Subject: SB19-021: Vulnerability Summary for the Week of January 14, 2019 |
From: "=?US-ASCII?Q?US-CERT?=" <US-CERT@ncas.us-cert.gov> |
Date: 1/22/2019 10:31 AM |
To: Fido4cmech@lusfiber.net |
National Cyber Awareness System:
01/21/2019 09:22 PM EST
Original release date: January 21, 2019 | Last revised: January 22, 2019
The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. The NVD is sponsored by the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) / United States Computer Emergency Readiness Team (US-CERT). For modified or updated entries, please visit the NVD, which contains historical vulnerability information. The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:
Entries may include additional information provided by organizations and efforts sponsored by US-CERT. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletins is compiled from external, open source reports and is not a direct result of US-CERT analysis. The NCCIC Weekly Vulnerability Summary Bulletin is created using information from the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD). In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available. High Vulnerabilities
Medium Vulnerabilities
Low Vulnerabilities
Severity Not Yet Assigned
This product is provided subject to this Notification and this Privacy & Use policy. |