lundi 20 mai 2019    || Inscription
BanniereAlertes
 
 

Notre sélection d'alertes et avis SSI.
Sources : US Cert, Cert EU, Cert FR, Cnil, VulDB.

Intel CSME up to 11.8.64/11.11.64/11.22.64/12.0.34 HECI Subsystem information disclosure

A vulnerability, which was classified as problematic, was found in Intel CSME up to 11.8.64/11.11.64/11.22.64/12.0.34. This affects a function of the component HECI Subsystem. The manipulation with an unknown input leads to a information...
Auteur: VulDB

Intel AMT up to 11.8.64/11.11.64/11.22.64/12.0.34 Subsystem privilege escalation

A vulnerability, which was classified as critical, has been found in Intel AMT up to 11.8.64/11.11.64/11.22.64/12.0.34. Affected by this issue is some functionality of the component Subsystem. The manipulation with an unknown input leads to a...
Auteur: VulDB

Intel CSME/TXE Code Injection privilege escalation [CVE-2019-0091]

A vulnerability classified as critical was found in Intel CSME and TXE (affected version unknown). Affected by this vulnerability is the functionality. The manipulation with an unknown input leads to a privilege escalation vulnerability (Code...
Auteur: VulDB

Intel CSME/SMS Access Control privilege escalation [CVE-2019-0090]

A vulnerability classified as critical has been found in Intel CSME and SMS (version unknown). Affected is an unknown function of the component Access Control. The manipulation with an unknown input leads to a privilege escalation vulnerability....
Auteur: VulDB

Intel SPS Subsystem privilege escalation [CVE-2019-0089]

A vulnerability was found in Intel SPS. It has been rated as critical. This issue affects some processing of the component Subsystem. The manipulation with an unknown input leads to a privilege escalation vulnerability. Using CWE to declare the...
Auteur: VulDB

Intel CSME/TXE Dynamic Application Loader privilege escalation

A vulnerability was found in Intel CSME and TXE (the affected version is unknown). It has been declared as critical. This vulnerability affects a code block of the component Dynamic Application Loader. The manipulation with an unknown input...
Auteur: VulDB

Intel Proset Wireless up to 20.100 Directory Permission privilege escalation

A vulnerability was found in Intel Proset Wireless up to 20.100. It has been classified as critical. This affects code of the component Directory Permission. The manipulation with an unknown input leads to a privilege escalation vulnerability....
Auteur: VulDB

GitLab Community Edition/Enterprise Edition up to 11.4.12/11.5.5/11.6.0 Runner Registration TOken privilege escalation

A vulnerability was found in GitLab Community Edition and Enterprise Edition up to 11.4.12/11.5.5/11.6.0 and classified as critical. Affected by this issue is a part of the component Runner Registration TOken Handler. The manipulation with an...
Auteur: VulDB

GitLab Community Edition/Enterprise Edition up to 11.3.10/11.4.7/11.5.0 Project Mirroring CRLF privilege escalation

A vulnerability has been found in GitLab Community Edition and Enterprise Edition up to 11.3.10/11.4.7/11.5.0 and classified as critical. Affected by this vulnerability is a functionality of the component Project Mirroring. The manipulation with...
Auteur: VulDB

OpenEMR up to 5.0.1 Patch 6 /portal/lib/paylib.php portalAudit sql injection

A vulnerability, which was classified as critical, was found in OpenEMR up to 5.0.1 Patch 6 (Business Process Management Software). Affected is the function portalAudit in the library /portal/lib/paylib.php. The manipulation with an unknown...
Auteur: VulDB

OpenEMR up to 5.0.1 Patch 6 download_template.php docid directory traversal

A vulnerability, which was classified as critical, has been found in OpenEMR up to 5.0.1 Patch 6 (Business Process Management Software). This issue affects some functionality in the library /portal/lib/download_template.php. The manipulation of...
Auteur: VulDB

OpenEMR up to 5.0.1 Patch 6 taskman_functions.php make_task sql injection

A vulnerability classified as critical was found in OpenEMR up to 5.0.1 Patch 6 (Business Process Management Software). This vulnerability affects the function make_task of the file /interface/forms/eye_mag/php/taskman_functions.php. The...
Auteur: VulDB

Fujitsu PaperStream IP 1.42.0.5685 FJTWSVIC Service UninOldIS.dll ChangeUninstallString PATH privilege escalation

A vulnerability classified as critical has been found in Fujitsu PaperStream IP 1.42.0.5685. This affects the function ChangeUninstallString in the library UninOldIS.dll of the component FJTWSVIC Service. The manipulation of the argument PATH as...
Auteur: VulDB

Linux Kernel up to 4.13.13 tun Subsystem NULL Pointer Dereference denial of service

A vulnerability was found in Linux Kernel up to 4.13.13 (Operating System). It has been rated as problematic. Affected by this issue is some processing of the component tun Subsystem. The manipulation with an unknown input leads to a denial of...
Auteur: VulDB

CERTFR-2019-AVI-232 : [SCADA] Multiples vulnérabilités dans les produits Schneider Electric (17 mai 2019)

De multiples vulnérabilités ont été découvertes dans les produits Schneider Electric. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance...
Auteur: Cert FR

CERTFR-2019-AVI-231 : Vulnérabilité dans IBM WebSphere (17 mai 2019)

Une vulnérabilité a été découverte dans IBM WebSphere. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance.

Auteur: Cert FR

CERTFR-2019-AVI-230 : Multiples vulnérabilités dans le noyau Linux de SUSE (17 mai 2019)

De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une injection de code indirecte à distance...
Auteur: Cert FR

CERTFR-2019-AVI-229 : Multiples vulnérabilités dans le noyau Linux de RedHat (17 mai 2019)

De multiples vulnérabilités ont été découvertes dans le noyau Linux de RedHat. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.

Auteur: Cert FR

Zoho ManageEngine Netflow Analyzer Professional 7.0.0.2 Administration Zone CReportPDFServlet schFilePath directory traversal

A vulnerability was found in Zoho ManageEngine Netflow Analyzer Professional 7.0.0.2. It has been declared as critical. Affected by this vulnerability is a code block of the file /netflow/servlet/CReportPDFServlet of the component Administration...
Auteur: VulDB

XAMPP up to 5.6.8 cds-fpdf.php interpret/titel cross site scripting

A vulnerability was found in XAMPP up to 5.6.8. It has been classified as problematic. Affected is code of the file cds-fpdf.php. The manipulation of the argument interpret/titel as part of a Parameter leads to a cross site scripting...
Auteur: VulDB

systemd 242 VT1 Mode Password information disclosure

A vulnerability was found in systemd 242 and classified as problematic. This issue affects a part of the component VT1 Mode. The manipulation with an unknown input leads to a information disclosure vulnerability (Password). Using CWE to declare...
Auteur: VulDB

Airmail up to 1.0 GPG-PGP Plugin spoofing weak authentication

A vulnerability has been found in Airmail up to 1.0 and classified as critical. This vulnerability affects a functionality of the component GPG-PGP Plugin. The manipulation with an unknown input leads to a weak authentication vulnerability...
Auteur: VulDB

Ghostscript up to 9.27 File System PostScript File privilege escalation

A vulnerability, which was classified as critical, was found in Ghostscript up to 9.27 (Document Processing Software). This affects a function of the component File System. The manipulation as part of a PostScript File leads to a privilege...
Auteur: VulDB

Cisco NX-OS/FXOS prior 8.3(1) CLI privilege escalation

A vulnerability, which was classified as critical, has been found in Cisco NX-OS and FXOS (Router Operating System). Affected by this issue is some functionality of the component CLI. The manipulation with an unknown input leads to a privilege...
Auteur: VulDB

eZ Platform up to 2.x Admin UI cross site scripting

A vulnerability classified as problematic was found in eZ Platform up to 2.x. Affected by this vulnerability is the functionality of the component Admin UI. The manipulation with an unknown input leads to a cross site scripting vulnerability....
Auteur: VulDB
12345678910Last

Événements SSI

READY FOR IT

La première édition de Ready For IT se déroule du 20 au 22 mai 2019 à Monaco (Grimaldi Forum) : conférences, keynotes, ateliers et rendez-vous one-to-one. Organisé par DG Consultants.

Présentation de l'événement par l'organisateur

DG Consultants, l’organisateur depuis 18 ans des Assises de la Sécurité, innove en lançant Ready For It, un nouveau rendez-vous business, centré sur la convergence des technologies et l’expérience client.
Pourquoi ce nouvel événement ?
Parce que la demande explose de la part des entreprises qui sont toutes engagées dans la transformation numérique.
Tandis que les fournisseurs font évoluer leurs offres et s’organisent en écosystèmes technologiques afin d’ être au plus proches des besoins de leurs clients.
Entre les impératifs business, les demandes des métiers, les contraintes techniques, les promesses des nouveaux concepts (IA, BlockChain…), les organisations sont en attente de solutions, de conseils et de service.
S’engager dans le Cloud ?
Oui mais comment et avec quel partenaire ?
Structurer les données mais avec quelles technologies et dans quel cadre ? Et quid de la sécurité qui doit désormais être au cœur de tous les processus IT ?
Voilà pourquoi DG Consultants, la référence dans le monde des rencontres d’affaires a conçu Ready For It.
Pour réunir dans un cadre convivial et autour de contenu de qualité tous les acteurs importants de l’IT, mais également les start-ups qui savent apporter l’innovation et la « disruption ».
Rendez-vous du 20 au 22 mai 2019 à Monaco !

Plus d'infos sur le site dédié à l'événement.

 

HACK IN PARIS

Pour sa 9ème édition la conférence Hack In Paris sur la sécurité IT se tient du 16 au 20 juin 2019 à Paris, Maison de la Chimie. Organisée par Sysdream.

RSS