jeudi 18 juillet 2019    || Inscription
BanniereAlertes
 
 

Notre sélection d'alertes et avis SSI.
Sources : US Cert, Cert EU, Cert FR, Cnil, VulDB.

Token Macro Plugin up to 2.5 on Jenkins Parser.java privilege escalation

A vulnerability, which was classified as critical, was found in Token Macro Plugin up to 2.5 on Jenkins. Affected is a function of the file src/main/java/org/jenkinsci/plugins/tokenmacro/Parser.java of the component Macro Handler. The...
Auteur: VulDB

Git Plugin up to 3.9.1 on Jenkins GitTagAction.java cross site request forgery

A vulnerability, which was classified as problematic, has been found in Git Plugin up to 3.9.1 on Jenkins (Versioning Software). This issue affects some functionality of the file src/main/java/hudson/plugins/git/GitTagAction.java. The...
Auteur: VulDB

Active Directory Plugin up to 2.10 on Jenkins Certificate Validation ActiveDirectoryDomain.java weak authentication

A vulnerability classified as critical was found in Active Directory Plugin up to 2.10 on Jenkins (Network Encryption Software). This vulnerability affects the functionality of the file...
Auteur: VulDB

Warnings Next Generation Plugin up to 2.1.1 on Jenkins GroovyParser.java cross site request forgery

A vulnerability classified as critical has been found in Warnings Next Generation Plugin up to 2.1.1 on Jenkins. This affects an unknown function of the file src/main/java/io/jenkins/plugins/analysis/warnings/groovy/GroovyParser.java. The...
Auteur: VulDB

Warnings Plugin up to 5.0.0 on Jenkins GroovyParser.java cross site request forgery

A vulnerability was found in Warnings Plugin up to 5.0.0 on Jenkins. It has been rated as critical. Affected by this issue is some processing of the file src/main/java/hudson/plugins/warnings/GroovyParser.java. The manipulation with an unknown...
Auteur: VulDB

Groovy Plugin up to 2.0 on Jenkins Sandbox StringScriptSource.java Code Execution

A vulnerability was found in Groovy Plugin up to 2.0 on Jenkins. It has been declared as critical. Affected by this vulnerability is a code block of the file src/main/java/hudson/plugins/groovy/StringScriptSource.java of the component Sandbox....
Auteur: VulDB

Script Security Plugin up to 1.50 on Jenkins Sandbox SecureGroovyScript.java Code Execution

A vulnerability was found in Script Security Plugin up to 1.50 on Jenkins. It has been classified as critical. Affected is code of the file src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/SecureGroovyScript.java of the component...
Auteur: VulDB

IIoT Monitor 3.1.38 information disclosure [CVE-2018-7839]

A vulnerability was found in IIoT Monitor 3.1.38 (Network Encryption Software) and classified as problematic. This issue affects a part. The manipulation with an unknown input leads to a information disclosure vulnerability. Using CWE to declare...
Auteur: VulDB

Zelio Soft up to 5.1 Project File Use-After-Free memory corruption

A vulnerability has been found in Zelio Soft up to 5.1 and classified as critical. This vulnerability affects a functionality. The manipulation as part of a Project File leads to a memory corruption vulnerability (Use-After-Free). The CWE...
Auteur: VulDB

Schneider Electric GUIcon 2.0 Eurotherm c3core.dll memory corruption

A vulnerability, which was classified as critical, was found in Schneider Electric GUIcon 2.0. This affects a function in the library c3core.dll of the component Eurotherm. The manipulation with an unknown input leads to a memory corruption...
Auteur: VulDB

Schneider Electric GUIcon 2.0 Eurotherm GD1 File Stack-based memory corruption

A vulnerability, which was classified as critical, has been found in Schneider Electric GUIcon 2.0. Affected by this issue is some functionality of the component Eurotherm. The manipulation as part of a GD1 File leads to a memory corruption...
Auteur: VulDB

Schneider Electric GUIcon 2.0 Eurotherm pcwin.dll GD1 File memory corruption

A vulnerability classified as critical was found in Schneider Electric GUIcon 2.0. Affected by this vulnerability is the functionality in the library pcwin.dll of the component Eurotherm. The manipulation as part of a GD1 File leads to a memory...
Auteur: VulDB

Canvas Draw 5.0.0 tiff Parser Out-of-Bounds memory corruption

A vulnerability classified as critical has been found in Canvas Draw 5.0.0. Affected is an unknown function of the component tiff Parser. The manipulation with an unknown input leads to a memory corruption vulnerability (Out-of-Bounds). CWE is...
Auteur: VulDB

Canvas Draw 5.0.0.28 CALS Raster File Out-of-Bounds memory corruption

A vulnerability was found in Canvas Draw 5.0.0.28. It has been rated as critical. This issue affects some processing of the component CALS Raster File Handler. The manipulation with an unknown input leads to a memory corruption vulnerability...
Auteur: VulDB

Canvas Draw 5.0.0 CAL Parser Out-of-Bounds memory corruption

A vulnerability was found in Canvas Draw 5.0.0. It has been declared as critical. This vulnerability affects a code block of the component CAL Parser. The manipulation with an unknown input leads to a memory corruption vulnerability...
Auteur: VulDB

GPAC up to 0.7.2 text_import.c gf_text_get_utf8_line memory corruption

A vulnerability was found in GPAC up to 0.7.2. It has been classified as critical. This affects the function gf_text_get_utf8_line of the file media_tools/text_import.c. The manipulation with an unknown input leads to a memory corruption...
Auteur: VulDB

GPAC up to 0.7.2 fileimport.c cat_multiple_files memory corruption

A vulnerability was found in GPAC up to 0.7.2 and classified as critical. Affected by this issue is the function cat_multiple_files of the file applications/mp4box/fileimport.c. The manipulation with an unknown input leads to a memory corruption...
Auteur: VulDB

GPAC up to 0.7.2 scene_manager.c gf_sm_load_init memory corruption

A vulnerability has been found in GPAC up to 0.7.2 and classified as critical. Affected by this vulnerability is the function gf_sm_load_init of the file scene_manager.c. The manipulation with an unknown input leads to a memory corruption...
Auteur: VulDB

GPAC 0.7.2 text_import.c gf_text_get_utf8_line Return Value memory corruption

A vulnerability, which was classified as critical, was found in GPAC 0.7.2. Affected is the function gf_text_get_utf8_line of the file media_tools/text_import.c. The manipulation with the input value -1 leads to a memory corruption vulnerability...
Auteur: VulDB

MODX Revolution up to 2.7.0-pl User Settings cross site scripting

A vulnerability, which was classified as problematic, has been found in MODX Revolution up to 2.7.0-pl (Content Management System). This issue affects some functionality of the component User Settings. The manipulation with an unknown input...
Auteur: VulDB

MODX Revolution up to 2.7.0-pl User Field cross site scripting

A vulnerability classified as problematic was found in MODX Revolution up to 2.7.0-pl (Content Management System). This vulnerability affects the functionality of the component User Field Handler. The manipulation with an unknown input leads to...
Auteur: VulDB

MODX Revolution up to 2.7.0-pl Document Resource cross site scripting

A vulnerability classified as problematic has been found in MODX Revolution up to 2.7.0-pl (Content Management System). This affects an unknown function of the component Document Resource Handler. The manipulation with an unknown input leads to...
Auteur: VulDB

MODX Revolution up to 2.7.0-pl User Photo cross site scripting

A vulnerability was found in MODX Revolution up to 2.7.0-pl (Content Management System). It has been rated as problematic. Affected by this issue is some processing of the component User Photo Handler. The manipulation with an unknown input...
Auteur: VulDB

libcURL up to 7.63.x lib/vauth/ntlm.c ntlm_decode_type2_target memory corruption

A vulnerability was found in libcURL up to 7.63.x (Network Utility Software). It has been declared as critical. Affected by this vulnerability is the function ntlm_decode_type2_target in the library lib/vauth/ntlm.c. The manipulation with an...
Auteur: VulDB

SQLAlchemy 1.2.17 group_by sql injection

A vulnerability classified as critical was found in SQLAlchemy 1.2.17. Affected by this vulnerability is the functionality. The manipulation of the argument group_by as part of a Parameter leads to a sql injection vulnerability. The CWE...
Auteur: VulDB
First273274275276277278279280281282Last

Événements SSI

BLACK HAT

Événement majeur mondial sur la sécurité de l'information la conférence Black Hat USA a lieu du 3 au 8 août 2019 à Las Vegas (Mandalay Bay). Organisé par UBM.


Présentation par l'organisateur

Now in its 22nd year, Black Hat USA is the world's leading information security event, providing attendees with the very latest in research, development and trends. Black Hat USA 2019 opens with four days of technical Trainings (August 3-6) followed by the two-day main conference (August 7-8) featuring Briefings, Arsenal, Business Hall, and more.

 Plus d'infos sur le site dédié à l'événement.

LES ASSISES

Grand rendez-vous annuel des RSSI, les Assises de la sécurité des systèmes d'information se tiennent à Monaco (Grimaldi Forum) du 9 au 12 octobre 2019. Organisées par DG Consultants.

Présentation par l'organisateur



Retour sur Les Assises 2018

La 18ème édition des Assises de la Sécurité à Monaco, c’est terminé ! Encore merci aux 2800 participants dont les 160 partenaires qui pendant trois jours se sont retrouvés pour faire vivre cet événement unique en France. Conférences, one-to-one, tables-rondes, ateliers, moments de networking… Par leur contenu, par la qualité des visiteurs et par la richesse des échanges, les Assises se positionnent plus que jamais comme le rendez-vous incontournable de tous les professionnels de la cybersécurité. A l’image du marché qui ne cesse d’évoluer, les Assises savent adapter leur offre afin de répondre au mieux aux attentes du secteur. Ainsi cette édition a-t-elle voulu mettre en avant les grands enjeux du moment en multipliant les prises de parole, les démonstrations et les retours d’expérience.

Rendez-vous maintenant pour la prochaine édition qui aura lieu du 9 au 12 octobre 2019

Plus d'informations sur le site dédié à l'événement.

RSS