79687 15.0.0"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Anton Golotin"
        }
      ],
      "datePublic": "2022-03-02T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Signiant - Manager+Agents XML External Entity (XXE) - Extract internal files of the affected machine An attacker can read all the system files, the product is running with root on Linux systems and nt/authority on windows systems, which allows him to access and extract any file on the systems, such as passwd, shadow, hosts and so on. By gaining access to these files, attackers can steal sensitive information from the victims machine."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-611",
              "description": "CWE-611 Improper Restriction of XML External Entity Reference (\u0027XXE\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-03-09T14:56:32.000Z",
        "orgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f",
        "shortName": "INCD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.gov.il/en/departments/faq/cve_advisories"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "All of 13.5, 14.1, and 15.1 have an update available.\nThe mitigation involved adding a filter that validates for external dtd."
        }
      ],
      "source": {
        "advisory": "ILVN-2022-0016",
        "defect": [
          "ILVN-2022-0016"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Signiant - Manager+Agents XML External Entity (XXE)",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cna@cyber.gov.il",
          "DATE_PUBLIC": "2022-03-02T16:21:00.000Z",
          "ID": "CVE-2022-22795",
          "STATE": "PUBLIC",
          "TITLE": "Signiant - Manager+Agents XML External Entity (XXE)"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Signiant",
                      "version": {
                        "version_data": [
                          {
                            "version_name": "Signiant",
                            "version_value": "Build 78045 13.5.0"
                          },
                          {
                            "version_name": "Signiant",
                            "version_value": "Build 79008,14.0.0"
                          },
                          {
                            "version_name": "Signiant",
                            "version_value": "Build 79687 14.1.0"
                          },
                          {
                            "version_name": "Signiant",
                            "version_value": "Build 79687 15.0.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Signiant"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Anton Golotin"
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Signiant - Manager+Agents XML External Entity (XXE) - Extract internal files of the affected machine An attacker can read all the system files, the product is running with root on Linux systems and nt/authority on windows systems, which allows him to access and extract any file on the systems, such as passwd, shadow, hosts and so on. By gaining access to these files, attackers can steal sensitive information from the victims machine."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "HIGH",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-611 Improper Restriction of XML External Entity Reference (\u0027XXE\u0027)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.gov.il/en/departments/faq/cve_advisories",
              "refsource": "MISC",
              "url": "https://www.gov.il/en/departments/faq/cve_advisories"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "All of 13.5, 14.1, and 15.1 have an update available.\nThe mitigation involved adding a filter that validates for external dtd."
          }
        ],
        "source": {
          "advisory": "ILVN-2022-0016",
          "defect": [
            "ILVN-2022-0016"
          ],
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f",
    "assignerShortName": "INCD",
    "cveId": "CVE-2022-22795",
    "datePublished": "2022-03-09T14:56:32.876Z",
    "dateReserved": "2022-01-07T00:00:00.000Z",
    "dateUpdated": "2024-09-17T04:19:02.100Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-46660 (GCVE-0-2021-46660)

Vulnerability from cvelistv5 – Published: 2022-01-29 23:10 – Updated: 2024-08-04 05:10
VLAI?
Summary
Signiant Manager+Agents before 15.1 allows XML External Entity (XXE) attacks.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T05:10:35.392Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.signiant.com/technology/security/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://help.signiant.com/flight-deck/general/release-notes-15-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Signiant Manager+Agents before 15.1 allows XML External Entity (XXE) attacks."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-01-29T23:10:32.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.signiant.com/technology/security/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://help.signiant.com/flight-deck/general/release-notes-15-1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-46660",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Signiant Manager+Agents before 15.1 allows XML External Entity (XXE) attacks."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.signiant.com/technology/security/",
              "refsource": "MISC",
              "url": "https://www.signiant.com/technology/security/"
            },
            {
              "name": "https://help.signiant.com/flight-deck/general/release-notes-15-1",
              "refsource": "MISC",
              "url": "https://help.signiant.com/flight-deck/general/release-notes-15-1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-46660",
    "datePublished": "2022-01-29T23:10:32.000Z",
    "dateReserved": "2022-01-29T00:00:00.000Z",
    "dateUpdated": "2024-08-04T05:10:35.392Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-8996 (GCVE-0-2019-8996)

Vulnerability from cvelistv5 – Published: 2019-02-21 00:00 – Updated: 2024-08-04 21:31
VLAI?
Summary
In Signiant Manager+Agents before 13.5, the implementation of the set command has a Buffer Overflow.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Date Public ?
2019-02-21 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T21:31:37.657Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://help.signiant.com/manager-agents/installation/release-notes/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://help.signiant.com/flight-deck/general/release-notes-13-5"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2019-02-21T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "In Signiant Manager+Agents before 13.5, the implementation of the set command has a Buffer Overflow."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-01-24T00:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://help.signiant.com/manager-agents/installation/release-notes/"
        },
        {
          "url": "https://help.signiant.com/flight-deck/general/release-notes-13-5"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-8996",
    "datePublished": "2019-02-21T00:00:00.000Z",
    "dateReserved": "2019-02-21T00:00:00.000Z",
    "dateUpdated": "2024-08-04T21:31:37.657Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}