Sicherheitslücken / CVE: Unterschied zwischen den Versionen
(-> Englisch) |
|||
Zeile 1: | Zeile 1: | ||
− | + | On this page you will see an overview of all security related vulnerabilites / [https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures CVEs] that occured either directly in our applications or through the use of third party libraries that are in use by our applications. | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | + | We also offer an admin newsletter (in German) where we will notifiy you new of critical securtiy vulnerabilities via email.<br> | |
− | + | You can register for our admin newsletter here: https://heidler-strichcode.de/kontakt/<br> | |
− | + | (''The contact form for the newsletter is only visible if "Marketing" cookies are enabled.'') | |
− | ''' | ||
− | = | + | = How do I update applications? = |
− | '' | + | On our page [[Aktualisierung von Erweiterungsmodulen]] you will learn everything you need to know before and during the update of the application.<br> |
+ | Please read this carefully.<br> | ||
+ | If you have any questions or are unsure, you can always contact our support via: [mailto:support@heidler-strichcode.de support@heidler-strichcode.de] | ||
+ | |||
+ | = Security classification = | ||
+ | '''high''' = The vulnerability could be exploited. We urgently recommend to update the affected applications as soon as possible.<br> | ||
+ | '''medium''' = The possiblity that this vulnerability can be exploited cannot be ruled out. The affected functionality is not directly used, however it may be in use by other third party components. We recommend to update the afftected applications as soon as it is convenient.<br> | ||
+ | '''low''' = The vulnerability cannot be exploited. We still recommend to update the application at some point. | ||
+ | |||
+ | = Overview of all security vulnerabilites / CVEs = | ||
+ | ''ordered newest to oldest'' | ||
{| class="wikitable" | {| class="wikitable" | ||
|- | |- | ||
− | ! | + | ! Date !! Classification !! Details |
|- | |- | ||
− | | 15 | + | | 2023-09-15 || low || [[CVE-2023-42503]] |
|- | |- | ||
− | | 18 | + | | 2023-04-18 || low || [[CVE-2023-21930]] |
|- | |- | ||
− | | 10 | + | | 2023-02-10 || medium || [[CVE-2022-40152]] |
|- | |- | ||
− | | 02 | + | | 2023-02-02 || low || [[CVE-2023-21835 / CVE-2023-21843]] |
|} | |} |
Version vom 26. September 2023, 17:19 Uhr
On this page you will see an overview of all security related vulnerabilites / CVEs that occured either directly in our applications or through the use of third party libraries that are in use by our applications.
We also offer an admin newsletter (in German) where we will notifiy you new of critical securtiy vulnerabilities via email.
You can register for our admin newsletter here: https://heidler-strichcode.de/kontakt/
(The contact form for the newsletter is only visible if "Marketing" cookies are enabled.)
How do I update applications?
On our page Aktualisierung von Erweiterungsmodulen you will learn everything you need to know before and during the update of the application.
Please read this carefully.
If you have any questions or are unsure, you can always contact our support via: support@heidler-strichcode.de
Security classification
high = The vulnerability could be exploited. We urgently recommend to update the affected applications as soon as possible.
medium = The possiblity that this vulnerability can be exploited cannot be ruled out. The affected functionality is not directly used, however it may be in use by other third party components. We recommend to update the afftected applications as soon as it is convenient.
low = The vulnerability cannot be exploited. We still recommend to update the application at some point.
Overview of all security vulnerabilites / CVEs
ordered newest to oldest
Date | Classification | Details |
---|---|---|
2023-09-15 | low | CVE-2023-42503 |
2023-04-18 | low | CVE-2023-21930 |
2023-02-10 | medium | CVE-2022-40152 |
2023-02-02 | low | CVE-2023-21835 / CVE-2023-21843 |