vendredi 23 août 2019    || Inscription
BanniereAlertes
 
 

Notre sélection d'alertes et avis SSI.
Sources : US Cert, Cert EU, Cert FR, Cnil, VulDB.

Motorola CX2L MWR04L/C1 MWR03 OpenWrt libuci /tmp/.uci/network Command denial of service

A vulnerability was found in Motorola CX2L MWR04L and C1 MWR03 (affected version not known). It has been rated as problematic. Affected by this issue is an unknown part of the file /tmp/.uci/network of the component OpenWrt libuci. There is no...
Auteur: VulDB

Octopus Deploy up to 2019.7.6 Web Request Proxy Credentials information disclosure

A vulnerability was found in Octopus Deploy up to 2019.7.6. It has been classified as problematic. Affected is an unknown functionality of the component Web Request Proxy Handler. Upgrading to version LTS 2019.3.8, LTS 2019.6.7 or 2019.7.7...
Auteur: VulDB

Linux Kernel up to 5.2.9 USB Device rsi_91x_usb.c memory corruption

A vulnerability has been found in Linux Kernel up to 5.2.9 (Operating System) and classified as critical. This vulnerability affects some unknown processing of the file drivers/net/wireless/rsi/rsi_91x_usb.c of the component USB Device Handler....
Auteur: VulDB

Octopus Tentacle up to 5.0.0 Web Request Proxy Credentials information disclosure

A vulnerability was found in Octopus Tentacle up to 5.0.0. It has been declared as problematic. Affected by this vulnerability is some unknown functionality of the component Web Request Proxy Handler. Upgrading to version 4.0.7 or 5.0.1...
Auteur: VulDB

Linux Kernel up to 5.2.9 USB Device technisat-usb2.c memory corruption

A vulnerability was found in Linux Kernel up to 5.2.9 (Operating System) and classified as critical. This issue affects an unknown function of the file drivers/media/usb/dvb-usb/technisat-usb2.c of the component USB Device Handler. There is no...
Auteur: VulDB

CodiMD 1.3.1 IFRAME sandbox cross site scripting

A vulnerability, which was classified as problematic, was found in CodiMD 1.3.1. This affects an unknown code block of the component IFRAME Handler. There is no information about possible countermeasures known. It may be suggested to replace the...
Auteur: VulDB

Vera Edge Home Controller 1.7.4452 cgi-bin/cmh/webcam.sh username privilege escalation

A vulnerability, which was classified as critical, has been found in Vera Edge Home Controller 1.7.4452. Affected by this issue is an unknown code of the file cgi-bin/cmh/webcam.sh. There is no information about possible countermeasures known. It...
Auteur: VulDB

OpenPGP.js up to 4.2.0 Messages information disclosure

A vulnerability classified as problematic was found in OpenPGP.js up to 4.2.0 (JavaScript Library). Affected by this vulnerability is an unknown part. There is no information about possible countermeasures known. It may be suggested to replace...
Auteur: VulDB

OpenPGP.js up to 4.1.2 Cryptographic Signature weak authentication

A vulnerability classified as problematic has been found in OpenPGP.js up to 4.1.2 (JavaScript Library). Affected is some unknown functionality of the component Cryptographic Signature Handler. There is no information about possible...
Auteur: VulDB

OpenPGP.js up to 4.1.2 Cryptographic Signature weak authentication

A vulnerability was found in OpenPGP.js up to 4.1.2 (JavaScript Library). It has been rated as critical. This issue affects an unknown functionality of the component Cryptographic Signature Handler. There is no information about possible...
Auteur: VulDB

Elastic APM Agent up to 5.0.x on Python CGI Variable Name Collision privilege escalation

A vulnerability was found in Elastic APM Agent up to 5.0.x on Python. It has been declared as critical. This vulnerability affects an unknown function of the component CGI Handler. Upgrading to version 5.1.0 eliminates this vulnerability.
Auteur: VulDB

Belwith Products Hickory Smart Ethernet Bridge MQTT Broker Cleartext weak encryption

A vulnerability was found in Belwith Products Hickory Smart Ethernet Bridge (the affected version unknown). It has been classified as critical. This affects some unknown processing of the component MQTT Broker. There is no information about...
Auteur: VulDB

Belwith Products Hickory Smart 01.01.43 on Android Debug Log Event information disclosure

A vulnerability was found in Belwith Products Hickory Smart 01.01.43 on Android (Android App Software) and classified as problematic. Affected by this issue is an unknown code block of the component Debug Log Event Handler. There is no...
Auteur: VulDB

Belwith Products Hickory Smart 01.01.07 on iOS Secure Storage information disclosure

A vulnerability has been found in Belwith Products Hickory Smart 01.01.07 on iOS (iOS App Software) and classified as problematic. Affected by this vulnerability is an unknown code of the component Secure Storage. There is no information about...
Auteur: VulDB

Belwith Products Hickory Smart 01.01.43 on Android Secure Storage information disclosure

A vulnerability, which was classified as problematic, was found in Belwith Products Hickory Smart 01.01.43 on Android (Android App Software). Affected is an unknown part of the component Secure Storage. There is no information about possible...
Auteur: VulDB

wp-support-plus-responsive-ticket-system Plugin up to 9.1.1 on WordPress cross site scripting

A vulnerability, which was classified as problematic, has been found in wp-support-plus-responsive-ticket-system Plugin up to 9.1.1 on WordPress. This issue affects some unknown functionality. Upgrading to version 9.1.2 eliminates this...
Auteur: VulDB

webp-express Plugin up to 0.14.10 on WordPress information disclosure

A vulnerability classified as problematic was found in webp-express Plugin up to 0.14.10 on WordPress (WordPress Plugin). This vulnerability affects an unknown functionality. Upgrading to version 0.14.11 eliminates this vulnerability.
Auteur: VulDB

import-users-from-csv-with-meta Plugin up to 1.14.0.2 on WordPress cross site request forgery

A vulnerability classified as problematic has been found in import-users-from-csv-with-meta Plugin up to 1.14.0.2 on WordPress. This affects an unknown function. Upgrading to version 1.14.0.3 eliminates this vulnerability.
Auteur: VulDB

import-users-from-csv-with-meta Plugin up to 1.14.0.2 on WordPress cross site scripting

A vulnerability was found in import-users-from-csv-with-meta Plugin up to 1.14.0.2 on WordPress. It has been rated as problematic. Affected by this issue is some unknown processing. Upgrading to version 1.14.0.3 eliminates this vulnerability.
Auteur: VulDB

import-users-from-csv-with-meta Plugin up to 1.14.1.2 on WordPress Import Data cross site scripting

A vulnerability was found in import-users-from-csv-with-meta Plugin up to 1.14.1.2 on WordPress. It has been declared as problematic. Affected by this vulnerability is an unknown code block of the component Import Data Handler. Upgrading to...
Auteur: VulDB

import-users-from-csv-with-meta Plugin up to 1.14.2.0 on WordPress directory traversal

A vulnerability was found in import-users-from-csv-with-meta Plugin up to 1.14.2.0 on WordPress. It has been classified as critical. Affected is an unknown code. Upgrading to version 1.14.2.1 eliminates this vulnerability.
Auteur: VulDB

GalliumOS 3.0 10-ptrace.conf privilege escalation

A vulnerability was found in GalliumOS 3.0 and classified as critical. This issue affects an unknown part of the file /etc/sysctl.d/10-ptrace.conf. There is no information about possible countermeasures known. It may be suggested to replace the...
Auteur: VulDB

ad-inserter Plugin up to 2.4.21 on WordPress Remote Code Execution

A vulnerability has been found in ad-inserter Plugin up to 2.4.21 on WordPress and classified as critical. This vulnerability affects some unknown functionality. Upgrading to version 2.4.22 eliminates this vulnerability.
Auteur: VulDB

ad-inserter Plugin up to 2.4.19 on WordPress directory traversal

A vulnerability, which was classified as critical, was found in ad-inserter Plugin up to 2.4.19 on WordPress. This affects an unknown functionality. Upgrading to version 2.4.20 eliminates this vulnerability.
Auteur: VulDB

shortcode-factory Plugin up to 2.7 on WordPress Local File Inclusion privilege escalation

A vulnerability, which was classified as critical, has been found in shortcode-factory Plugin up to 2.7 on WordPress (WordPress Plugin). Affected by this issue is an unknown function. Upgrading to version 2.8 eliminates this vulnerability.
Auteur: VulDB
12345678910Last

Événements SSI

LES ASSISES

Grand rendez-vous annuel des RSSI, les Assises de la sécurité des systèmes d'information se tiennent à Monaco (Grimaldi Forum) du 9 au 12 octobre 2019. Organisées par DG Consultants.

Présentation par l'organisateur



Retour sur Les Assises 2018

La 18ème édition des Assises de la Sécurité à Monaco, c’est terminé ! Encore merci aux 2800 participants dont les 160 partenaires qui pendant trois jours se sont retrouvés pour faire vivre cet événement unique en France. Conférences, one-to-one, tables-rondes, ateliers, moments de networking… Par leur contenu, par la qualité des visiteurs et par la richesse des échanges, les Assises se positionnent plus que jamais comme le rendez-vous incontournable de tous les professionnels de la cybersécurité. A l’image du marché qui ne cesse d’évoluer, les Assises savent adapter leur offre afin de répondre au mieux aux attentes du secteur. Ainsi cette édition a-t-elle voulu mettre en avant les grands enjeux du moment en multipliant les prises de parole, les démonstrations et les retours d’expérience.

Rendez-vous maintenant pour la prochaine édition qui aura lieu du 9 au 12 octobre 2019

Plus d'informations sur le site dédié à l'événement.

TRUSTECH

Cet événement international dédié aux paiements, à l'identification et à la sécurité est organisé à Cannes (palais des festivals) du 26 au 28 novembre 2019. Organisé par Comexposium.

Présentation de l'événement par l'organisateur

Les professionnels de la carte et des technologies de la confiance numérique se donnent à nouveau rendez-vous à TRUSTECH du 26 au 28 novembre 2019 au Palais des Festivals de Cannes pour l’événement annuel phare de leur écosystème.
Créé il y a plus de 30 ans sous le nom CARTES SECURE CONNEXIONS afin de promouvoir une technologie qui venait de naître, celle de la carte à puce, l’événement est rebaptisé TRUSTECH en 2016 pour mieux refléter l’évolution du secteur.
Mix plébiscité entre salon, congrès et lieu d’échanges, TRUSTECH 2019 englobe toutes les technologies impliquées sur les marchés liés aux paiements, à l'identification et à la sécurité.
En tant que Marketplace globale, TRUSTECH accueillera plus de 250 exposants internationaux, sponsors et startups, qui présenteront leurs dernières innovations, annonceront les lancements de produits et solutions sur leur stand ou à travers des sessions de pitch sur l’Innovation Stage, espace situé au cœur de l’événement.
Cette année, le cycle des conférences proposera durant 3 jours un contenu de pointe axé sur trois grands thèmes alignés sur l’offre TRUSTECH: Paiements, Identification et Sécurité.

Plus d'infos sur le site de l'événement.

FIC

Ayant pour thème cette année "Replacer l'humain au coeur de la cybersécurité", le Forum International de la Cybersécurité occupe les 28, 29 et 30 janvier 2020 le Grand Palais de Lille. Organisé par la Région Hauts-de-France et Euratechnologies, la Gendarmerie Nationale et CEIS.

Présentation par l'organisateur

Véritable plateforme d'échanges et de rencontres, le Forum International de la Cybersécurité (FIC) s'est imposé comme l'événement de référence en Europe en matière de sécurité et de confiance numérique. Son originalité est de mêler :
UN FORUM favorisant la réflexion et l'échange au sein de l'écosystème européen de la cybersécurité,
UN SALON dédié aux rencontres entre acheteurs et fournisseurs de solutions de cybersécurité.
Plus d'informations sur le site de l'événement.
RSS