The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:

computer vulnerability CVE-2015-1652 CVE-2015-1657 CVE-2015-1659

Internet Explorer: ten vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Internet Explorer.
Impacted products: IE.
Severity: 4/4.
Consequences: user access/rights.
Provenance: document.
Number of vulnerabilities in this bulletin: 10.
Creation date: 14/04/2015.
Identifiers: 3038314, CERTFR-2015-AVI-150, CVE-2015-1652, CVE-2015-1657, CVE-2015-1659, CVE-2015-1660, CVE-2015-1661, CVE-2015-1662, CVE-2015-1665, CVE-2015-1666, CVE-2015-1667, CVE-2015-1668, MS15-032, VIGILANCE-VUL-16595, ZDI-15-124, ZDI-15-125, ZDI-15-126, ZDI-15-127, ZDI-15-128, ZDI-15-129, ZDI-15-130, ZDI-15-131, ZDI-15-136.

Description of the vulnerability

Several vulnerabilities were announced in Internet Explorer.

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to execute code. [severity:4/4; CVE-2015-1652, ZDI-15-131]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to execute code. [severity:4/4; CVE-2015-1657]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to execute code. [severity:4/4; CVE-2015-1659, ZDI-15-136]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to execute code. [severity:4/4; CVE-2015-1660, ZDI-15-126]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to execute code. [severity:4/4; CVE-2015-1661, ZDI-15-127]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to execute code. [severity:4/4; CVE-2015-1662]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to execute code. [severity:4/4; CVE-2015-1665, ZDI-15-128]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to execute code. [severity:4/4; CVE-2015-1666, ZDI-15-129]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to execute code. [severity:4/4; CVE-2015-1667, ZDI-15-130]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to execute code. [severity:4/4; CVE-2015-1668, ZDI-15-124, ZDI-15-125]
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2015-1855

Ruby: accepting Wildcard IDN

Synthesis of the vulnerability

An attacker can create a Wildcard IDN certificate, which is accepted by Ruby, in order to perform a Man-in-the-Middle.
Impacted products: Debian, Fedora, openSUSE Leap, Solaris, Puppet, SUSE Linux Enterprise Desktop, SLES, Ubuntu, Unix (platform) ~ not comprehensive.
Severity: 1/4.
Consequences: data reading, data creation/edition.
Provenance: internet client.
Creation date: 14/04/2015.
Identifiers: bulletinjul2015, CVE-2015-1855, DSA-3245-1, DSA-3246-1, DSA-3247-1, FEDORA-2015-6377, MDVSA-2015:224, openSUSE-SU-2017:1128-1, SUSE-SU-2017:1067-1, USN-3365-1, VIGILANCE-VUL-16594.

Description of the vulnerability

An IDN (International Domain Name) can contain encoded Unicode characters. For example:
  www.xn--kcry6tjko.example.org

A X.509 certificate can contain the '*' character to indicate that it can be used on servers with the same sub-domain. For example:
  w*.example.org

The RFC 6125 forbids wildcard characters in certificates for IDN. For example:
  xn--kcry6tjko*.example.org

However, Ruby allows these certificates.

An attacker can therefore create a Wildcard IDN certificate, which is accepted by Ruby, in order to perform a Man-in-the-Middle.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2015-3978 CVE-2015-3979 CVE-2015-3980

SAP: multiple vulnerabilities of April 2015

Synthesis of the vulnerability

An attacker can use several vulnerabilities of SAP.
Impacted products: Business Objects, Crystal Enterprise, Crystal Reports, SAP ERP, NetWeaver, ASE.
Severity: 2/4.
Consequences: unknown consequence, administrator access/rights, privileged access/rights, user access/rights, client access/rights, data reading, data creation/edition, data deletion, data flow, denial of service on server, denial of service on service, denial of service on client, disguisement.
Provenance: document.
Number of vulnerabilities in this bulletin: 4.
Creation date: 14/04/2015.
Identifiers: CVE-2015-3978, CVE-2015-3979, CVE-2015-3980, CVE-2015-3981, DOC-8218, VIGILANCE-VUL-16593.

Description of the vulnerability

Several vulnerabilities were announced in SAP.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce 16592

WordPress Mobile Edition: directory traversal

Synthesis of the vulnerability

An attacker can traverse directories of WordPress Mobile Edition, in order to read a file outside the service root path.
Impacted products: WordPress Plugins ~ not comprehensive.
Severity: 2/4.
Consequences: data reading.
Provenance: internet client.
Creation date: 14/04/2015.
Identifiers: VIGILANCE-VUL-16592.

Description of the vulnerability

The Mobile Edition plugin can be installed on WordPress.

However, user's data are directly inserted in an access path. Sequences such as "/.." can thus be used to go in the upper directory.

An attacker can therefore traverse directories of WordPress Mobile Edition, in order to read a file outside the service root path.
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2015-3325

WordPress WP Symposium: SQL injection

Synthesis of the vulnerability

An attacker can use a SQL injection of WordPress WP Symposium, in order to read or alter data.
Impacted products: WordPress Plugins ~ not comprehensive.
Severity: 2/4.
Consequences: data reading, data creation/edition, data deletion.
Provenance: internet client.
Creation date: 14/04/2015.
Identifiers: CVE-2015-3325, VIGILANCE-VUL-16590.

Description of the vulnerability

The WordPress WP Symposium product uses a database.

However, user's data are directly inserted in a SQL query.

An attacker can therefore use a SQL injection of WordPress WP Symposium, in order to read or alter data.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2015-3314

WordPress Tune Library: SQL injection

Synthesis of the vulnerability

An attacker can use a SQL injection of WordPress Tune Library, in order to read or alter data.
Impacted products: WordPress Plugins ~ not comprehensive.
Severity: 2/4.
Consequences: data reading, data creation/edition, data deletion.
Provenance: internet client.
Creation date: 14/04/2015.
Identifiers: CVE-2015-3314, VIGILANCE-VUL-16589.

Description of the vulnerability

The WordPress Tune Library product uses a database.

However, user's data are directly inserted in a SQL query.

An attacker can therefore use a SQL injection of WordPress Tune Library, in order to read or alter data.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2015-3313

WordPress Community Events: SQL injection

Synthesis of the vulnerability

An attacker can use a SQL injection of WordPress Community Events, in order to read or alter data.
Impacted products: WordPress Plugins ~ not comprehensive.
Severity: 2/4.
Consequences: data reading, data creation/edition, data deletion.
Provenance: internet client.
Creation date: 14/04/2015.
Identifiers: CVE-2015-3313, VIGILANCE-VUL-16588.

Description of the vulnerability

The WordPress Community Events product uses a database.

However, user's data are directly inserted in a SQL query.

An attacker can therefore use a SQL injection of WordPress Community Events, in order to read or alter data.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2015-0693

Cisco WSA: code execution via Pickle

Synthesis of the vulnerability

A local attacker can use Pickle of Cisco WSA, in order to execute code.
Impacted products: AsyncOS, IronPort Web, Cisco WSA.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights, user access/rights.
Provenance: user account.
Creation date: 14/04/2015.
Identifiers: 38306, CSCut39259, CVE-2015-0693, VIGILANCE-VUL-16587.

Description of the vulnerability

The Cisco Web Security Appliance product uses the Pickle Python module to convert between file formats.

However, this module accepts to unserialize malicious data, and to interpret them.

A local attacker can therefore use Pickle of Cisco WSA, in order to execute code.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2015-3310

ppp: denial of service via too high PID

Synthesis of the vulnerability

An attacker can send many requests to pppd, in order to trigger an exception and so a denial of service.
Impacted products: Debian, openSUSE, openSUSE Leap, Slackware, Ubuntu.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service, denial of service on client.
Provenance: intranet client.
Creation date: 14/04/2015.
Identifiers: 782450, CVE-2015-3310, DSA-3228-1, MDVSA-2015:222, openSUSE-SU-2015:2121-1, SSA:2015-111-11, USN-2595-1, VIGILANCE-VUL-16586.

Description of the vulnerability

The ppp product manages the point to point connections, as used for instance in tunneling.

A separate pppd process is created for each incoming tunneling request. However, pppd assumes that process identifiers are 16 bits wide and uses this identifier to build a string. When the PID grows above that, protection mechanisms against buffer overflow in the C library trigger an exception and halts the pppd server process.

An attacker can therefore send many requests to pppd, in order to trigger a fatal exception and so a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2015-1867

pacemaker: privilege escalation via role assignment

Synthesis of the vulnerability

An attacker can use read right to the pacemaker configuration, in order to escalate his privileges.
Impacted products: Fedora, Pacemaker, RHEL.
Severity: 3/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user account.
Creation date: 14/04/2015.
Identifiers: 1211370, CVE-2015-1867, FEDORA-2015-e5e36bbb87, FEDORA-2015-f6860d8f9d, RHSA-2015:1424-01, RHSA-2015:2383-01, VIGILANCE-VUL-16585.

Description of the vulnerability

The pacemaker product manages load balancing.

It allows to define access rights to the configuration and discriminate between read and write access. However, a read right can be used to assign a role with write access.

An attacker can therefore use read right to the pacemaker configuration, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

Previous page   Next page

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1121 1141 1161 1181 1201 1221 1241 1261 1281 1301 1321 1341 1361 1381 1401 1421 1441 1461 1481 1501 1521 1541 1553 1554 1555 1556 1557 1558 1559 1560 1561 1562 1563 1564 1565 1566 1567 1568 1569 1570 1571 1572 1573 1581 1601 1621 1641 1661 1681 1701 1721 1741 1761 1781 1801 1821 1841 1861 1881 1901 1921 1941 1961 1981 2001 2021 2041 2061 2081 2101 2121 2141 2161 2181 2201 2221 2241 2261 2281 2301 2321 2341 2361 2381 2401 2421 2441 2461 2481 2501 2521 2541 2561 2581 2601 2621 2641 2661 2681 2701 2721 2741 2761 2781 2801 2821 2841 2846