The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:

computer threat CVE-2014-8310

SAP BusinessObjects: denial of service via CORBA OSCAFactory-Session

Synthesis of the vulnerability

An attacker can use CORBA OSCAFactory::Session of SAP BusinessObjects, in order to trigger a denial of service.
Severity: 2/4.
Creation date: 10/06/2014.
Revision date: 10/10/2014.
Identifiers: 2001106, CVE-2014-8310, DOC-8218, ONAPSIS-2014-030, VIGILANCE-VUL-14863.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The SAP BusinessObjects product offers a CORBA service.

However, an attacker can call OSCAFactory::Session to stop CORBA.

An attacker can therefore use CORBA OSCAFactory::Session of SAP BusinessObjects, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2014-8309

SAP BusinessObjects: information disclosure

Synthesis of the vulnerability

An attacker can use SAP BusinessObjects, in order to obtain sensitive information.
Severity: 2/4.
Creation date: 10/06/2014.
Revision date: 10/10/2014.
Identifiers: 2001109, CVE-2014-8309, DOC-8218, ONAPSIS-2014-029, VIGILANCE-VUL-14862.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The SAP BusinessObjects product offers a web service.

However, an attacker can measure the response time, in order to detect users.

An attacker can therefore use SAP BusinessObjects, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

security threat CVE-2014-8313

SAP HANA: code execution via net.xsjs

Synthesis of the vulnerability

An attacker can use net.xsjs of SAP HANA, in order to execute code.
Severity: 2/4.
Creation date: 10/06/2014.
Revision date: 10/10/2014.
Identifiers: 2015446, CVE-2014-8313, DOC-8218, ONAPSIS-2014-028, VIGILANCE-VUL-14861.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The SAP HANA product offers a web service.

However, an attacker can access to /sap/hana/ide/core/base/server/net.xsjs to execute XSJS code.

An attacker can therefore use net.xsjs of SAP HANA, in order to execute code.
Full Vigil@nce bulletin... (Free trial)

threat 14860

SAP HANA: SQL injection

Synthesis of the vulnerability

An attacker can use a SQL injection of SAP HANA, in order to read or alter data.
Severity: 2/4.
Creation date: 10/06/2014.
Identifiers: 2014881, DOC-8218, ERPSCAN-14-009, VIGILANCE-VUL-14860.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The SAP HANA product uses a database.

However, user's data are directly inserted in a SQL query.

An attacker can therefore use a SQL injection of SAP HANA, in order to read or alter data.
Full Vigil@nce bulletin... (Free trial)

computer threat bulletin CVE-2014-3038

IBM SPSS Modeler: privilege escalation via Root GID

Synthesis of the vulnerability

An attacker can use IBM SPSS Modeler, in order to escalate his privileges.
Severity: 2/4.
Creation date: 10/06/2014.
Identifiers: 7042179, CVE-2014-3038, PI17131, VIGILANCE-VUL-14858.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The IBM SPSS Modeler product can be installed on Unix platforms.

However, started processes do not loose privileges of the root group.

An attacker can therefore use IBM SPSS Modeler, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

security announce CVE-2014-3292

Cisco Unified Communications Manager: directory traversal of RTMT

Synthesis of the vulnerability

An attacker can traverse directories in RTMT of Cisco Unified Communications Manager, in order to read or delete a file outside the service root path.
Severity: 2/4.
Creation date: 10/06/2014.
Identifiers: CSCuo17199, CSCuo17302, CVE-2014-3292, VIGILANCE-VUL-14857.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The Cisco Unified Communications Manager product offers a web service.

However, user's data are directly inserted in an access path. Sequences such as "/.." can thus be used to go in the upper directory.

An attacker can therefore traverse directories in RTMT of Cisco Unified Communications Manager, in order to read or delete a file outside the service root path.
Full Vigil@nce bulletin... (Free trial)

computer threat note CVE-2014-3287

Cisco Unified Communications Manager: SQL injection of BulkViewFileContentsAction.java

Synthesis of the vulnerability

An attacker can use a SQL injection in BulkViewFileContentsAction.java of Cisco Unified Communications Manager, in order to read or alter data.
Severity: 2/4.
Creation date: 10/06/2014.
Identifiers: CSCuo17337, CVE-2014-3287, VIGILANCE-VUL-14856.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The Cisco Unified Communications Manager product uses a database.

However, user's data are directly inserted in a SQL query by BulkViewFileContentsAction.java.

An attacker can therefore use a SQL injection in BulkViewFileContentsAction.java of Cisco Unified Communications Manager, in order to read or alter data.
Full Vigil@nce bulletin... (Free trial)

threat bulletin 14855

WordPress Elegance: information disclosure

Synthesis of the vulnerability

An attacker can read a file with WordPress Elegance, in order to obtain sensitive information.
Severity: 1/4.
Creation date: 10/06/2014.
Identifiers: VIGILANCE-VUL-14855.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The Elegance theme can be installed on WordPress.

However, an attacker can post a form, in order to read a file.

An attacker can therefore read a file with WordPress Elegance, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

vulnerability 14854

WordPress Infocus: information disclosure

Synthesis of the vulnerability

An attacker can read a file with WordPress Infocus, in order to obtain sensitive information.
Severity: 1/4.
Creation date: 10/06/2014.
Identifiers: VIGILANCE-VUL-14854.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The Infocus theme can be installed on WordPress.

However, an attacker can post a form, in order to read a file.

An attacker can therefore read a file with WordPress Infocus, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

cybersecurity threat 14853

WordPress Featured Comments: Cross Site Request Forgery

Synthesis of the vulnerability

An attacker can trigger a Cross Site Request Forgery of WordPress Featured Comments, in order to force the victim to perform operations.
Severity: 2/4.
Creation date: 10/06/2014.
Identifiers: VIGILANCE-VUL-14853.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The Featured Comments plugin can be installed on WordPress.

However, the origin of queries is not checked. They can for example originate from an image included in an HTML document.

An attacker can therefore trigger a Cross Site Request Forgery of WordPress Featured Comments, in order to force the victim to perform operations.
Full Vigil@nce bulletin... (Free trial)

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1121 1141 1161 1181 1201 1221 1241 1261 1281 1301 1321 1341 1361 1381 1391 1392 1393 1394 1395 1396 1397 1398 1399 1401 1403 1404 1405 1406 1407 1408 1409 1410 1411 1421 1441 1461 1481 1501 1521 1541 1561 1581 1601 1621 1641 1661 1681 1701 1721 1741 1761 1781 1801 1821 1841 1861 1881 1901 1921 1941 1961 1981 2001 2021 2041 2061 2081 2101 2121 2141 2161 2181 2201 2221 2241 2261 2281 2301 2321 2341 2361 2381 2401 2421 2441 2461 2481 2501 2521 2541 2561 2581 2601 2621 2641 2661 2681 2701 2721 2741 2761 2781 2801 2821 2841 2861 2881 2901 2921 2930