Refine your search
5 vulnerabilities found for Reporter by Broadcom
CERTFR-2024-AVI-0942
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans les produits Broadcom. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
Broadcom | Management Center - VA | Management Center - VA versions antérieures à 7.3.23.1 | ||
Broadcom | SG-S500 | SG-S500 versions antérieures à 7.4.7.1 | ||
Broadcom | SSL Visibility Appliance Software | SSL Visibility Appliance Software versions antérieures à 7.4.7.1 | ||
Broadcom | SSP-S410 | SSP-S410 versions antérieures à 7.4.7.1 | ||
Broadcom | SV-3800 | SV-3800 versions antérieures à 7.4.7.1 | ||
Broadcom | ProxySG Software - SGOS | ProxySG Software - SGOS versions antérieures à 7.3.23.1 | ||
Broadcom | CAS-S400 | CAS-S400 versions antérieures à 7.3.23.1 | ||
Broadcom | SG-S400-RP | SG-S400-RP versions antérieures à 7.3.23.1 | ||
Broadcom | SV-S550 | SV-550 versions antérieures à 7.4.7.1 | ||
Broadcom | SG-S200-40 | SG-S200-40 versions antérieures à 7.4.7.1 | ||
Broadcom | ProxySG Software - SGOS | ProxySG Software - SGOS versions antérieures à 7.4.7.1 | ||
Broadcom | ASG-S500 | ASG-S500 versions antérieures à 7.3.23.1 | ||
Broadcom | ASG-S200 | ASG-S200 versions antérieures à 7.3.23.1 | ||
Broadcom | Content Analysis Software | Content Analysis Software versions antérieures à 7.4.7.1 | ||
Broadcom | ISG Content Analysis | ISG Content Analysis versions antérieures à 7.4.7.1 | ||
Broadcom | Management Center | Management Center versions antérieures à 7.4.7.1 | ||
Broadcom | SV-2800 | SV-2800 versions antérieures à 7.3.23.1 | ||
Broadcom | Reporter | Reporter versions antérieures à 7.4.7.1 | ||
Broadcom | ASG-S500 | ASG-S500 versions antérieures à 7.4.7.1 | ||
Broadcom | SV-1800 | SV-1800 versions antérieures à 7.4.7.1 | ||
Broadcom | SV-3800 | SV-3800 versions antérieures à 7.3.23.1 | ||
Broadcom | ASG-S400 | ASG-S400 versions antérieures à 7.4.7.1 | ||
Broadcom | SV-1800 | SV-1800 versions antérieures à 7.3.23.1 | ||
Broadcom | ISG Proxy | ISG Proxy versions antérieures à 7.3.23.1 | ||
Broadcom | CAS-S500 | CAS-S500 versions antérieures à 7.3.23.1 | ||
Broadcom | SV-800 | SV-800 versions antérieures à 7.3.23.1 | ||
Broadcom | SG-S500-RP | SG-S500-RP versions antérieures à 7.3.23.1 | ||
Broadcom | ISG Proxy | ISG Proxy versions antérieures à 7.4.7.1 | ||
Broadcom | ISG Content Analysis | ISG Content Analysis versions antérieures à 7.3.23.1 | ||
Broadcom | SSP-S410 PLATFORM | SSP-S410 PLATFORM versions antérieures à 7.4.7.1 | ||
Broadcom | SV-S550 | SV-550 versions antérieures à 7.3.23.1 | ||
Broadcom | SV-2800 | SV-2800 versions antérieures à 7.4.7.1 | ||
Broadcom | SSP | SSP versions antérieures à 7.3.23.1 | ||
Broadcom | Reporter-VA | Reporter-VA versions antérieures à 7.4.7.1 | ||
Broadcom | Management Center | Management Center versions antérieures à 7.3.23.1 | ||
Broadcom | CAS-S200 | CAS-S200 versions antérieures à 7.3.23.1 | ||
Broadcom | SSP-S210 PLATFORM | SSP-S210 PLATFORM versions antérieures à 7.3.23.1 | ||
Broadcom | CAS-S200 | CAS-S200 versions antérieures à 7.4.7.1 | ||
Broadcom | CAS-S400 | CAS-S400 versions antérieures à 7.4.7.1 | ||
Broadcom | Management Center - VA | Management Center - VA versions antérieures à 7.4.7.1 | ||
Broadcom | SG-S200-RP | SG-S200-RP versions antérieures à 7.4.7.1 | ||
Broadcom | Reporter-VA | Reporter-VA versions antérieures à 7.3.23.1 | ||
Broadcom | SSP-S410 | SSP-S410 versions antérieures à 7.3.23.1 | ||
Broadcom | SG-S400-RP | SG-S400-RP versions antérieures à 7.4.7.1 | ||
Broadcom | SSP-S210 PLATFORM | SSP-S210 PLATFORM versions antérieures à 7.4.7.1 | ||
Broadcom | Reporter-S500 | Reporter-S500 versions antérieures à 7.4.7.1 | ||
Broadcom | ASG-S400 | ASG-S400 versions antérieures à 7.3.23.1 | ||
Broadcom | SG-S200 | SG-S200 versions antérieures à 7.4.7.1 | ||
Broadcom | ASG-S200 | ASG-S200 versions antérieures à 7.4.7.1 | ||
Broadcom | MC-S400-20 | MC-S400-20 versions antérieures à 7.4.7.1 | ||
Broadcom | SG-S200-40 | SG-S200-40 versions antérieures à 7.3.23.1 | ||
Broadcom | SSP | SSP versions antérieures à 7.4.7.1 | ||
Broadcom | SG-S500-RP | SG-S500-RP versions antérieures à 7.4.7.1 | ||
Broadcom | SV-800 | SV-800 versions antérieures à 7.4.7.1 | ||
Broadcom | Reporter-S500 | Reporter-S500 versions antérieures à 7.3.23.1 | ||
Broadcom | SSL Visibility Appliance Software | SSL Visibility Appliance Software versions antérieures à 7.3.23.1 | ||
Broadcom | CAS-S200-A1 | CAS-S200-A1 versions antérieures à 7.4.7.1 | ||
Broadcom | Reporter | Reporter versions antérieures à 7.3.23.1 | ||
Broadcom | CAS-S500 | CAS-S500 versions antérieures à 7.4.7.1 | ||
Broadcom | SSP-S410 PLATFORM | SSP-S410 PLATFORM versions antérieures à 7.3.23.1 | ||
Broadcom | SG-S400 | SG-S400 versions antérieures à 7.4.7.1 | ||
Broadcom | CAS-S200-A1 | CAS-S200-A1 versions antérieures à 7.3.23.1 | ||
Broadcom | SG-S500 | SG-S500 versions antérieures à 7.3.23.1 | ||
Broadcom | MC-S400-20 | MC-S400-20 versions antérieures à 7.3.23.1 | ||
Broadcom | SG-S200 | SG-S200 versions antérieures à 7.3.23.1 | ||
Broadcom | Content Analysis Software | Content Analysis Software versions antérieures à 7.3.23.1 | ||
Broadcom | SG-S200-RP | SG-S200-RP versions antérieures à 7.3.23.1 | ||
Broadcom | SG-S400 | SG-S400 versions antérieures à 7.3.23.1 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Management Center - VA versions ant\u00e9rieures \u00e0 7.3.23.1", "product": { "name": "Management Center - VA", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SG-S500 versions ant\u00e9rieures \u00e0 7.4.7.1", "product": { "name": "SG-S500", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SSL Visibility Appliance Software versions ant\u00e9rieures \u00e0 7.4.7.1", "product": { "name": "SSL Visibility Appliance Software", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SSP-S410 versions ant\u00e9rieures \u00e0 7.4.7.1", "product": { "name": "SSP-S410", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SV-3800 versions ant\u00e9rieures \u00e0 7.4.7.1", "product": { "name": "SV-3800", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "ProxySG Software - SGOS versions ant\u00e9rieures \u00e0 7.3.23.1", "product": { "name": "ProxySG Software - SGOS", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "CAS-S400 versions ant\u00e9rieures \u00e0 7.3.23.1", "product": { "name": "CAS-S400", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SG-S400-RP versions ant\u00e9rieures \u00e0 7.3.23.1", "product": { "name": "SG-S400-RP", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SV-550 versions ant\u00e9rieures \u00e0 7.4.7.1", "product": { "name": "SV-S550", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SG-S200-40 versions ant\u00e9rieures \u00e0 7.4.7.1", "product": { "name": "SG-S200-40", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "ProxySG Software - SGOS versions ant\u00e9rieures \u00e0 7.4.7.1", "product": { "name": "ProxySG Software - SGOS", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "ASG-S500 versions ant\u00e9rieures \u00e0 7.3.23.1", "product": { "name": "ASG-S500", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "ASG-S200 versions ant\u00e9rieures \u00e0 7.3.23.1", "product": { "name": "ASG-S200", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "Content Analysis Software versions ant\u00e9rieures \u00e0 7.4.7.1", "product": { "name": "Content Analysis Software", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "ISG Content Analysis versions ant\u00e9rieures \u00e0 7.4.7.1", "product": { "name": "ISG Content Analysis", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "Management Center versions ant\u00e9rieures \u00e0 7.4.7.1", "product": { "name": "Management Center", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SV-2800 versions ant\u00e9rieures \u00e0 7.3.23.1", "product": { "name": "SV-2800", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "Reporter versions ant\u00e9rieures \u00e0 7.4.7.1", "product": { "name": "Reporter", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "ASG-S500 versions ant\u00e9rieures \u00e0 7.4.7.1", "product": { "name": "ASG-S500", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SV-1800 versions ant\u00e9rieures \u00e0 7.4.7.1", "product": { "name": "SV-1800", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SV-3800 versions ant\u00e9rieures \u00e0 7.3.23.1", "product": { "name": "SV-3800", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "ASG-S400 versions ant\u00e9rieures \u00e0 7.4.7.1", "product": { "name": "ASG-S400", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SV-1800 versions ant\u00e9rieures \u00e0 7.3.23.1", "product": { "name": "SV-1800", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "ISG Proxy versions ant\u00e9rieures \u00e0 7.3.23.1", "product": { "name": "ISG Proxy", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "CAS-S500 versions ant\u00e9rieures \u00e0 7.3.23.1", "product": { "name": "CAS-S500", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SV-800 versions ant\u00e9rieures \u00e0 7.3.23.1", "product": { "name": "SV-800", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SG-S500-RP versions ant\u00e9rieures \u00e0 7.3.23.1", "product": { "name": "SG-S500-RP", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "ISG Proxy versions ant\u00e9rieures \u00e0 7.4.7.1", "product": { "name": "ISG Proxy", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "ISG Content Analysis versions ant\u00e9rieures \u00e0 7.3.23.1", "product": { "name": "ISG Content Analysis", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SSP-S410 PLATFORM versions ant\u00e9rieures \u00e0 7.4.7.1", "product": { "name": "SSP-S410 PLATFORM", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SV-550 versions ant\u00e9rieures \u00e0 7.3.23.1", "product": { "name": "SV-S550", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SV-2800 versions ant\u00e9rieures \u00e0 7.4.7.1", "product": { "name": "SV-2800", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SSP versions ant\u00e9rieures \u00e0 7.3.23.1", "product": { "name": "SSP", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "Reporter-VA versions ant\u00e9rieures \u00e0 7.4.7.1", "product": { "name": "Reporter-VA", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "Management Center versions ant\u00e9rieures \u00e0 7.3.23.1", "product": { "name": "Management Center", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "CAS-S200 versions ant\u00e9rieures \u00e0 7.3.23.1", "product": { "name": "CAS-S200", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SSP-S210 PLATFORM versions ant\u00e9rieures \u00e0 7.3.23.1", "product": { "name": "SSP-S210 PLATFORM", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "CAS-S200 versions ant\u00e9rieures \u00e0 7.4.7.1", "product": { "name": "CAS-S200", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "CAS-S400 versions ant\u00e9rieures \u00e0 7.4.7.1", "product": { "name": "CAS-S400", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "Management Center - VA versions ant\u00e9rieures \u00e0 7.4.7.1", "product": { "name": "Management Center - VA", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SG-S200-RP versions ant\u00e9rieures \u00e0 7.4.7.1", "product": { "name": "SG-S200-RP", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "Reporter-VA versions ant\u00e9rieures \u00e0 7.3.23.1", "product": { "name": "Reporter-VA", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SSP-S410 versions ant\u00e9rieures \u00e0 7.3.23.1", "product": { "name": "SSP-S410", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SG-S400-RP versions ant\u00e9rieures \u00e0 7.4.7.1", "product": { "name": "SG-S400-RP", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SSP-S210 PLATFORM versions ant\u00e9rieures \u00e0 7.4.7.1", "product": { "name": "SSP-S210 PLATFORM", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "Reporter-S500 versions ant\u00e9rieures \u00e0 7.4.7.1", "product": { "name": "Reporter-S500", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "ASG-S400 versions ant\u00e9rieures \u00e0 7.3.23.1", "product": { "name": "ASG-S400", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SG-S200 versions ant\u00e9rieures \u00e0 7.4.7.1", "product": { "name": "SG-S200", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "ASG-S200 versions ant\u00e9rieures \u00e0 7.4.7.1", "product": { "name": "ASG-S200", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "MC-S400-20 versions ant\u00e9rieures \u00e0 7.4.7.1", "product": { "name": "MC-S400-20", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SG-S200-40 versions ant\u00e9rieures \u00e0 7.3.23.1", "product": { "name": "SG-S200-40", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SSP versions ant\u00e9rieures \u00e0 7.4.7.1", "product": { "name": "SSP", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SG-S500-RP versions ant\u00e9rieures \u00e0 7.4.7.1", "product": { "name": "SG-S500-RP", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SV-800 versions ant\u00e9rieures \u00e0 7.4.7.1", "product": { "name": "SV-800", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "Reporter-S500 versions ant\u00e9rieures \u00e0 7.3.23.1", "product": { "name": "Reporter-S500", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SSL Visibility Appliance Software versions ant\u00e9rieures \u00e0 7.3.23.1", "product": { "name": "SSL Visibility Appliance Software", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "CAS-S200-A1 versions ant\u00e9rieures \u00e0 7.4.7.1", "product": { "name": "CAS-S200-A1", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "Reporter versions ant\u00e9rieures \u00e0 7.3.23.1", "product": { "name": "Reporter", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "CAS-S500 versions ant\u00e9rieures \u00e0 7.4.7.1", "product": { "name": "CAS-S500", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SSP-S410 PLATFORM versions ant\u00e9rieures \u00e0 7.3.23.1", "product": { "name": "SSP-S410 PLATFORM", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SG-S400 versions ant\u00e9rieures \u00e0 7.4.7.1", "product": { "name": "SG-S400", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "CAS-S200-A1 versions ant\u00e9rieures \u00e0 7.3.23.1", "product": { "name": "CAS-S200-A1", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SG-S500 versions ant\u00e9rieures \u00e0 7.3.23.1", "product": { "name": "SG-S500", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "MC-S400-20 versions ant\u00e9rieures \u00e0 7.3.23.1", "product": { "name": "MC-S400-20", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SG-S200 versions ant\u00e9rieures \u00e0 7.3.23.1", "product": { "name": "SG-S200", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "Content Analysis Software versions ant\u00e9rieures \u00e0 7.3.23.1", "product": { "name": "Content Analysis Software", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SG-S200-RP versions ant\u00e9rieures \u00e0 7.3.23.1", "product": { "name": "SG-S200-RP", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SG-S400 versions ant\u00e9rieures \u00e0 7.3.23.1", "product": { "name": "SG-S400", "vendor": { "name": "Broadcom", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2024-3596", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596" } ], "initial_release_date": "2024-11-04T00:00:00", "last_revision_date": "2024-11-04T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0942", "revisions": [ { "description": "Version initiale", "revision_date": "2024-11-04T00:00:00.000000" } ], "risks": [ { "description": "Contournement de la politique de s\u00e9curit\u00e9" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits Broadcom. Elle permet \u00e0 un attaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9.", "title": "Vuln\u00e9rabilit\u00e9 dans les produits Broadcom", "vendor_advisories": [ { "published_at": "2024-11-01", "title": "Bulletin de s\u00e9curit\u00e9 Broadcom 25157", "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25157" } ] }
CERTFR-2014-AVI-404
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans Blue Coat. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Broadcom | N/A | MAA 1.1.x et 4.1.x | ||
Broadcom | N/A | Director 6.x et 5.x | ||
Broadcom | Management Center | Management Center 1.1 et 1.2 | ||
Broadcom | Reporter | Reporter's ISO 9.4 | ||
Broadcom | N/A | SA 7.1, 7.0, et 6.x | ||
Broadcom | N/A | CAS 1.x | ||
Broadcom | N/A | XOS | ||
Broadcom | N/A | S-Series | ||
Broadcom | N/A | MAG2 | ||
Broadcom | N/A | SSL Visibility |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "MAA 1.1.x et 4.1.x", "product": { "name": "N/A", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "Director 6.x et 5.x", "product": { "name": "N/A", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "Management Center 1.1 et 1.2", "product": { "name": "Management Center", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "Reporter\u0027s ISO 9.4", "product": { "name": "Reporter", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SA 7.1, 7.0, et 6.x", "product": { "name": "N/A", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "CAS 1.x", "product": { "name": "N/A", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "XOS", "product": { "name": "N/A", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "S-Series", "product": { "name": "N/A", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "MAG2", "product": { "name": "N/A", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "SSL Visibility", "product": { "name": "N/A", "vendor": { "name": "Broadcom", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2014-7169", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7169" }, { "name": "CVE-2014-6271", "url": "https://www.cve.org/CVERecord?id=CVE-2014-6271" } ], "initial_release_date": "2014-09-30T00:00:00", "last_revision_date": "2014-09-30T00:00:00", "links": [], "reference": "CERTFR-2014-AVI-404", "revisions": [ { "description": "version initiale.", "revision_date": "2014-09-30T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eBlue Coat\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Blue Coat", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Blue Coat SA82 du 25 septembre 2014", "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82" } ] }
CERTA-2012-AVI-056
Vulnerability from certfr_avis
Plusieurs vulnérabilités permettant à un utilisateur malintentionné de causer un déni de service, d'obtenir des informations sensibles et d'exécuter du code à distance sont présentes dans Blue Coat Reporter.
Description
Plusieurs vulnérabilités sont présentes dans Blue Coat Reporter. Elles concernent la version de la bibliothèque OpenSSL utilisée dans Blue Coat Reporter et permettent en outre de causer un déni de service, d'obtenir des informations sensibles et d'exécuter du code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Blue Coat Reporter versions ant\u00e9rieures \u00e0 9.3.1.1.", "product": { "name": "Reporter", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "Blue Coat Reporter versions ant\u00e9rieures \u00e0 9.2.5.1 ;", "product": { "name": "Reporter", "vendor": { "name": "Broadcom", "scada": false } } } ], "affected_systems_content": null, "content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans Blue Coat Reporter. Elles\nconcernent la version de la biblioth\u00e8que OpenSSL utilis\u00e9e dans Blue Coat\nReporter et permettent en outre de causer un d\u00e9ni de service, d\u0027obtenir\ndes informations sensibles et d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2010-3864", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3864" }, { "name": "CVE-2011-0014", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0014" } ], "initial_release_date": "2012-02-03T00:00:00", "last_revision_date": "2012-02-03T00:00:00", "links": [], "reference": "CERTA-2012-AVI-056", "revisions": [ { "description": "version initiale.", "revision_date": "2012-02-03T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "Plusieurs vuln\u00e9rabilit\u00e9s permettant \u00e0 un utilisateur malintentionn\u00e9 de\ncauser un d\u00e9ni de service, d\u0027obtenir des informations sensibles et\nd\u0027ex\u00e9cuter du code \u00e0 distance sont pr\u00e9sentes dans \u003cspan\nclass=\"textit\"\u003eBlue Coat Reporter\u003c/span\u003e.\n", "title": "Vuln\u00e9rabilit\u00e9s dans Blue Coat Reporter", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Blue Coat SA68 du 01 f\u00e9vrier 2012", "url": "https://kb.bluecoat.com/index?page=content\u0026id=SA68" } ] }
CERTA-2008-AVI-595
Vulnerability from certfr_avis
Une vulnérabilité de certains produits HP permet à une personne distante de réaliser un déni de service.
Description
Une vulnérabilité des produits HP utilisant le service HP OpenView Shared Trace permet à un utilisateur distant de réaliser un déni de service par le biais de plusieurs requêtes RPC spécifiquement conçues.
Solution
Se référer aux bulletins de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |
---|---|---|---|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "HP Performance Agent version vC.04.70.", "product": { "name": "N/A", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "HP OpenView Reporter 3.7 sous Windows ;", "product": { "name": "Reporter", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "HP OpenView Performance Agent versions vC.04.60 et vC.04.61 ;", "product": { "name": "N/A", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "HP Reporter 3.8 sous Windows ;", "product": { "name": "Reporter", "vendor": { "name": "Broadcom", "scada": false } } } ], "affected_systems_content": null, "content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 des produits HP utilisant le service HP OpenView\nShared Trace permet \u00e0 un utilisateur distant de r\u00e9aliser un d\u00e9ni de\nservice par le biais de plusieurs requ\u00eates RPC sp\u00e9cifiquement con\u00e7ues.\n\n## Solution\n\nSe r\u00e9f\u00e9rer aux bulletins de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2007-4349", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4349" } ], "initial_release_date": "2008-12-11T00:00:00", "last_revision_date": "2008-12-11T00:00:00", "links": [ { "title": "Bulletin de s\u00e9curit\u00e9 HP c01612418 du 08 d\u00e9cembre 2008 :", "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c01612418" }, { "title": "Bulletin de s\u00e9curit\u00e9 HP c01621724 du 08 d\u00e9cembre 2008 :", "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c01621724" } ], "reference": "CERTA-2008-AVI-595", "revisions": [ { "description": "version initiale.", "revision_date": "2008-12-11T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" } ], "summary": "Une vuln\u00e9rabilit\u00e9 de certains produits \u003cspan class=\"textit\"\u003eHP\u003c/span\u003e\npermet \u00e0 une personne distante de r\u00e9aliser un d\u00e9ni de service.\n", "title": "Vuln\u00e9rabilit\u00e9 dans HP OpenView", "vendor_advisories": [ { "published_at": null, "title": "Bulletins de s\u00e9curit\u00e9 HP c01612418 et 01621724 du 08 d\u00e9cembre 2008", "url": null } ] }
CERTA-2007-AVI-351
Vulnerability from certfr_avis
Plusieurs applications de HP OpenView sont vulnérables à un débordement de mémoire.
Description
Un service partagé par plusieurs applications est vulnérable à un débordement de mémoire, ce qui rend les logiciels l'utilisant vulnérables. Un utilisateur malintentionné pourrait exploiter ces failles pour exécuter du code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Symfony | process | HP OpenView Service Desk Process Insight (SDPI) 2.x ; | ||
N/A | N/A | HP OpenView Network Node Manager (NNM) 6.x ; | ||
Symfony | process | HP Service Desk Process Insight (HPSDPI) 2.x. | ||
Symfony | process | HP OpenView Business Process Insight (OVBPI) 2.x ; | ||
N/A | N/A | HP OpenView Network Node Manager (NNM) 7.x ; | ||
Microsoft | Windows | HP OpenView Operations Manager for Windows (OVOW) 7.x ; | ||
Symfony | process | HP Business Process Insight (HPBPI) 2.x ; | ||
Symfony | process | HP OpenView Service Desk Process Insight (SDPI) 1.x ; | ||
Symfony | process | HP Service Desk Process Insight (HPSDPI) 1.x ; | ||
N/A | N/A | HP OpenView Performance Manager (OVPM) 6.x ; | ||
Broadcom | Reporter | HP OpenView Reporter 3.x ; | ||
Symfony | process | HP OpenView Business Process Insight (OVBPI) 1.x ; | ||
N/A | N/A | HP OpenView Performance Manager (OVPM) 5.x ; | ||
Symfony | process | HP Business Process Insight (HPBPI) 1.x ; | ||
N/A | N/A | HP OpenView Performance Insight (OVPI) 5.x ; | ||
Symfony | N/A | HP OpenView Operations HTTPS Agent 8.x ; | ||
Symfony | N/A | HP OpenView Internet Service (OVIS) 6.x ; | ||
Symfony | N/A | HP OpenView Dashboard 2.x ; | ||
N/A | N/A | HP OpenView Service Quality Manager (OV SQM) 1.x ; | ||
N/A | N/A | HP OpenView Performance Agent ; |
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "HP OpenView Service Desk Process Insight (SDPI) 2.x ;", "product": { "name": "process", "vendor": { "name": "Symfony", "scada": false } } }, { "description": "HP OpenView Network Node Manager (NNM) 6.x ;", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "HP Service Desk Process Insight (HPSDPI) 2.x.", "product": { "name": "process", "vendor": { "name": "Symfony", "scada": false } } }, { "description": "HP OpenView Business Process Insight (OVBPI) 2.x ;", "product": { "name": "process", "vendor": { "name": "Symfony", "scada": false } } }, { "description": "HP OpenView Network Node Manager (NNM) 7.x ;", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "HP OpenView Operations Manager for Windows (OVOW) 7.x ;", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "HP Business Process Insight (HPBPI) 2.x ;", "product": { "name": "process", "vendor": { "name": "Symfony", "scada": false } } }, { "description": "HP OpenView Service Desk Process Insight (SDPI) 1.x ;", "product": { "name": "process", "vendor": { "name": "Symfony", "scada": false } } }, { "description": "HP Service Desk Process Insight (HPSDPI) 1.x ;", "product": { "name": "process", "vendor": { "name": "Symfony", "scada": false } } }, { "description": "HP OpenView Performance Manager (OVPM) 6.x ;", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "HP OpenView Reporter 3.x ;", "product": { "name": "Reporter", "vendor": { "name": "Broadcom", "scada": false } } }, { "description": "HP OpenView Business Process Insight (OVBPI) 1.x ;", "product": { "name": "process", "vendor": { "name": "Symfony", "scada": false } } }, { "description": "HP OpenView Performance Manager (OVPM) 5.x ;", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "HP Business Process Insight (HPBPI) 1.x ;", "product": { "name": "process", "vendor": { "name": "Symfony", "scada": false } } }, { "description": "HP OpenView Performance Insight (OVPI) 5.x ;", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "HP OpenView Operations HTTPS Agent 8.x ;", "product": { "name": "N/A", "vendor": { "name": "Symfony", "scada": false } } }, { "description": "HP OpenView Internet Service (OVIS) 6.x ;", "product": { "name": "N/A", "vendor": { "name": "Symfony", "scada": false } } }, { "description": "HP OpenView Dashboard 2.x ;", "product": { "name": "N/A", "vendor": { "name": "Symfony", "scada": false } } }, { "description": "HP OpenView Service Quality Manager (OV SQM) 1.x ;", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "HP OpenView Performance Agent ;", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } } ], "affected_systems_content": null, "content": "## Description\n\nUn service partag\u00e9 par plusieurs applications est vuln\u00e9rable \u00e0 un\nd\u00e9bordement de m\u00e9moire, ce qui rend les logiciels l\u0027utilisant\nvuln\u00e9rables. Un utilisateur malintentionn\u00e9 pourrait exploiter ces\nfailles pour ex\u00e9cuter du code arbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2007-3872", "url": "https://www.cve.org/CVERecord?id=CVE-2007-3872" } ], "initial_release_date": "2007-08-10T00:00:00", "last_revision_date": "2007-08-10T00:00:00", "links": [ { "title": "Bulletins de s\u00e9curit\u00e9 HPSBMA02235 \u00e0 HPSBMA002246 du 07 ao\u00fbt 2007 :", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01110627" }, { "title": "Bulletins de s\u00e9curit\u00e9 HPSBMA02235 \u00e0 HPSBMA002246 du 07 ao\u00fbt 2007 :", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01114023" }, { "title": "Bulletins de s\u00e9curit\u00e9 HPSBMA02235 \u00e0 HPSBMA002246 du 07 ao\u00fbt 2007 :", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01109171" }, { "title": "Bulletins de s\u00e9curit\u00e9 HPSBMA02235 \u00e0 HPSBMA002246 du 07 ao\u00fbt 2007 :", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01115068" }, { "title": "Bulletins de s\u00e9curit\u00e9 HPSBMA02235 \u00e0 HPSBMA002246 du 07 ao\u00fbt 2007 :", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01112038" }, { "title": "Bulletins de s\u00e9curit\u00e9 HPSBMA02235 \u00e0 HPSBMA002246 du 07 ao\u00fbt 2007 :", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01106515" }, { "title": "Bulletins de s\u00e9curit\u00e9 HPSBMA02235 \u00e0 HPSBMA002246 du 07 ao\u00fbt 2007 :", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01111851" }, { "title": "R\u00e9f\u00e9rence CVE CVE2007-3872:", "url": "http://cve.mitre.org/cgi-bin/cvename.cgi.name=CVE-2007-3872" }, { "title": "Bulletins de s\u00e9curit\u00e9 HPSBMA02235 \u00e0 HPSBMA002246 du 07 ao\u00fbt 2007 :", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01109617" }, { "title": "Bulletins de s\u00e9curit\u00e9 HPSBMA02235 \u00e0 HPSBMA002246 du 07 ao\u00fbt 2007 :", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01114156" }, { "title": "Bulletins de s\u00e9curit\u00e9 HPSBMA02235 \u00e0 HPSBMA002246 du 07 ao\u00fbt 2007 :", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01109584" }, { "title": "Bulletins de s\u00e9curit\u00e9 HPSBMA02235 \u00e0 HPSBMA002246 du 07 ao\u00fbt 2007 :", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01110576" } ], "reference": "CERTA-2007-AVI-351", "revisions": [ { "description": "version initiale.", "revision_date": "2007-08-10T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" } ], "summary": "Plusieurs applications de HP OpenView sont vuln\u00e9rables \u00e0 un d\u00e9bordement\nde m\u00e9moire.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans HP OpenView", "vendor_advisories": [ { "published_at": null, "title": "Bulletins de s\u00e9curit\u00e9 HP HPSBMA02235 \u00e0 HPSBMA002246 du 07 ao\u00fbt 2007", "url": null } ] }