The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:

threat announce CVE-2013-7252

KWallet: ECB encryption

Synthesis of the vulnerability

An attacker, who can access to a wallet encrypted with KWallet, may potentially decipher it more easily.
Severity: 1/4.
Creation date: 09/01/2015.
Identifiers: CVE-2013-7252, FEDORA-2015-0564, FEDORA-2015-0569, VIGILANCE-VUL-15941.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The KWallet product is used to store passwords by encrypting them.

However, the wallet is encrypted using the ECB (Electronic Code Book) algorithm instead of CBC (Cipher Block Chaining). Identical blocks thus produce identical cyphers, which may be used to make their decryption easier.

An attacker, who can access to a wallet encrypted with KWallet, may therefore potentially decipher it more easily.
Full Vigil@nce bulletin... (Free trial)

threat note CVE-2015-1402 CVE-2015-1403 CVE-2015-1404

TYPO3 Content Rating Extbase: two vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of TYPO3 Content Rating Extbase.
Severity: 2/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 09/01/2015.
Identifiers: CVE-2015-1402, CVE-2015-1403, CVE-2015-1404, CVE-2015-1405, TYPO3-EXT-SA-2015-003, VIGILANCE-VUL-15940.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

Several vulnerabilities were announced in TYPO3 Content Rating Extbase.

An attacker can trigger a Cross Site Scripting, in order to execute JavaScript code in the context of the web site. [severity:2/4; CVE-2015-1402, CVE-2015-1404]

An attacker can use a SQL injection, in order to read or alter data. [severity:2/4; CVE-2015-1403, CVE-2015-1405]
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2015-1402 CVE-2015-1403 CVE-2015-1404

TYPO3 Content Rating: two vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of TYPO3 Content Rating.
Severity: 2/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 09/01/2015.
Identifiers: CVE-2015-1402, CVE-2015-1403, CVE-2015-1404, CVE-2015-1405, TYPO3-EXT-SA-2015-002, VIGILANCE-VUL-15939.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

Several vulnerabilities were announced in TYPO3 Content Rating.

An attacker can trigger a Cross Site Scripting, in order to execute JavaScript code in the context of the web site. [severity:2/4; CVE-2015-1402, CVE-2015-1404]

An attacker can use a SQL injection, in order to read or alter data. [severity:2/4; CVE-2015-1403, CVE-2015-1405]
Full Vigil@nce bulletin... (Free trial)

security note CVE-2014-8028

Cisco Secure ACS: Cross Site Scripting

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting of Cisco Secure ACS, in order to execute JavaScript code in the context of the web site.
Severity: 2/4.
Creation date: 09/01/2015.
Identifiers: CSCuq79019, CVE-2014-8028, VIGILANCE-VUL-15938.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The Cisco Secure ACS product offers a web service.

However, it does not filter received data before inserting them in generated HTML documents.

An attacker can therefore trigger a Cross Site Scripting of Cisco Secure ACS, in order to execute JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

weakness note CVE-2014-8027

Cisco Secure ACS: privilege escalation

Synthesis of the vulnerability

An authenticated attacker can manipulate Network Identity Groups of Cisco Secure ACS, in order to escalate his privileges.
Severity: 2/4.
Creation date: 09/01/2015.
Identifiers: CSCuq79034, CVE-2014-8027, VIGILANCE-VUL-15937.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The Cisco Secure ACS product offers a web service.

Only Network Device Administrator are allowed to manipulate Network Identity Groups. However, an error of RBAC (Role Based Access Control) allows all authenticated users on the web service to perform these operations.

An authenticated attacker can therefore manipulate Network Identity Groups of Cisco Secure ACS, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

computer threat announce CVE-2014-8029

Cisco Secure ACS: open redirect

Synthesis of the vulnerability

An attacker can deceive the user of Cisco Secure ACS, in order to redirect him to a malicious site.
Severity: 1/4.
Creation date: 09/01/2015.
Identifiers: CSCuq74150, CVE-2014-8029, VIGILANCE-VUL-15936.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The Cisco Secure ACS product offers a web service.

However, the web service accepts to redirect the victim with no warning, to an external site indicated by the attacker.

An attacker can therefore deceive the user of Cisco Secure ACS, in order to redirect him to a malicious site.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2014-9308

WordPress Shopping Cart: file upload

Synthesis of the vulnerability

An attacker can upload a malicious file on WordPress Shopping Cart, in order for example to upload a Trojan.
Severity: 3/4.
Creation date: 09/01/2015.
Identifiers: CVE-2014-9308, VIGILANCE-VUL-15935.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The Shopping Cart plugin can be installed on WordPress.

It can be used to upload a file. However, as the file type is not restricted, a PHP file can be uploaded on the server, and then executed.

An attacker can therefore upload a malicious file on WordPress Shopping Cart, in order for example to upload a Trojan.
Full Vigil@nce bulletin... (Free trial)

computer weakness alert CVE-2014-3570 CVE-2014-3571 CVE-2014-3572

OpenSSL: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of OpenSSL.
Severity: 2/4.
Number of vulnerabilities in this bulletin: 7.
Creation date: 08/01/2015.
Identifiers: 1610582, 1699810, 1700997, 1902260, 1903541, 1973383, 55767, 9010028, ARUBA-PSA-2015-003, bulletinjan2015, c04556853, c04679334, CERTFR-2015-AVI-008, CERTFR-2015-AVI-108, CERTFR-2015-AVI-146, CERTFR-2016-AVI-303, cisco-sa-20150310-ssl, cpuapr2017, cpujul2018, cpuoct2016, cpuoct2017, CTX216642, CVE-2014-3570, CVE-2014-3571, CVE-2014-3572, CVE-2014-8275, CVE-2015-0204, CVE-2015-0205, CVE-2015-0206, DSA-3125-1, FEDORA-2015-0512, FEDORA-2015-0601, FreeBSD-SA-15:01.openssl, HPSBUX03244, HPSBUX03334, JSA10679, MDVSA-2015:019, MDVSA-2015:062, MDVSA-2015:063, NetBSD-SA2015-006, NetBSD-SA2015-007, NTAP-20150205-0001, openSUSE-SU-2015:0130-1, openSUSE-SU-2015:1277-1, openSUSE-SU-2016:0640-1, RHSA-2015:0066-01, RHSA-2015:0800-01, SA40015, SA88, SB10108, SOL16120, SOL16123, SOL16124, SOL16126, SOL16135, SOL16136, SOL16139, SP-CAAANXD, SPL-95203, SPL-95206, SSA:2015-009-01, SSRT101885, SSRT102000, SUSE-SU-2015:1138-1, SUSE-SU-2015:1161-1, USN-2459-1, VIGILANCE-VUL-15934, VU#243585.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

Several vulnerabilities were announced in OpenSSL.

An attacker can send a DTLS message, to force a NULL pointer to be dereferenced in dtls1_get_record(), in order to trigger a denial of service. [severity:2/4; CVE-2014-3571]

An attacker can send a DTLS message, to create a memory leak in dtls1_buffer_record(), in order to trigger a denial of service. [severity:1/4; CVE-2015-0206]

An attacker can force a TLS client to use ECDH instead of ECDHE (ephemeral). [severity:2/4; CVE-2014-3572]

An attacker can force a TLS client to use EXPORT_RSA instead of RSA (VIGILANCE-VUL-16301). [severity:2/4; CVE-2015-0204, VU#243585]

An attacker can authenticate without using a private key, in the case where the server trusts a certification authority publishing certificates with DH keys (rare case) (VIGILANCE-VUL-16300). [severity:2/4; CVE-2015-0205]

An attacker can change the fingerprint of a certificate, with no known consequence on security. [severity:1/4; CVE-2014-8275]

In some rare cases, the BN_sqr() function produces an invalid result, with no known consequence on security. [severity:1/4; CVE-2014-3570]
Full Vigil@nce bulletin... (Free trial)

computer weakness bulletin CVE-2015-1351 CVE-2015-1352

PHP: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of PHP.
Severity: 2/4.
Number of vulnerabilities in this bulletin: 5.
Creation date: 08/01/2015.
Revisions dates: 08/01/2015, 04/02/2015.
Identifiers: bulletinjul2015, c04686230, CVE-2015-1351, CVE-2015-1352, FEDORA-2015-6399, FEDORA-2015-6407, HPSBUX03337, MDVSA-2015:079, MDVSA-2015:080, RHSA-2015:1053-01, RHSA-2015:1066-01, SSA:2015-111-10, SSRT102066, SUSE-SU-2016:1638-1, SUSE-SU-2019:1746-1, USN-2501-1, VIGILANCE-VUL-15933.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

Several vulnerabilities were announced in PHP.

An attacker can force the usage of a freed memory area in opcache, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; CVE-2015-1351]

An attacker can force a read at an invalid address in fopen, in order to trigger a denial of service. This bug is apparently not a vulnerability. [severity:1/4]

An attacker can force a read at an invalid address in core, in order to trigger a denial of service. This bug is apparently not a vulnerability. [severity:1/4]

An attacker can force a NULL pointer to be dereferenced in pgsql, in order to trigger a denial of service. [severity:1/4; CVE-2015-1352]

An attacker can force a NULL pointer to be dereferenced in ereg, in order to trigger a denial of service. [severity:1/4]
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2014-9569

SAP NetWeaver Business Client for HTML 3.0: Cross Site Scripting

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting of SAP NetWeaver Business Client for HTML 3.0, in order to execute JavaScript code in the context of the web site.
Severity: 2/4.
Creation date: 08/01/2015.
Identifiers: 2051285, CVE-2014-9569, SOS-14-005, VIGILANCE-VUL-15932.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The SAP NetWeaver Business Client for HTML 3.0 product offers a web service.

However, it does not filter received data before inserting them in generated HTML documents.

An attacker can therefore trigger a Cross Site Scripting of SAP NetWeaver Business Client for HTML 3.0, in order to execute JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1121 1141 1161 1181 1201 1221 1241 1261 1281 1301 1321 1341 1361 1381 1401 1421 1441 1461 1481 1491 1492 1493 1494 1495 1496 1497 1498 1499 1501 1503 1504 1505 1506 1507 1508 1509 1510 1511 1521 1541 1561 1581 1601 1621 1641 1661 1681 1701 1721 1741 1761 1781 1801 1821 1841 1861 1881 1901 1921 1941 1961 1981 2001 2021 2041 2061 2081 2101 2121 2141 2161 2181 2201 2221 2241 2261 2281 2301 2321 2341 2361 2381 2401 2421 2441 2461 2481 2501 2521 2541 2561 2581 2601 2621 2641 2661 2681 2701 2721 2741 2761 2781 2801 2821 2841 2861 2881 2901 2921 2927