Vulnerability in third party component skiasharp.2.88.3 used in File Inspector

Vulnerability in third party component skiasharp.2.88.3 used in File Inspector

Summary

Vulnerability in File Inspector dependency fixed.

Description

A vulnerability has been detected for the 3rd party component skiasharp.2.88.3.nupkg that is used by the File Inspector.

The vulnerability in the 3rd party component has been fixed. The File Inspector has been updated to use version skiasharp.2.88.6.nupkg.

To benefit from this fix:

  • Update your zenon Software Platform to the latest build of zenon 14 or higher.


Item ID: 279380
Version: 14.00 Build: 239777
    • Related Articles

    • CD_SVA_2025_01: zenon Remote Transport Vulnerability

      What you should know The vulnerability targets a specific function of the zenon Remote Transport Service. The underlying weaknesses is CWE-306: ‘Missing Authentication for Critical Function’. The versions listed below are affected by this ...
    • zenon Changesets Excel

      Here, you can access a comprehensive list of changes across all maintained versions of the zenon Software Platform as Excel Worksheets. This includes both implemented bug-fixes and new features. Additionally, these lists are available in CSV format ...
    • zenon Changesets CSV

      Here, you can access a comprehensive list of changes across all maintained versions of the zenon Software Platform as Excel Worksheets. This includes both implemented bug-fixes and new features. Additionally, these lists are available in as Excel ...
    • FAQ: CD_SVA_2022_1: Vulnerability in zenon Software platform

      Summary  COPA-DATA received a report from Security Researcher Ruben Santamarta detailing a security vulnerability for the zenon Logging Service which is part of the zenon platform standard deployment. Based on this vulnerability additional ...
    • CD_SVA_2023_3: Wibu Systems - CodeMeter Runtime - security vulnerability addressed

      A report has been received for the following security vulnerability in the zenon software platform: CVE-2023-3935 Further details regarding the vulnerability, mitigation options and product fixes that may be available, can be found in the document ...