The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:

computer vulnerability alert 19716

TYPO3 Media management: directory traversal

Synthesis of the vulnerability

An attacker can traverse directories of TYPO3 Media management, in order to read a file outside the service root path.
Impacted products: TYPO3 Extensions ~ not comprehensive.
Severity: 2/4.
Consequences: data reading.
Provenance: internet client.
Creation date: 27/05/2016.
Identifiers: TYPO3-EXT-SA-2016-012, VIGILANCE-VUL-19716.

Description of the vulnerability

The Media management extension can be installed on TYPO3.

However, user's data are directly inserted into an access path. Sequences such as "/.." can thus be used to go in the upper directory.

An attacker can therefore traverse directories of TYPO3 Media management, in order to read a file outside the service root path.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability 19715

TYPO3 Formhandler: Cross Site Scripting

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting of TYPO3 Formhandler, in order to run JavaScript code in the context of the web site.
Impacted products: TYPO3 Extensions ~ not comprehensive.
Severity: 2/4.
Consequences: client access/rights.
Provenance: document.
Creation date: 27/05/2016.
Identifiers: TYPO3-EXT-SA-2016-011, VIGILANCE-VUL-19715.

Description of the vulnerability

The Formhandler extension can be installed on TYPO3.

However, it does not filter received data before inserting them in generated HTML documents.

An attacker can therefore trigger a Cross Site Scripting of TYPO3 Formhandler, in order to run JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

vulnerability note 19714

Webmin: vulnerability via Authentic theme

Synthesis of the vulnerability

A vulnerability via Authentic theme of Webmin was announced.
Impacted products: Webmin.
Severity: 2/4.
Consequences: unknown consequence, administrator access/rights, privileged access/rights, user access/rights, client access/rights, data reading, data creation/edition, data deletion, data flow, denial of service on server, denial of service on service, denial of service on client, disguisement.
Provenance: document.
Creation date: 27/05/2016.
Identifiers: VIGILANCE-VUL-19714.

Description of the vulnerability

A vulnerability via Authentic theme of Webmin was announced.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2016-3721 CVE-2016-3722 CVE-2016-3723

Jenkins: seven vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Jenkins.
Impacted products: Fedora, Jenkins Core.
Severity: 2/4.
Consequences: privileged access/rights, user access/rights, data reading, denial of service on service.
Provenance: intranet client.
Number of vulnerabilities in this bulletin: 7.
Creation date: 27/05/2016.
Identifiers: CVE-2016-3721, CVE-2016-3722, CVE-2016-3723, CVE-2016-3724, CVE-2016-3725, CVE-2016-3726, CVE-2016-3727, FEDORA-2016-9ba53cf8a2, FEDORA-2016-f7e7a6067d, VIGILANCE-VUL-19713.

Description of the vulnerability

Several vulnerabilities were announced in Jenkins.

An attacker can bypass security features via Environment Variables, in order to escalate his privileges. [severity:2/4; CVE-2016-3721]

An attacker can trigger an error via Multiple User Accounts, in order to trigger a denial of service. [severity:2/4; CVE-2016-3722]

An attacker can bypass security features via API, in order to obtain sensitive information. [severity:2/4; CVE-2016-3723]

An attacker can bypass security features via Encrypted Secrets, in order to obtain sensitive information. [severity:2/4; CVE-2016-3724]

An attacker can bypass security features via Update Site Metadata, in order to escalate his privileges. [severity:2/4; CVE-2016-3725]

An attacker can deceive the user via scheme-relative, in order to redirect him to a malicious site. [severity:1/4; CVE-2016-3726]

An attacker can bypass file access restrictions via Node Configurations, in order to obtain sensitive information. [severity:2/4; CVE-2016-3727]
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2013-7456 CVE-2016-4343 CVE-2016-5093

PHP 5: five vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of PHP 5.
Impacted products: Mac OS X, Debian, BIG-IP Hardware, TMOS, Fedora, openSUSE, openSUSE Leap, PHP, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: privileged access/rights, denial of service on server, denial of service on service.
Provenance: document.
Number of vulnerabilities in this bulletin: 5.
Creation date: 26/05/2016.
Identifiers: 71331, 72114, 72135, 72227, 72241, CERTFR-2016-AVI-195, CVE-2013-7456, CVE-2016-4343, CVE-2016-5093, CVE-2016-5094, CVE-2016-5095, CVE-2016-5096, DLA-499-1, DLA-533-1, DSA-3602-1, FEDORA-2016-65f1ffdc0c, FEDORA-2016-6b1938566f, HT206903, K43449212, K51390683, openSUSE-SU-2016:1553-1, openSUSE-SU-2016:1688-1, RHSA-2016:2750-01, SOL43449212, SOL51390683, SSA:2016-148-03, SUSE-SU-2016:1581-1, SUSE-SU-2016:1638-1, USN-3030-1, USN-3045-1, VIGILANCE-VUL-19712.

Description of the vulnerability

Several vulnerabilities were announced in PHP 5.

An attacker can generate an integer overflow via fread, in order to trigger a denial of service, and possibly to run code. [severity:2/4; 72114, CVE-2016-5096]

An attacker can generate an integer overflow via php_html_entities, in order to trigger a denial of service, and possibly to run code. [severity:2/4; 72135, CVE-2016-5094, CVE-2016-5095]

An attacker can force a read at an invalid address via imagescale, in order to trigger a denial of service, or to obtain sensitive information. [severity:2/4; 72227, CVE-2013-7456]

An attacker can force a read at an invalid address via get_icu_value_internal, in order to trigger a denial of service, or to obtain sensitive information. [severity:2/4; 72241, CVE-2016-5093]

An attacker can force a read at an invalid address via phar_make_dirstream(), in order to trigger a denial of service, or to obtain sensitive information. [severity:2/4; 71331, CVE-2016-4343]
Full Vigil@nce bulletin... (Free trial)

vulnerability alert 19711

PHP 7: four vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of PHP.
Impacted products: PHP.
Severity: 2/4.
Consequences: privileged access/rights, denial of service on server, denial of service on service.
Provenance: document.
Number of vulnerabilities in this bulletin: 4.
Creation date: 26/05/2016.
Identifiers: 72157, 72162, 72164, 72165, VIGILANCE-VUL-19711.

Description of the vulnerability

Several vulnerabilities were announced in PHP.

An attacker can force the usage of a freed memory area via dba_open, in order to trigger a denial of service, and possibly to run code. [severity:2/4; 72157]

An attacker can force the usage of a freed memory area via error_reporting, in order to trigger a denial of service, and possibly to run code. [severity:2/4; 72162]

An attacker can force a NULL pointer to be dereferenced via mb_ereg_replace, in order to trigger a denial of service. [severity:2/4; 72164]

An attacker can force a NULL pointer to be dereferenced via openssl_csr_new, in order to trigger a denial of service. [severity:2/4; 72165]
Full Vigil@nce bulletin... (Free trial)

vulnerability 19710

libpng: buffer overflow via image size related macros

Synthesis of the vulnerability

An attacker can generate a buffer overflow of libpng, in order to trigger a denial of service, and possibly to run code.
Impacted products: libpng.
Severity: 1/4.
Consequences: administrator access/rights, privileged access/rights, user access/rights, denial of service on server, denial of service on service, denial of service on client.
Provenance: document.
Creation date: 26/05/2016.
Identifiers: VIGILANCE-VUL-19710.

Description of the vulnerability

The libpng library includes macros to calculate the size of a an image line or the whole image.

However, these macros does not check whether the result is bigger that the available address space in 32 bits systems. On these platforms, an ill-formed image may trigger an arithmetic overflow and then a memory corruption.

An attacker can therefore generate a buffer overflow of libpng, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2015-7473 CVE-2016-0259 CVE-2016-0260

IBM WebSphere MQ: four vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of IBM WebSphere MQ.
Impacted products: QRadar SIEM, WebSphere MQ.
Severity: 2/4.
Consequences: unknown consequence, administrator access/rights, privileged access/rights, user access/rights, client access/rights, data reading, data creation/edition, data deletion, data flow, denial of service on server, denial of service on service, denial of service on client, disguisement.
Provenance: document.
Number of vulnerabilities in this bulletin: 4.
Creation date: 26/05/2016.
Revision date: 02/06/2016.
Identifiers: 1984555, 1984561, 1984564, 2015824, 7043086, CVE-2015-7473, CVE-2016-0259, CVE-2016-0260, CVE-2016-0379, VIGILANCE-VUL-19709.

Description of the vulnerability

Several vulnerabilities were announced in IBM WebSphere MQ.

An attacker can use a vulnerability via MQSC command, in order to run code. [severity:2/4; 1984555, CVE-2015-7473]

An attacker can create a memory leak via Heap Storage, in order to trigger a denial of service. [severity:2/4; 1984564, CVE-2016-0260]

An attacker can force a read at an invalid address via MQ Protocol of IBM WebSphere MQ, in order to trigger a denial of service, or to obtain sensitive information (VIGILANCE-VUL-20653). [severity:2/4; CVE-2016-0379]

An attacker can bypass security features via runmqsc, in order to escalate his privileges. [severity:2/4; 1984561, CVE-2016-0259]
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin 19708

pfSense: privilege escalation via Web

Synthesis of the vulnerability

An authenticated attacker can use the administration Web interface of pfSense, in order to escalate his privileges.
Impacted products: pfSense.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: privileged account.
Creation date: 26/05/2016.
Identifiers: pfSense-SA-16_05.webgui, VIGILANCE-VUL-19708.

Description of the vulnerability

The pfSense product includes a Web based administration interface.

Some pages like "diag_smart.php" and "diag_routes.php" are usable by privileged users. However, they allow to make the web server run user chosen commands with the privileges of the root account.

An authenticated attacker can therefore use the administration Web interface of pfSense, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2016-5097 CVE-2016-5098 CVE-2016-5099

phpMyAdmin: three vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of phpMyAdmin.
Impacted products: Debian, Fedora, openSUSE, openSUSE Leap, phpMyAdmin.
Severity: 1/4.
Consequences: data reading.
Provenance: document.
Number of vulnerabilities in this bulletin: 3.
Creation date: 26/05/2016.
Identifiers: CERTFR-2016-AVI-181, CVE-2016-5097, CVE-2016-5098, CVE-2016-5099, DSA-3627-1, FEDORA-2016-55261b6815, FEDORA-2016-cd05bd994a, openSUSE-SU-2016:1434-1, openSUSE-SU-2016:1556-1, PMASA-2016-14, PMASA-2016-15, PMASA-2016-16, VIGILANCE-VUL-19707.

Description of the vulnerability

Several vulnerabilities were announced in phpMyAdmin.

An attacker can obtain sensitive information exposed in URL request parameters. [severity:1/4; CVE-2016-5097, PMASA-2016-14]

An attacker can trigger an error in order get information about the filesystem outside the Web server tree. [severity:1/4; CVE-2016-5098, PMASA-2016-15]

An attacker can trigger the insertion of special HTML characters into a page via a specially crafted URL. [severity:1/4; CVE-2016-5099, PMASA-2016-16]
Full Vigil@nce bulletin... (Free trial)

Previous page   Next page

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1121 1141 1161 1181 1201 1221 1241 1261 1281 1301 1321 1341 1361 1381 1401 1421 1441 1461 1481 1501 1521 1541 1561 1581 1601 1621 1641 1661 1681 1701 1721 1741 1761 1781 1801 1821 1841 1851 1852 1853 1854 1855 1856 1857 1858 1859 1860 1861 1862 1863 1864 1865 1866 1867 1868 1869 1870 1871 1881 1901 1921 1941 1961 1981 2001 2021 2041 2061 2081 2101 2121 2141 2161 2181 2201 2221 2241 2261 2281 2301 2321 2341 2361 2381 2401 2421 2441 2461 2481 2501 2521 2541 2561 2581 2601 2621 2641 2661 2681 2701 2721 2741 2761 2775