The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:

vulnerability 12260

SAP: vulnerability 1772498

Synthesis of the vulnerability

An unknown vulnerability was announced in SAP products.
Impacted products: Business Objects, Crystal Enterprise, Crystal Reports, SAP ERP, NetWeaver.
Severity: 2/4.
Consequences: unknown consequence, administrator access/rights, privileged access/rights, user access/rights, client access/rights, data reading, data creation/edition, data deletion, data flow, denial of service on server, denial of service on service, denial of service on client, disguisement.
Provenance: document.
Creation date: 21/12/2012.
Identifiers: 1772498, DOC-8218, VIGILANCE-VUL-12260.

Description of the vulnerability

An unknown vulnerability was announced in SAP products.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2013-3244

SAP ERP Central Component: code execution via Project System

Synthesis of the vulnerability

A network attacker can call the RFC CJDB_FILL_MEMORY_FROM_PPB function of SAP ERP Central Component Project System, in order to inject code.
Impacted products: SAP ERP.
Severity: 3/4.
Consequences: user access/rights, data reading, data creation/edition, data deletion.
Provenance: intranet client.
Creation date: 21/12/2012.
Revision date: 07/05/2013.
Identifiers: 1776695, BID-59677, CVE-2013-3244, DOC-8218, ESNC-2013-005, VIGILANCE-VUL-12259.

Description of the vulnerability

The SAP ERP Project System component is used to manage costs and resources for a project.

It exports the CJDB_FILL_MEMORY_FROM_PPB function, which is reachable via a RFC call. However, this function does not correctly process its parameters.

A network attacker can therefore call the RFC CJDB_FILL_MEMORY_FROM_PPB function of SAP ERP Central Component Project System, in order to inject code.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin 12258

SAP: vulnerability 1714607

Synthesis of the vulnerability

An unknown vulnerability was announced in SAP products.
Impacted products: Business Objects, Crystal Enterprise, Crystal Reports, SAP ERP, NetWeaver.
Severity: 2/4.
Consequences: unknown consequence, administrator access/rights, privileged access/rights, user access/rights, client access/rights, data reading, data creation/edition, data deletion, data flow, denial of service on server, denial of service on service, denial of service on client, disguisement.
Provenance: document.
Creation date: 21/12/2012.
Identifiers: 1714607, DOC-8218, VIGILANCE-VUL-12258.

Description of the vulnerability

An unknown vulnerability was announced in SAP products.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce 12257

SAP: vulnerability 1773758

Synthesis of the vulnerability

An unknown vulnerability was announced in SAP products.
Impacted products: Business Objects, Crystal Enterprise, Crystal Reports, SAP ERP, NetWeaver.
Severity: 2/4.
Consequences: unknown consequence, administrator access/rights, privileged access/rights, user access/rights, client access/rights, data reading, data creation/edition, data deletion, data flow, denial of service on server, denial of service on service, denial of service on client, disguisement.
Provenance: document.
Creation date: 21/12/2012.
Identifiers: 1773758, DOC-8218, VIGILANCE-VUL-12257.

Description of the vulnerability

An unknown vulnerability was announced in SAP products.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert 12256

SAP: vulnerability 1769099

Synthesis of the vulnerability

An unknown vulnerability was announced in SAP products.
Impacted products: Business Objects, Crystal Enterprise, Crystal Reports, SAP ERP, NetWeaver.
Severity: 2/4.
Consequences: unknown consequence, administrator access/rights, privileged access/rights, user access/rights, client access/rights, data reading, data creation/edition, data deletion, data flow, denial of service on server, denial of service on service, denial of service on client, disguisement.
Provenance: document.
Creation date: 21/12/2012.
Identifiers: 1769099, DOC-8218, VIGILANCE-VUL-12256.

Description of the vulnerability

An unknown vulnerability was announced in SAP products.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability 12255

SAP: vulnerability 1771020

Synthesis of the vulnerability

An unknown vulnerability was announced in SAP products.
Impacted products: Business Objects, Crystal Enterprise, Crystal Reports, SAP ERP, NetWeaver.
Severity: 2/4.
Consequences: unknown consequence, administrator access/rights, privileged access/rights, user access/rights, client access/rights, data reading, data creation/edition, data deletion, data flow, denial of service on server, denial of service on service, denial of service on client, disguisement.
Provenance: document.
Creation date: 21/12/2012.
Identifiers: 1771020, DOC-8218, VIGILANCE-VUL-12255.

Description of the vulnerability

An unknown vulnerability was announced in SAP products.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2012-4826

IBM DB2 10.1: vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of IBM DB2, in order to create a denial of service or to elevate his privileges.
Impacted products: DB2 UDB.
Severity: 2/4.
Consequences: user access/rights, denial of service on service.
Provenance: document.
Number of vulnerabilities in this bulletin: 2.
Creation date: 21/12/2012.
Identifiers: BID-56133, CVE-2012-4826, IC86781, IC86783, swg21610582, swg21614536, VIGILANCE-VUL-12254.

Description of the vulnerability

Several vulnerabilities were announced in IBM DB2.

An attacker can use a persistent query, in order to create a buffer overflow. [severity:2/4; BID-56133, CVE-2012-4826, IC86781, IC86783, swg21614536]

Previous vulnerabilities were described in VIGILANCE-VUL-11949. [severity:1/4]
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2012-2291

EMC Avamar: file corruption via Backup client for Linux

Synthesis of the vulnerability

When EMC Avamar Backup client for Linux is used, permissions on the cache directory allows a local attacker to corrupt a file with root privileges.
Impacted products: Avamar.
Severity: 1/4.
Consequences: data creation/edition.
Provenance: user shell.
Creation date: 21/12/2012.
Revision date: 22/01/2013.
Identifiers: BID-57005, CERTA-2013-AVI-057, CVE-2012-2291, ESA-2013-003, VIGILANCE-VUL-12253.

Description of the vulnerability

The EMC Avamar product uses the Backup client for Linux, in order to save desktop data.

Backup client for Linux stores its data in the /var/avamar (or /usr/local/avamar/var, or /opt/AVMRclnt/var) cache directory. However, after its execution, files in this directory are publicly writable.

When EMC Avamar Backup client for Linux is used, permissions on the cache directory therefore allows a local attacker to corrupt a file with root privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce 12252

Arkoon FAST360: vulnerability of akserver

Synthesis of the vulnerability

An attacker can use a vulnerability of the AUTH module of akserver.
Impacted products: Arkoon FAST360.
Severity: 3/4.
Consequences: unknown consequence, administrator access/rights, privileged access/rights, user access/rights, client access/rights, data reading, data creation/edition, data deletion, data flow, denial of service on server, denial of service on service, denial of service on client, disguisement.
Provenance: internet client.
Creation date: 21/12/2012.
Identifiers: AK-2012-05-FR_FAST360_Akserver-AUTH.pdf, VIGILANCE-VUL-12252.

Description of the vulnerability

An attacker can use a vulnerability of the AUTH module of akserver.

Technical details are unknown (the Arkoon server is currently unreachable).
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2012-6324 CVE-2012-6325

VMware vCenter Server Appliance: uncontroled file access

Synthesis of the vulnerability

An attacker can use two vulnerabilities of vCenter, in order to fetch arbitrary selected file from the server.
Impacted products: vCenter Server, VMware vSphere.
Severity: 2/4.
Consequences: data reading.
Provenance: intranet client.
Number of vulnerabilities in this bulletin: 2.
Creation date: 21/12/2012.
Identifiers: BID-57021, BID-57022, CERTA-2012-AVI-759, CVE-2012-6324, CVE-2012-6325, VIGILANCE-VUL-12250, VMSA-2012-0005.4, VMSA-2012-0013.2, VMSA-2012-0018, VMSA-2012-0018.1, VMSA-2013-0001.2, VMSA-2013-0003.

Description of the vulnerability

An attacker can use two vulnerabilities of vCenter, in order to fetch arbitrary selected file from the server.

An attacker can pass a malicious file patch to a command for vCenter Server Appliance, in order to fetch arbitrarily selected files from the server. [severity:2/4; BID-57021, CVE-2012-6324]

An attacker can submit a malicious XML file to vCenter Server Appliance, in order to get arbitrarily selected file from the server. The announce does not state what the error is, but it might be a lack a filtering in external entities resolution. [severity:2/4; BID-57022, CVE-2012-6325]
Full Vigil@nce bulletin... (Free trial)

Previous page   Next page

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1121 1141 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1181 1201 1221 1241 1261 1281 1301 1321 1341 1361 1381 1401 1421 1441 1461 1481 1501 1521 1541 1561 1581 1601 1621 1641 1661 1681 1701 1721 1741 1761 1781 1801 1821 1841 1861 1881 1901 1921 1941 1961 1981 2001 2021 2041 2061 2081 2101 2121 2141 2161 2181 2201 2221 2241 2261 2281 2301 2321 2341 2361 2381 2401 2421 2441 2461 2481 2501 2521 2541 2561 2581 2601 2621 2641 2661 2681 2701 2721 2741 2761 2781 2801 2821 2841 2846