Search criteria
ⓘ
Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.
3 vulnerabilities by Signiant
CVE-2022-22795 (GCVE-0-2022-22795)
Vulnerability from cvelistv5 – Published: 2022-03-09 14:56 – Updated: 2024-09-17 04:19
VLAI?
Title
Signiant - Manager+Agents XML External Entity (XXE)
Summary
Signiant - Manager+Agents XML External Entity (XXE) - Extract internal files of the affected machine An attacker can read all the system files, the product is running with root on Linux systems and nt/authority on windows systems, which allows him to access and extract any file on the systems, such as passwd, shadow, hosts and so on. By gaining access to these files, attackers can steal sensitive information from the victims machine.
Severity ?
6.8 (Medium)
CWE
- CWE-611 - Improper Restriction of XML External Entity Reference ('XXE')
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
Date Public ?
2022-03-02 00:00
Credits
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T03:21:49.114Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.gov.il/en/departments/faq/cve_advisories"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Signiant",
"vendor": "Signiant",
"versions": [
{
"status": "affected",
"version": "Signiant Build 78045 13.5.0"
},
{
"status": "affected",
"version": "Signiant Build 79008,14.0.0"
},
{
"status": "affected",
"version": "Signiant Build 79687 14.1.0"
},
{
"status": "affected",
"version": "Signiant Build 79687 15.0.0"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Anton Golotin"
}
],
"datePublic": "2022-03-02T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Signiant - Manager+Agents XML External Entity (XXE) - Extract internal files of the affected machine An attacker can read all the system files, the product is running with root on Linux systems and nt/authority on windows systems, which allows him to access and extract any file on the systems, such as passwd, shadow, hosts and so on. By gaining access to these files, attackers can steal sensitive information from the victims machine."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-611",
"description": "CWE-611 Improper Restriction of XML External Entity Reference (\u0027XXE\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-03-09T14:56:32.000Z",
"orgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f",
"shortName": "INCD"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.gov.il/en/departments/faq/cve_advisories"
}
],
"solutions": [
{
"lang": "en",
"value": "All of 13.5, 14.1, and 15.1 have an update available.\nThe mitigation involved adding a filter that validates for external dtd."
}
],
"source": {
"advisory": "ILVN-2022-0016",
"defect": [
"ILVN-2022-0016"
],
"discovery": "EXTERNAL"
},
"title": "Signiant - Manager+Agents XML External Entity (XXE)",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cna@cyber.gov.il",
"DATE_PUBLIC": "2022-03-02T16:21:00.000Z",
"ID": "CVE-2022-22795",
"STATE": "PUBLIC",
"TITLE": "Signiant - Manager+Agents XML External Entity (XXE)"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Signiant",
"version": {
"version_data": [
{
"version_name": "Signiant",
"version_value": "Build 78045 13.5.0"
},
{
"version_name": "Signiant",
"version_value": "Build 79008,14.0.0"
},
{
"version_name": "Signiant",
"version_value": "Build 79687 14.1.0"
},
{
"version_name": "Signiant",
"version_value": "Build 79687 15.0.0"
}
]
}
}
]
},
"vendor_name": "Signiant"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Anton Golotin"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Signiant - Manager+Agents XML External Entity (XXE) - Extract internal files of the affected machine An attacker can read all the system files, the product is running with root on Linux systems and nt/authority on windows systems, which allows him to access and extract any file on the systems, such as passwd, shadow, hosts and so on. By gaining access to these files, attackers can steal sensitive information from the victims machine."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-611 Improper Restriction of XML External Entity Reference (\u0027XXE\u0027)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.gov.il/en/departments/faq/cve_advisories",
"refsource": "MISC",
"url": "https://www.gov.il/en/departments/faq/cve_advisories"
}
]
},
"solution": [
{
"lang": "en",
"value": "All of 13.5, 14.1, and 15.1 have an update available.\nThe mitigation involved adding a filter that validates for external dtd."
}
],
"source": {
"advisory": "ILVN-2022-0016",
"defect": [
"ILVN-2022-0016"
],
"discovery": "EXTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f",
"assignerShortName": "INCD",
"cveId": "CVE-2022-22795",
"datePublished": "2022-03-09T14:56:32.876Z",
"dateReserved": "2022-01-07T00:00:00.000Z",
"dateUpdated": "2024-09-17T04:19:02.100Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-46660 (GCVE-0-2021-46660)
Vulnerability from cvelistv5 – Published: 2022-01-29 23:10 – Updated: 2024-08-04 05:10
VLAI?
Summary
Signiant Manager+Agents before 15.1 allows XML External Entity (XXE) attacks.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T05:10:35.392Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.signiant.com/technology/security/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://help.signiant.com/flight-deck/general/release-notes-15-1"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Signiant Manager+Agents before 15.1 allows XML External Entity (XXE) attacks."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-01-29T23:10:32.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.signiant.com/technology/security/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://help.signiant.com/flight-deck/general/release-notes-15-1"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-46660",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Signiant Manager+Agents before 15.1 allows XML External Entity (XXE) attacks."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.signiant.com/technology/security/",
"refsource": "MISC",
"url": "https://www.signiant.com/technology/security/"
},
{
"name": "https://help.signiant.com/flight-deck/general/release-notes-15-1",
"refsource": "MISC",
"url": "https://help.signiant.com/flight-deck/general/release-notes-15-1"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-46660",
"datePublished": "2022-01-29T23:10:32.000Z",
"dateReserved": "2022-01-29T00:00:00.000Z",
"dateUpdated": "2024-08-04T05:10:35.392Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-8996 (GCVE-0-2019-8996)
Vulnerability from cvelistv5 – Published: 2019-02-21 00:00 – Updated: 2024-08-04 21:31
VLAI?
Summary
In Signiant Manager+Agents before 13.5, the implementation of the set command has a Buffer Overflow.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
Date Public ?
2019-02-21 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T21:31:37.657Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://help.signiant.com/manager-agents/installation/release-notes/"
},
{
"tags": [
"x_transferred"
],
"url": "https://help.signiant.com/flight-deck/general/release-notes-13-5"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2019-02-21T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "In Signiant Manager+Agents before 13.5, the implementation of the set command has a Buffer Overflow."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-01-24T00:00:00.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://help.signiant.com/manager-agents/installation/release-notes/"
},
{
"url": "https://help.signiant.com/flight-deck/general/release-notes-13-5"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2019-8996",
"datePublished": "2019-02-21T00:00:00.000Z",
"dateReserved": "2019-02-21T00:00:00.000Z",
"dateUpdated": "2024-08-04T21:31:37.657Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}