The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:

cybersecurity announce CVE-2015-0593

Cisco IOS: denial of service via Zone-Based Firewall Session Objects

Synthesis of the vulnerability

An attacker can send a malicious Zone-Based Firewall Session Objects packet to Cisco IOS, in order to trigger a denial of service.
Severity: 2/4.
Creation date: 10/02/2015.
Identifiers: CSCul65003, CVE-2015-0593, VIGILANCE-VUL-16146.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The Cisco IOS product offers a Zone-Based Firewall feature.

However, when a malicious traffic is received, a fatal error occurs in the management of session objects.

An attacker can therefore send malicious data for the Zone-Based Firewall of Cisco IOS, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer threat alert CVE-2015-0592

Cisco IOS: denial of service via Zone-Based Firewall Kernel Timer

Synthesis of the vulnerability

An attacker can send malicious data for the Zone-Based Firewall of Cisco IOS, in order to trigger a denial of service.
Severity: 2/4.
Creation date: 10/02/2015.
Identifiers: CSCuh25672, CVE-2015-0592, VIGILANCE-VUL-16145.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The Cisco IOS product offers a Zone-Based Firewall feature.

However, when a malicious traffic is received, a fatal error occurs in the management of kernel timers.

An attacker can therefore send malicious data for the Zone-Based Firewall of Cisco IOS, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

cybersecurity bulletin CVE-2015-0226 CVE-2015-0227

Apache WSS4J: two vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Apache WSS4J.
Severity: 2/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 10/02/2015.
Identifiers: 1959083, CVE-2015-0226, CVE-2015-0227, RHSA-2015:0773-01, RHSA-2015:0846-01, RHSA-2015:0847-01, RHSA-2015:0848-01, RHSA-2015:0849-01, RHSA-2015:1176-01, RHSA-2015:1177-01, VIGILANCE-VUL-16144.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

Several vulnerabilities were announced in Apache WSS4J.

An attacker can analyze decryption errors of XML Encryption with PKCS#1 v1.5 Key Transport Algorithm, in order to perform a Bleichenbacher attack. [severity:2/4; CVE-2015-0226]

An attacker can bypass the requireSignedEncryptedDataElements directive, in order to ignore the signature. [severity:2/4; CVE-2015-0227]
Full Vigil@nce bulletin... (Free trial)

security bulletin CVE-2015-0606

Cisco IOS: denial of service via Shell

Synthesis of the vulnerability

A local authenticated attacker can use a malicious Shell command on Cisco IOS, in order to trigger a denial of service.
Severity: 1/4.
Creation date: 10/02/2015.
Identifiers: CSCur59696, CVE-2015-0606, VIGILANCE-VUL-16143.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

A local authenticated attacker can use a malicious Shell command on Cisco IOS, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2014-3365

Cisco Prime Security Manager: Cross Site Scripting

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting of Cisco Prime Security Manager, in order to execute JavaScript code in the context of the web site.
Severity: 2/4.
Creation date: 10/02/2015.
Identifiers: CSCuo94808, CVE-2014-3365, VIGILANCE-VUL-16142.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The Cisco Prime Security Manager product offers a web service.

However, it does not filter received data before inserting them in generated HTML documents.

An attacker can therefore trigger a Cross Site Scripting of Cisco Prime Security Manager, in order to execute JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2014-2147

Cisco Prime Infrastructure: Cross Frame Scripting

Synthesis of the vulnerability

An attacker can trigger a Cross Frame Scripting of Cisco Prime Infrastructure, in order to execute JavaScript code in the context of the web site.
Severity: 2/4.
Creation date: 10/02/2015.
Identifiers: CSCuj42444, CVE-2014-2147, VIGILANCE-VUL-16141.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The Cisco Prime Infrastructure product offers a web service.

However, an attacker can inject an HTML frame.

An attacker can therefore trigger a Cross Frame Scripting of Cisco Prime Infrastructure, in order to execute JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

computer weakness note CVE-2014-2152

Cisco Prime Infrastructure: Cross Site Request Forgery

Synthesis of the vulnerability

An attacker can trigger a Cross Site Request Forgery of Cisco Prime Infrastructure, in order to force the victim to perform operations.
Severity: 2/4.
Creation date: 10/02/2015.
Identifiers: CSCun21868, CVE-2014-2152, VIGILANCE-VUL-16140.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The Cisco Prime Infrastructure product offers a web service.

However, the origin of queries is not checked. They can for example originate from an image included in an HTML document.

An attacker can therefore trigger a Cross Site Request Forgery of Cisco Prime Infrastructure, in order to force the victim to perform operations.
Full Vigil@nce bulletin... (Free trial)

computer threat CVE-2014-2153

Cisco Prime Infrastructure: Cross Site Scripting

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting of Cisco Prime Infrastructure, in order to execute JavaScript code in the context of the web site.
Severity: 2/4.
Creation date: 10/02/2015.
Identifiers: CSCun21869, CVE-2014-2153, VIGILANCE-VUL-16139.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The Cisco Prime Infrastructure product offers a web service.

However, it does not filter received data before inserting them in generated HTML documents.

An attacker can therefore trigger a Cross Site Scripting of Cisco Prime Infrastructure, in order to execute JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2015-1573

Linux kernel: denial of service via nft_flush_table

Synthesis of the vulnerability

A local privileged attacker can force an error in the nft_flush_table() function of the Linux kernel, in order to trigger a denial of service.
Severity: 1/4.
Creation date: 10/02/2015.
Identifiers: 1190966, CERTFR-2015-AVI-263, CVE-2015-1573, RHSA-2015:1137-01, RHSA-2015:1138-01, RHSA-2015:1139-01, VIGILANCE-VUL-16138.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The Linux kernel uses the netfilter firewall, which uses tables which can be flushed by users with the NET_CAP_ADMIN capability.

However, the nft_flush_table() function of the net/netfilter/nf_tables_api.c file can be called to flush twice the same table, which triggers a fatal error.

A local privileged attacker can therefore force an error in the nft_flush_table() function of the Linux kernel, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

security threat CVE-2014-9680

sudo: file reading via TZ

Synthesis of the vulnerability

A local privileged attacker can set the TZ environment variable before calling sudo, in order to force the opening of a file, or a denial of service if this file is blocking.
Severity: 1/4.
Creation date: 10/02/2015.
Identifiers: CVE-2014-9680, DSA-3167-1, FEDORA-2015-2247, FEDORA-2015-2281, MDVSA-2015:126, openSUSE-SU-2015:1913-1, openSUSE-SU-2016:2983-1, openSUSE-SU-2016:3004-1, RHSA-2015:1409-01, SSA:2015-047-03, USN-2533-1, VIGILANCE-VUL-16137.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The sudo program allows some users to execute commands with elevated privileges.

The sudo program filters environment variables which are potentially dangerous. However, sudo transmits the TZ variable, which can indicate the name of a Time Zone file. The target application, linked to the glibc, thus opens this file to analyze its timing information. It can be noted that the content of this file is never returned to the user.

A local privileged attacker can therefore set the TZ environment variable before calling sudo, in order to force the opening of a file, or a denial of service if this file is blocking.
Full Vigil@nce bulletin... (Free trial)

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1121 1141 1161 1181 1201 1221 1241 1261 1281 1301 1321 1341 1361 1381 1401 1421 1441 1461 1481 1501 1511 1512 1513 1514 1515 1516 1517 1518 1519 1521 1523 1524 1525 1526 1527 1528 1529 1530 1531 1541 1561 1581 1601 1621 1641 1661 1681 1701 1721 1741 1761 1781 1801 1821 1841 1861 1881 1901 1921 1941 1961 1981 2001 2021 2041 2061 2081 2101 2121 2141 2161 2181 2201 2221 2241 2261 2281 2301 2321 2341 2361 2381 2401 2421 2441 2461 2481 2501 2521 2541 2561 2581 2601 2621 2641 2661 2681 2701 2721 2741 2761 2781 2801 2821 2841 2861 2881 2901 2921 2924