dimanche 25 août 2019    || Inscription
BanniereAlertes
 
 

Notre sélection d'alertes et avis SSI.
Sources : US Cert, Cert EU, Cert FR, Cnil, VulDB.

JIRA up to 8.3.1 ServiceExecutor cross site request forgery

A vulnerability has been found in JIRA up to 8.3.1 and classified as problematic. This vulnerability affects an unknown functionality of the component ServiceExecutor. Upgrading to version 8.3.2 eliminates this vulnerability.
Auteur: VulDB

JIRA up to 8.3.1 issueTable information disclosure

A vulnerability, which was classified as problematic, was found in JIRA up to 8.3.1. This affects an unknown function of the file /rest/issueNav/1/issueTable. Upgrading to version 8.3.2 eliminates this vulnerability.
Auteur: VulDB

JIRA up to 7.13.6/8.3.1 Worklog information disclosure

A vulnerability, which was classified as problematic, has been found in JIRA up to 7.13.6/8.3.1. Affected by this issue is some unknown processing of the component Worklog. Upgrading to version 7.13.7 or 8.3.2 eliminates this vulnerability.
Auteur: VulDB

JIRA up to 7.13.5/8.2.2/8.3.1 wikirenderer Attribute cross site scripting

A vulnerability classified as problematic was found in JIRA up to 7.13.5/8.2.2/8.3.1. Affected by this vulnerability is an unknown code block of the component wikirenderer. Upgrading to version 7.13.6, 8.2.3 or 8.3.2 eliminates this vulnerability.
Auteur: VulDB

Autodesk Autodesk Advanced Steel 2017/2018/2019/2020 DLL Loader Code Execution

A vulnerability classified as critical has been found in Autodesk Autodesk Advanced Steel, Civil 3D, AutoCAD, AutoCAD LT, AutoCAD Architecture, AutoCAD Electrical, AutoCAD Map 3D, AutoCAD Mechanical, AutoCAD MEP and AutoCAD Plant 3D...
Auteur: VulDB

Autodesk Design Review 2011/2012/2013/2018 Use-After-Free memory corruption

A vulnerability was found in Autodesk Design Review 2011/2012/2013/2018. It has been rated as critical. This issue affects an unknown part. There is no information about possible countermeasures known. It may be suggested to replace the affected...
Auteur: VulDB

Autodesk Design Review 2011/2012/2013/2018 DLL Loader Code Execution

A vulnerability was found in Autodesk Design Review 2011/2012/2013/2018. It has been declared as critical. This vulnerability affects some unknown functionality of the component DLL Loader. There is no information about possible countermeasures...
Auteur: VulDB

Fortinet FortiRecorder up to 2.7.3 Default Credentials weak authentication

A vulnerability was found in Fortinet FortiRecorder up to 2.7.3. It has been classified as critical. This affects an unknown functionality. Upgrading to version 2.7.4 eliminates this vulnerability.
Auteur: VulDB

Fortinet FortiManager VM up to 6.2.0 Integrity Check Image privilege escalation

A vulnerability was found in Fortinet FortiManager VM up to 6.2.0 and classified as critical. Affected by this issue is an unknown function of the component Integrity Check. Upgrading to version 6.2.1 eliminates this vulnerability.
Auteur: VulDB

Fortinet FortiNAC up to 8.5.0 Web Page Generator search Reflected cross site scripting

A vulnerability has been found in Fortinet FortiNAC up to 8.5.0 and classified as problematic. Affected by this vulnerability is some unknown processing of the component Web Page Generator. There is no information about possible countermeasures...
Auteur: VulDB

Fortinet FortiOS IPS Engine POODLE weak encryption

A vulnerability, which was classified as critical, was found in Fortinet FortiOS (Firewall Software) (version unknown). Affected is an unknown code block of the component IPS Engine. There is no information about possible countermeasures known....
Auteur: VulDB

Palo Alto Networks Twistlock up to 19.07.358 privilege escalation

A vulnerability, which was classified as critical, has been found in Palo Alto Networks Twistlock up to 19.07.358. This issue affects an unknown code. There is no information about possible countermeasures known. It may be suggested to replace...
Auteur: VulDB

Palo Alto PAN-OS up to 8.1.9/9.0.3 Session memory corruption

A vulnerability classified as critical was found in Palo Alto PAN-OS up to 8.1.9/9.0.3 (Firewall Software). This vulnerability affects an unknown part of the component Session Handler. There is no information about possible countermeasures known....
Auteur: VulDB

Palo Alto PAN-OS up to 7.1.24/8.0.19/8.1.9/9.0.3 Message memory corruption

A vulnerability classified as critical has been found in Palo Alto PAN-OS up to 7.1.24/8.0.19/8.1.9/9.0.3 (Firewall Software). This affects some unknown functionality. There is no information about possible countermeasures known. It may be...
Auteur: VulDB

Palo Alto PAN-OS up to 7.1.24/8.0.19/8.1.9/9.0.3 Secure Shell Daemon Message memory corruption

A vulnerability was found in Palo Alto PAN-OS up to 7.1.24/8.0.19/8.1.9/9.0.3 (Firewall Software). It has been rated as critical. Affected by this issue is an unknown functionality of the component Secure Shell Daemon. There is no information...
Auteur: VulDB

proxystatistics Module up to 3.0.x on SimpleSAMLphp DatabaseCommand.php sql injection

A vulnerability was found in proxystatistics Module up to 3.0.x on SimpleSAMLphp (Firewall Software). It has been declared as critical. Affected by this vulnerability is an unknown function in the library lib/Auth/Process/DatabaseCommand.php....
Auteur: VulDB

Acclaim Block Plugin on Moodle delete_records sql injection

A vulnerability was found in Acclaim Block Plugin on Moodle (version unknown). It has been classified as critical. Affected is the function delete_records. Upgrading eliminates this vulnerability. A possible mitigation has been published even...
Auteur: VulDB

Tasking Manager up to 3.3.x sql injection

A vulnerability was found in Tasking Manager up to 3.3.x and classified as critical. This issue affects an unknown code block. Upgrading to version 3.4.0 eliminates this vulnerability.
Auteur: VulDB

GNU Libextractor up to 1.9 plugins/dvi_extractor.c EXTRACTOR_dvi_extract_method memory corruption

A vulnerability has been found in GNU Libextractor up to 1.9 and classified as critical. This vulnerability affects the function EXTRACTOR_dvi_extract_method of the file plugins/dvi_extractor.c. There is no information about possible...
Auteur: VulDB

D-Link DIR-823G V1.0.2B05 HNAP1 LoginPassword command injection

A vulnerability, which was classified as critical, was found in D-Link DIR-823G V1.0.2B05 (Router Operating System). This affects an unknown part of the component HNAP1. There is no information about possible countermeasures known. It may be...
Auteur: VulDB

D-Link DIR-823G V1.0.2B05 HNAP1 Username command injection

A vulnerability, which was classified as critical, has been found in D-Link DIR-823G V1.0.2B05 (Router Operating System). Affected by this issue is some unknown functionality of the component HNAP1. There is no information about possible...
Auteur: VulDB

D-Link DIR-823G V1.0.2B05 HNAP1 SetStaticRouteSettings Interface command injection

A vulnerability classified as critical was found in D-Link DIR-823G V1.0.2B05 (Router Operating System). Affected by this vulnerability is the function SetStaticRouteSettings of the component HNAP1. There is no information about possible...
Auteur: VulDB

D-Link DIR-823G V1.0.2B05 HNAP1 SetWanSettings MaxIdTime command injection

A vulnerability classified as critical has been found in D-Link DIR-823G V1.0.2B05. Affected is the function SetWanSettings of the component HNAP1. There is no information about possible countermeasures known. It may be suggested to replace the...
Auteur: VulDB

D-Link DIR-823G V1.0.2B05 HNAP1 Type command injection

A vulnerability was found in D-Link DIR-823G V1.0.2B05. It has been rated as critical. This issue affects some unknown processing of the component HNAP1. There is no information about possible countermeasures known. It may be suggested to replace...
Auteur: VulDB

pw3270 Terminal Emulator up to 5.0 SSL Certificate Validator weak authentication

A vulnerability was found in pw3270 Terminal Emulator up to 5.0. It has been declared as critical. This vulnerability affects an unknown code block of the component SSL Certificate Validator. Upgrading to version 5.1 eliminates this vulnerability.
Auteur: VulDB
12345678910Last

Événements SSI

LES ASSISES

Grand rendez-vous annuel des RSSI, les Assises de la sécurité des systèmes d'information se tiennent à Monaco (Grimaldi Forum) du 9 au 12 octobre 2019. Organisées par DG Consultants.

Présentation par l'organisateur



Retour sur Les Assises 2018

La 18ème édition des Assises de la Sécurité à Monaco, c’est terminé ! Encore merci aux 2800 participants dont les 160 partenaires qui pendant trois jours se sont retrouvés pour faire vivre cet événement unique en France. Conférences, one-to-one, tables-rondes, ateliers, moments de networking… Par leur contenu, par la qualité des visiteurs et par la richesse des échanges, les Assises se positionnent plus que jamais comme le rendez-vous incontournable de tous les professionnels de la cybersécurité. A l’image du marché qui ne cesse d’évoluer, les Assises savent adapter leur offre afin de répondre au mieux aux attentes du secteur. Ainsi cette édition a-t-elle voulu mettre en avant les grands enjeux du moment en multipliant les prises de parole, les démonstrations et les retours d’expérience.

Rendez-vous maintenant pour la prochaine édition qui aura lieu du 9 au 12 octobre 2019

Plus d'informations sur le site dédié à l'événement.

TRUSTECH

Cet événement international dédié aux paiements, à l'identification et à la sécurité est organisé à Cannes (palais des festivals) du 26 au 28 novembre 2019. Organisé par Comexposium.

Présentation de l'événement par l'organisateur

Les professionnels de la carte et des technologies de la confiance numérique se donnent à nouveau rendez-vous à TRUSTECH du 26 au 28 novembre 2019 au Palais des Festivals de Cannes pour l’événement annuel phare de leur écosystème.
Créé il y a plus de 30 ans sous le nom CARTES SECURE CONNEXIONS afin de promouvoir une technologie qui venait de naître, celle de la carte à puce, l’événement est rebaptisé TRUSTECH en 2016 pour mieux refléter l’évolution du secteur.
Mix plébiscité entre salon, congrès et lieu d’échanges, TRUSTECH 2019 englobe toutes les technologies impliquées sur les marchés liés aux paiements, à l'identification et à la sécurité.
En tant que Marketplace globale, TRUSTECH accueillera plus de 250 exposants internationaux, sponsors et startups, qui présenteront leurs dernières innovations, annonceront les lancements de produits et solutions sur leur stand ou à travers des sessions de pitch sur l’Innovation Stage, espace situé au cœur de l’événement.
Cette année, le cycle des conférences proposera durant 3 jours un contenu de pointe axé sur trois grands thèmes alignés sur l’offre TRUSTECH: Paiements, Identification et Sécurité.

Plus d'infos sur le site de l'événement.

FIC

Ayant pour thème cette année "Replacer l'humain au coeur de la cybersécurité", le Forum International de la Cybersécurité occupe les 28, 29 et 30 janvier 2020 le Grand Palais de Lille. Organisé par la Région Hauts-de-France et Euratechnologies, la Gendarmerie Nationale et CEIS.

Présentation par l'organisateur

Véritable plateforme d'échanges et de rencontres, le Forum International de la Cybersécurité (FIC) s'est imposé comme l'événement de référence en Europe en matière de sécurité et de confiance numérique. Son originalité est de mêler :
UN FORUM favorisant la réflexion et l'échange au sein de l'écosystème européen de la cybersécurité,
UN SALON dédié aux rencontres entre acheteurs et fournisseurs de solutions de cybersécurité.
Plus d'informations sur le site de l'événement.
RSS