Refine your search
66 vulnerabilities found for Security by ESET
CERTFR-2025-AVI-0727
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits ESET. Elles permettent à un attaquant de provoquer un déni de service à distance et un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
ESET | Server Security | Server Security pour Windows Server (anciennement File Security pour Microsoft Windows Server) sans le dernier correctif de sécurité | ||
ESET | Mail Security | Mail Security pour Microsoft Exchange Server sans le dernier correctif de sécurité | ||
ESET | File Security | File Security pour Microsoft Azure sans le dernier correctif de sécurité | ||
ESET | PROTECT On-Prem | PROTECT On-Prem versions 12.1.x antérieures à 12.1.11.0 | ||
ESET | Security Ultimate | Security Ultimate sans le dernier correctif de sécurité | ||
ESET | Endpoint Antivirus | Endpoint Antivirus pour Windows sans le dernier correctif de sécurité | ||
ESET | Endpoint Security | Endpoint Security pour Windows sans le dernier correctif de sécurité | ||
ESET | Security | Security pour Microsoft SharePoint Server sans le dernier correctif de sécurité | ||
ESET | Safe Server | Safe Server sans le dernier correctif de sécurité | ||
ESET | Small Business Security | Small Business Security sans le dernier correctif de sécurité | ||
ESET | PROTECT On-Prem | PROTECT On-Prem versions 11.1.x antérieures à 11.1.18.0 | ||
ESET | Smart Security Premium | Smart Security Premium sans le dernier correctif de sécurité | ||
ESET | NOD32 Antivirus | NOD32 Antivirus sans le dernier correctif de sécurité | ||
ESET | PROTECT On-Prem | PROTECT On-Prem versions 12.0.x antérieures à 12.0.15.0 | ||
ESET | Mail Security | Mail Security pour IBM Domino sans le dernier correctif de sécurité | ||
ESET | Internet Security | Internet Security sans le dernier correctif de sécurité |
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Server Security pour Windows Server (anciennement File Security pour Microsoft Windows Server) sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "Server Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Mail Security pour Microsoft Exchange Server sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "Mail Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "File Security pour Microsoft Azure sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "File Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "PROTECT On-Prem versions 12.1.x ant\u00e9rieures \u00e0 12.1.11.0", "product": { "name": "PROTECT On-Prem", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Security Ultimate sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "Security Ultimate", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Endpoint Antivirus pour Windows sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "Endpoint Antivirus", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Endpoint Security pour Windows sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "Endpoint Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Security pour Microsoft SharePoint Server sans le dernier correctif de s\u00e9curit\u00e9\n\n", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Safe Server sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "Safe Server", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Small Business Security sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "Small Business Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "PROTECT On-Prem versions 11.1.x ant\u00e9rieures \u00e0 11.1.18.0", "product": { "name": "PROTECT On-Prem", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Smart Security Premium sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "Smart Security Premium", "vendor": { "name": "ESET", "scada": false } } }, { "description": "NOD32 Antivirus sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "NOD32 Antivirus", "vendor": { "name": "ESET", "scada": false } } }, { "description": "PROTECT On-Prem versions 12.0.x ant\u00e9rieures \u00e0 12.0.15.0", "product": { "name": "PROTECT On-Prem", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Mail Security pour IBM Domino sans le dernier correctif de s\u00e9curit\u00e9\n", "product": { "name": "Mail Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Internet Security sans le dernier correctif de s\u00e9curit\u00e9\n", "product": { "name": "Internet Security", "vendor": { "name": "ESET", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2025-8352", "url": "https://www.cve.org/CVERecord?id=CVE-2025-8352" }, { "name": "CVE-2025-4952", "url": "https://www.cve.org/CVERecord?id=CVE-2025-4952" }, { "name": "CVE-2025-48976", "url": "https://www.cve.org/CVERecord?id=CVE-2025-48976" }, { "name": "CVE-2025-48988", "url": "https://www.cve.org/CVERecord?id=CVE-2025-48988" } ], "initial_release_date": "2025-08-25T00:00:00", "last_revision_date": "2025-08-25T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0727", "revisions": [ { "description": "Version initiale", "revision_date": "2025-08-25T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits ESET. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance et un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits ESET", "vendor_advisories": [ { "published_at": "2025-08-21", "title": "Bulletin de s\u00e9curit\u00e9 ESET ca8854", "url": "https://support-feed.eset.com/link/15370/17124579/ca8854" }, { "published_at": "2025-08-21", "title": "Bulletin de s\u00e9curit\u00e9 ESET ca8853", "url": "https://support-feed.eset.com/link/15370/17124580/ca8853" } ] }
CERTFR-2025-AVI-0623
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits ESET. Elles permettent à un attaquant de provoquer une élévation de privilèges et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
ESET | Endpoint Security | Endpoint Security versions antérieures à 11.1.2062.0 pour Windows | ||
ESET | Small Business Security | Small Business Security versions antérieures à 18.2.14.0 | ||
ESET | Security | Security versions 11.x antérieures à 11.1.15005.0 pour Microsoft SharePoint Server | ||
ESET | Mail Security | Mail Security versions 11.x antérieures à 11.1.10013 pour Microsoft Exchange Server | ||
ESET | Internet Security | Internet Security versions antérieures à 18.2.14.0 | ||
ESET | Server Security | Server Security versions 12.x antérieures à 12.0.12005.0 pour Windows | ||
ESET | Smart Security Premium | Smart Security Premium versions antérieures à 18.2.14.0 | ||
ESET | Security | Security versions 12.x antérieures à 12.0.15005.0 pour Microsoft SharePoint Server | ||
ESET | Safe Server | Safe Server versions antérieures à 18.2.14.0 | ||
ESET | Security Ultimate | Security Ultimate versions antérieures à 18.2.14.0 | ||
ESET | Server Security | Server Security versions 11.x antérieures à 11.1.12013.0 pour Windows | ||
ESET | Mail Security | Mail Security versions 12.x antérieures à 12.0.10004.0 pour Microsoft Exchange Server | ||
ESET | Endpoint Antivirus | Endpoint Antivirus versions antérieures à 12.0.2058.0 pour Windows | ||
ESET | NOD32 Antivirus | NOD32 Antivirus versions antérieures à 18.2.14.0 |
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Endpoint Security versions ant\u00e9rieures \u00e0 11.1.2062.0 pour Windows", "product": { "name": "Endpoint Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Small Business Security versions ant\u00e9rieures \u00e0 18.2.14.0", "product": { "name": "Small Business Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Security versions 11.x ant\u00e9rieures \u00e0 11.1.15005.0 pour Microsoft SharePoint Server", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Mail Security versions 11.x ant\u00e9rieures \u00e0 11.1.10013 pour Microsoft Exchange Server", "product": { "name": "Mail Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Internet Security versions ant\u00e9rieures \u00e0 18.2.14.0", "product": { "name": "Internet Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Server Security versions 12.x ant\u00e9rieures \u00e0 12.0.12005.0 pour Windows", "product": { "name": "Server Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Smart Security Premium versions ant\u00e9rieures \u00e0 18.2.14.0", "product": { "name": "Smart Security Premium", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Security versions 12.x ant\u00e9rieures \u00e0 12.0.15005.0 pour Microsoft SharePoint Server", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Safe Server versions ant\u00e9rieures \u00e0 18.2.14.0", "product": { "name": "Safe Server", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Security Ultimate versions ant\u00e9rieures \u00e0 18.2.14.0", "product": { "name": "Security Ultimate", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Server Security versions 11.x ant\u00e9rieures \u00e0 11.1.12013.0 pour Windows", "product": { "name": "Server Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Mail Security versions 12.x ant\u00e9rieures \u00e0 12.0.10004.0 pour Microsoft Exchange Server", "product": { "name": "Mail Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Endpoint Antivirus versions ant\u00e9rieures \u00e0 12.0.2058.0 pour Windows", "product": { "name": "Endpoint Antivirus", "vendor": { "name": "ESET", "scada": false } } }, { "description": "NOD32 Antivirus versions ant\u00e9rieures \u00e0 18.2.14.0", "product": { "name": "NOD32 Antivirus", "vendor": { "name": "ESET", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2025-5028", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5028" }, { "name": "CVE-2025-2425", "url": "https://www.cve.org/CVERecord?id=CVE-2025-2425" } ], "initial_release_date": "2025-07-25T00:00:00", "last_revision_date": "2025-07-25T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0623", "revisions": [ { "description": "Version initiale", "revision_date": "2025-07-25T00:00:00.000000" } ], "risks": [ { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits ESET. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits ESET", "vendor_advisories": [ { "published_at": "2025-07-16", "title": "Bulletin de s\u00e9curit\u00e9 ESET ca8840", "url": "https://support-feed.eset.com/link/15370/17103529/ca8840" }, { "published_at": "2025-07-09", "title": "Bulletin de s\u00e9curit\u00e9 ESET ca8838", "url": "https://support-feed.eset.com/link/15370/17103530/ca8838" } ] }
CERTFR-2025-AVI-0280
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans les produits ESET. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
ESET | Smart Security Premium | Smart Security Premium versions antériéures à 18.1.10.0 | ||
ESET | Server Security | Server Security versions antérieures à 11.1.12009.0 pour Windows Server | ||
ESET | NOD32 Antivirus | NOD32 Antivirus versions antériéures à 18.1.10.0 | ||
ESET | Internet Security | Internet Security versions antériéures à 18.1.10.0 | ||
ESET | Endpoint Security | Endpoint Security versions antérieures à 12.0.2045.0 | ||
ESET | Endpoint Antivirus | Endpoint Antivirus versions antérieures à 12.0.2045.0 | ||
ESET | Mail Security | Mail Security versions antérieures à 11.1.10011.0, 11.0.10010.0 et 10.1.10017.0 pour Microsoft Exchange Server | ||
ESET | Security Ultimate | Security Ultimate versions antériéures à 18.1.10.0 | ||
ESET | Endpoint Antivirus | Endpoint Antivirus versions antérieures à 11.1.2059.0 | ||
ESET | Security | Security versions antérieures à 11.1.15003.0, 11.0.15007.0, 10.0.15008.0 pour Microsoft SharePoint Server | ||
ESET | Safe Server | ESET Safe Server versions antérieures à 18.1.10.0 | ||
ESET | Endpoint Security | Endpoint Security versions antérieures à 11.1.2059.0 | ||
ESET | Small Business Security | Small Business Security versions antérieures à 18.1.10.0 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Smart Security Premium versions ant\u00e9ri\u00e9ures \u00e0 18.1.10.0", "product": { "name": "Smart Security Premium", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Server Security versions ant\u00e9rieures \u00e0 11.1.12009.0 pour Windows Server", "product": { "name": "Server Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "NOD32 Antivirus versions ant\u00e9ri\u00e9ures \u00e0 18.1.10.0", "product": { "name": "NOD32 Antivirus", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Internet Security versions ant\u00e9ri\u00e9ures \u00e0 18.1.10.0", "product": { "name": "Internet Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Endpoint Security versions ant\u00e9rieures \u00e0 12.0.2045.0", "product": { "name": "Endpoint Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Endpoint Antivirus versions ant\u00e9rieures \u00e0 12.0.2045.0", "product": { "name": "Endpoint Antivirus", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Mail Security versions ant\u00e9rieures \u00e0 11.1.10011.0, 11.0.10010.0 et 10.1.10017.0 pour Microsoft Exchange Server", "product": { "name": "Mail Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Security Ultimate versions ant\u00e9ri\u00e9ures \u00e0 18.1.10.0", "product": { "name": "Security Ultimate", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Endpoint Antivirus versions ant\u00e9rieures \u00e0 11.1.2059.0", "product": { "name": "Endpoint Antivirus", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Security versions ant\u00e9rieures \u00e0 11.1.15003.0, 11.0.15007.0, 10.0.15008.0 pour Microsoft SharePoint Server", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Safe Server versions ant\u00e9rieures \u00e0 18.1.10.0", "product": { "name": "Safe Server", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Endpoint Security versions ant\u00e9rieures \u00e0 11.1.2059.0", "product": { "name": "Endpoint Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Small Business Security versions ant\u00e9rieures \u00e0 18.1.10.0", "product": { "name": "Small Business Security", "vendor": { "name": "ESET", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2024-11859", "url": "https://www.cve.org/CVERecord?id=CVE-2024-11859" } ], "initial_release_date": "2025-04-07T00:00:00", "last_revision_date": "2025-04-07T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0280", "revisions": [ { "description": "Version initiale", "revision_date": "2025-04-07T00:00:00.000000" } ], "risks": [ { "description": "Contournement de la politique de s\u00e9curit\u00e9" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits ESET. Elle permet \u00e0 un attaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9.", "title": "Vuln\u00e9rabilit\u00e9 dans les produits ESET", "vendor_advisories": [ { "published_at": "2025-04-04", "title": "Bulletin de s\u00e9curit\u00e9 ESET CA8810", "url": "https://support-feed.eset.com/link/15370/16999046/ca8810" } ] }
CERTFR-2024-AVI-0801
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits ESET. Elles permettent à un attaquant de provoquer une élévation de privilèges et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
ESET | Safe Server | ESET Safe Server sans le correctif de sécurité Cleaner module 1251 | ||
ESET | Small Business Security | ESET Small Business Security sans le correctif de sécurité Cleaner module 1251 | ||
ESET | Security Ultimate | ESET Security Ultimate sans le correctif de sécurité Cleaner module 1251 | ||
ESET | Endpoint Security | ESET Endpoint Security sans le correctif de sécurité Cleaner module 1251 pour Windows | ||
ESET | File Security | ESET File Security sans le correctif de sécurité Cleaner module 1251 pour Microsoft Azure | ||
ESET | NOD32 Antivirus | ESET NOD32 Antivirus sans le correctif de sécurité Cleaner module 1251 | ||
ESET | Internet Security | ESET Internet Security sans le correctif de sécurité Cleaner module 1251 | ||
ESET | Mail Security | ESET Mail Security sans le correctif de sécurité Cleaner module 1251 pour Microsoft Exchange Server et IBM Domino | ||
ESET | Smart Security Premium | ESET Smart Security Premium sans le correctif de sécurité Cleaner module 1251 | ||
ESET | Server Security | ESET Server Security sans le correctif de sécurité Cleaner module 1251 pour Windows Server | ||
ESET | Endpoint Security | ESET Endpoint Security versions antérieures à 8.0.7200.0 pour macOS | ||
ESET | Cyber Security | ESET Cyber Security versions antérieures à 7.5.74.0 | ||
ESET | Endpoint Antivirus | ESET Endpoint Antivirus sans le correctif de sécurité Cleaner module 1251 | ||
ESET | Security | ESET Security sans le correctif de sécurité Cleaner module 1251 pour Microsoft SharePoint Server |
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "ESET Safe Server sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251", "product": { "name": "Safe Server", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Small Business Security sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251", "product": { "name": "Small Business Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Security Ultimate sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251", "product": { "name": "Security Ultimate", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Endpoint Security sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251 pour Windows", "product": { "name": "Endpoint Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET File Security sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251 pour Microsoft Azure", "product": { "name": "File Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET NOD32 Antivirus sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251", "product": { "name": "NOD32 Antivirus", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Internet Security sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251", "product": { "name": "Internet Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Mail Security sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251 pour Microsoft Exchange Server et IBM Domino ", "product": { "name": "Mail Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Smart Security Premium sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251", "product": { "name": "Smart Security Premium", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Server Security sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251 pour Windows Server", "product": { "name": "Server Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Endpoint Security versions ant\u00e9rieures \u00e0 8.0.7200.0 pour macOS ", "product": { "name": "Endpoint Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Cyber Security versions ant\u00e9rieures \u00e0 7.5.74.0 ", "product": { "name": "Cyber Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Endpoint Antivirus sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251", "product": { "name": "Endpoint Antivirus", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Security sans le correctif de s\u00e9curit\u00e9 Cleaner module 1251 pour Microsoft SharePoint Server", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2024-6654", "url": "https://www.cve.org/CVERecord?id=CVE-2024-6654" }, { "name": "CVE-2024-7400", "url": "https://www.cve.org/CVERecord?id=CVE-2024-7400" } ], "initial_release_date": "2024-09-23T00:00:00", "last_revision_date": "2024-09-23T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0801", "revisions": [ { "description": "Version initiale", "revision_date": "2024-09-23T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits ESET. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits ESET", "vendor_advisories": [ { "published_at": "2024-09-20", "title": "Bulletin de s\u00e9curit\u00e9 ESET ca8725", "url": "https://support-feed.eset.com/link/15370/16815452/ca8725" }, { "published_at": "2024-09-20", "title": "Bulletin de s\u00e9curit\u00e9 ESET ca8726", "url": "https://support-feed.eset.com/link/15370/16815451/ca8726" } ] }
CERTFR-2024-AVI-0581
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans les produits ESET. Elle permet à un attaquant de provoquer une atteinte à l'intégrité des données et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
ESET | Smart Security Premium | ESET Smart Security Premium versions antérieures à 17.2.7.0 | ||
ESET | Mail Security | ESET Mail Security versions antérieures à 11.0.10008.0 pour Microsoft Exchange Server | ||
ESET | Security | ESET Security versions antérieures à 11.0.15004.0 pour Microsoft SharePoint Server | ||
ESET | Server Security | ESET Server Security versions antérieures à 11.0.12012.0 pour Windows Server | ||
ESET | Endpoint Antivirus | ESET Endpoint Antivirus versions antérieures à 11.1.2039.0 pour Windows | ||
ESET | Security Ultimate | ESET Security Ultimate versions antérieures à 17.2.7.0 | ||
ESET | Internet Security | ESET Internet Security versions antérieures à 17.2.7.0 | ||
ESET | Endpoint Security | ESET Endpoint Security versions antérieures à 11.1.2039.0 pour Windows | ||
ESET | NOD32 Antivirus | ESET NOD32 Antivirus versions antérieures à 17.2.7.0 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "ESET Smart Security Premium versions ant\u00e9rieures \u00e0 17.2.7.0", "product": { "name": "Smart Security Premium", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Mail Security versions ant\u00e9rieures \u00e0 11.0.10008.0 pour Microsoft Exchange Server", "product": { "name": "Mail Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Security versions ant\u00e9rieures \u00e0 11.0.15004.0 pour Microsoft SharePoint Server", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Server Security versions ant\u00e9rieures \u00e0 11.0.12012.0 pour Windows Server", "product": { "name": "Server Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Endpoint Antivirus versions ant\u00e9rieures \u00e0 11.1.2039.0 pour Windows", "product": { "name": "Endpoint Antivirus", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Security Ultimate versions ant\u00e9rieures \u00e0 17.2.7.0", "product": { "name": "Security Ultimate", "vendor": { "name": "ESET", "scada": false } } }, { "description": " ESET Internet Security versions ant\u00e9rieures \u00e0 17.2.7.0", "product": { "name": "Internet Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Endpoint Security versions ant\u00e9rieures \u00e0 11.1.2039.0 pour Windows", "product": { "name": "Endpoint Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET NOD32 Antivirus versions ant\u00e9rieures \u00e0 17.2.7.0", "product": { "name": "NOD32 Antivirus", "vendor": { "name": "ESET", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2024-3779", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3779" } ], "initial_release_date": "2024-07-15T00:00:00", "last_revision_date": "2024-07-15T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0581", "revisions": [ { "description": "Version initiale", "revision_date": "2024-07-15T00:00:00.000000" } ], "risks": [ { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "D\u00e9ni de service" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits ESET. Elle permet \u00e0 un attaquant de provoquer une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un d\u00e9ni de service.", "title": "Vuln\u00e9rabilit\u00e9 dans les produits ESET", "vendor_advisories": [ { "published_at": "2024-07-12", "title": "Bulletin de s\u00e9curit\u00e9 ESET ca8688", "url": "https://support-feed.eset.com/link/15370/16741922/ca8688" } ] }
CERTFR-2024-AVI-0136
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans les produits ESET. Elle permet à un attaquant de provoquer une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
ESET | Security | ESET Security pour Microsoft SharePoint Server versions 7.3.x.x antérieures à 7.3.15006.0 | ||
ESET | N/A | ESET NOD32 Antivirus, ESET Internet Security, ESET Smart Security Premium et ESET Security Ultimate versions antérieures à 17.0.10.0 | ||
ESET | Mail Security | ESET Mail Security pour IBM Domino versions 10.0.x.x antérieures à 10.0.14007.0 | ||
ESET | Mail Security | ESET Mail Security pour Microsoft Exchange Server versions 10.1.x.x antérieures à 10.1.10014.0 | ||
ESET | Security | ESET Security pour Microsoft SharePoint Server versions 9.0.x.x antérieures à 9.0.15006.0 | ||
ESET | Mail Security | ESET Mail Security pour IBM Domino versions 7.3.x.x antérieures à 7.3.14006.0 | ||
ESET | N/A | ESET Server Security pour Windows Server (anciennement File Security pour Microsoft Windows Server) versions 10.0.x.x antérieures à 10.0.12015.0 | ||
ESET | Mail Security | ESET Mail Security pour IBM Domino versions 8.0.x.x antérieures à 8.0.14014.0 | ||
ESET | N/A | ESET Endpoint Antivirus pour Windows et ESET Endpoint Security pour Windows versions 10.1.x.x antérieures à 10.1.2063.0 | ||
ESET | N/A | ESET Endpoint Antivirus pour Windows et ESET Endpoint Security pour Windows versions 10.0.x.x antérieures à 10.0.2052.0 | ||
ESET | N/A | ESET Server Security pour Windows Server (anciennement File Security pour Microsoft Windows Server) versions 7.3.x.x antérieures à 7.3.12013.0 | ||
ESET | N/A | ESET Endpoint Antivirus pour Windows et ESET Endpoint Security pour Windows versions 8.1.x.x antérieures à 8.1.2062.0 | ||
ESET | Mail Security | ESET Mail Security pour Microsoft Exchange Server versions 9.0.x.x antérieures à 9.0.10012.0 | ||
ESET | N/A | ESET Server Security pour Windows Server (anciennement File Security pour Microsoft Windows Server) versions 8.0.x.x antérieures à 8.0.12016.0 | ||
ESET | Mail Security | ESET Mail Security pour Microsoft Exchange Server versions 8.0.x.x antérieures à 8.0.10024.0 | ||
ESET | Mail Security | ESET Mail Security pour Microsoft Exchange Server versions 7.3.x.x antérieures à 7.3.10018.0 | ||
ESET | Security | ESET Security pour Microsoft SharePoint Server versions 8.0.x.x antérieures à 8.0.15012.0 | ||
ESET | Security | ESET Security pour Microsoft SharePoint Server versions 10.0.x.x antérieures à 10.0.15005.0 | ||
ESET | Mail Security | ESET Mail Security pour Microsoft Exchange Server versions 10.0.x.x antérieures à 10.0.10018.0 | ||
ESET | N/A | ESET Endpoint Antivirus pour Windows et ESET Endpoint Security pour Windows versions 9.1.x.x antérieures à 9.1.2071.0 | ||
ESET | Mail Security | ESET Mail Security pour IBM Domino versions 9.0.x.x antérieures à 9.0.14008.0 | ||
ESET | N/A | ESET Server Security pour Windows Server (anciennement File Security pour Microsoft Windows Server) versions 9.0.x.x antérieures à 9.0.12019.0 | ||
ESET | N/A | ESET Endpoint Antivirus pour Windows et ESET Endpoint Security pour Windows versions 11.0.x.x antérieures à 11.0.2032.0 | ||
ESET | File Security | ESET File Security pour Microsoft Azure |
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "ESET Security pour Microsoft SharePoint Server versions 7.3.x.x ant\u00e9rieures \u00e0 7.3.15006.0", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET NOD32 Antivirus, ESET Internet Security, ESET Smart Security Premium et ESET Security Ultimate versions ant\u00e9rieures \u00e0 17.0.10.0", "product": { "name": "N/A", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Mail Security pour IBM Domino versions 10.0.x.x ant\u00e9rieures \u00e0 10.0.14007.0", "product": { "name": "Mail Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Mail Security pour Microsoft Exchange Server versions 10.1.x.x ant\u00e9rieures \u00e0 10.1.10014.0", "product": { "name": "Mail Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Security pour Microsoft SharePoint Server versions 9.0.x.x ant\u00e9rieures \u00e0 9.0.15006.0", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Mail Security pour IBM Domino versions 7.3.x.x ant\u00e9rieures \u00e0 7.3.14006.0", "product": { "name": "Mail Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Server Security pour Windows Server (anciennement File Security pour Microsoft Windows Server) versions 10.0.x.x ant\u00e9rieures \u00e0 10.0.12015.0", "product": { "name": "N/A", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Mail Security pour IBM Domino versions 8.0.x.x ant\u00e9rieures \u00e0 8.0.14014.0", "product": { "name": "Mail Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Endpoint Antivirus pour Windows et ESET Endpoint Security pour Windows versions 10.1.x.x ant\u00e9rieures \u00e0 10.1.2063.0", "product": { "name": "N/A", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Endpoint Antivirus pour Windows et ESET Endpoint Security pour Windows versions 10.0.x.x ant\u00e9rieures \u00e0 10.0.2052.0", "product": { "name": "N/A", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Server Security pour Windows Server (anciennement File Security pour Microsoft Windows Server) versions 7.3.x.x ant\u00e9rieures \u00e0 7.3.12013.0", "product": { "name": "N/A", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Endpoint Antivirus pour Windows et ESET Endpoint Security pour Windows versions 8.1.x.x ant\u00e9rieures \u00e0 8.1.2062.0", "product": { "name": "N/A", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Mail Security pour Microsoft Exchange Server versions 9.0.x.x ant\u00e9rieures \u00e0 9.0.10012.0", "product": { "name": "Mail Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Server Security pour Windows Server (anciennement File Security pour Microsoft Windows Server) versions 8.0.x.x ant\u00e9rieures \u00e0 8.0.12016.0", "product": { "name": "N/A", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Mail Security pour Microsoft Exchange Server versions 8.0.x.x ant\u00e9rieures \u00e0 8.0.10024.0", "product": { "name": "Mail Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Mail Security pour Microsoft Exchange Server versions 7.3.x.x ant\u00e9rieures \u00e0 7.3.10018.0", "product": { "name": "Mail Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Security pour Microsoft SharePoint Server versions 8.0.x.x ant\u00e9rieures \u00e0 8.0.15012.0", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Security pour Microsoft SharePoint Server versions 10.0.x.x ant\u00e9rieures \u00e0 10.0.15005.0", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Mail Security pour Microsoft Exchange Server versions 10.0.x.x ant\u00e9rieures \u00e0 10.0.10018.0", "product": { "name": "Mail Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Endpoint Antivirus pour Windows et ESET Endpoint Security pour Windows versions 9.1.x.x ant\u00e9rieures \u00e0 9.1.2071.0", "product": { "name": "N/A", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Mail Security pour IBM Domino versions 9.0.x.x ant\u00e9rieures \u00e0 9.0.14008.0", "product": { "name": "Mail Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Server Security pour Windows Server (anciennement File Security pour Microsoft Windows Server) versions 9.0.x.x ant\u00e9rieures \u00e0 9.0.12019.0", "product": { "name": "N/A", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Endpoint Antivirus pour Windows et ESET Endpoint Security pour Windows versions 11.0.x.x ant\u00e9rieures \u00e0 11.0.2032.0", "product": { "name": "N/A", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET File Security pour Microsoft Azure", "product": { "name": "File Security", "vendor": { "name": "ESET", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2024-0353", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0353" } ], "initial_release_date": "2024-02-15T00:00:00", "last_revision_date": "2024-02-15T00:00:00", "links": [ { "title": "Bulletin de s\u00e9curit\u00e9 ESET\u00a0CA8612 du 14 f\u00e9vrier 2024", "url": "https://support.eset.com/en/ca8612-eset-customer-advisory-link-following-local-privilege-escalation-vulnerability-in-eset-products-for-windows-fixed" } ], "reference": "CERTFR-2024-AVI-0136", "revisions": [ { "description": "Version initiale", "revision_date": "2024-02-15T00:00:00.000000" } ], "risks": [ { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan class=\"textit\"\u003eles\nproduits ESET\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer une\n\u00e9l\u00e9vation de privil\u00e8ges.\n", "title": "Vuln\u00e9rabilit\u00e9 dans les produits ESET", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 ESET CA8612 du 14 f\u00e9vrier 2024", "url": null } ] }
CERTFR-2023-AVI-1053
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans les produits ESET. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
ESET | Security Ultimate | ESET Security Ultimate | ||
ESET | Endpoint Antivirus | ESET Endpoint Antivirus versions postérieures à 10.0 pour Linux | ||
ESET | Server Security | ESET Server Security versions postérieures à 10.1 pour Linux | ||
ESET | Endpoint Antivirus | ESET Endpoint Antivirus pour Windows | ||
ESET | NOD32 Antivirus | ESET NOD32 Antivirus | ||
ESET | Endpoint Security | ESET Endpoint Security pour Windows | ||
ESET | Smart Security Premium | ESET Smart Security Premium | ||
ESET | Mail Security | ESET Mail Security pour Microsoft Exchange Server | ||
ESET | Internet Security | ESET Internet Security | ||
ESET | Server Security | ESET Server Security pour Windows Server | ||
ESET | Mail Security | ESET Mail Security pour IBM Domino | ||
ESET | Security | ESET Security pour Microsoft SharePoint Server | ||
ESET | File Security | ESET File Security pour Microsoft Azure |
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "ESET Security Ultimate", "product": { "name": "Security Ultimate", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Endpoint Antivirus versions post\u00e9rieures \u00e0 10.0 pour Linux", "product": { "name": "Endpoint Antivirus", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Server Security versions post\u00e9rieures \u00e0 10.1 pour Linux", "product": { "name": "Server Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Endpoint Antivirus pour Windows", "product": { "name": "Endpoint Antivirus", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET NOD32 Antivirus", "product": { "name": "NOD32 Antivirus", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Endpoint Security pour Windows", "product": { "name": "Endpoint Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Smart Security Premium", "product": { "name": "Smart Security Premium", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Mail Security pour Microsoft Exchange Server", "product": { "name": "Mail Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Internet Security", "product": { "name": "Internet Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Server Security pour Windows Server", "product": { "name": "Server Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Mail Security pour IBM Domino", "product": { "name": "Mail Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Security pour Microsoft SharePoint Server", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET File Security pour Microsoft Azure", "product": { "name": "File Security", "vendor": { "name": "ESET", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-5594", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5594" } ], "initial_release_date": "2023-12-22T00:00:00", "last_revision_date": "2023-12-22T00:00:00", "links": [ { "title": "Bulletin de s\u00e9curit\u00e9 ESET\u00a0CA8562 du 20 d\u00e9cembre 2023", "url": "https://support.eset.com/en/ca8562-eset-customer-advisory-improper-following-of-a-certificates-chain-of-trust-in-eset-security-products-fixed" } ], "reference": "CERTFR-2023-AVI-1053", "revisions": [ { "description": "Version initiale", "revision_date": "2023-12-22T00:00:00.000000" } ], "risks": [ { "description": "Contournement de la politique de s\u00e9curit\u00e9" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan class=\"textit\"\u003eles\nproduits ESET\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la\npolitique de s\u00e9curit\u00e9.\n", "title": "Vuln\u00e9rabilit\u00e9 dans les produits ESET", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 ESET CA8562 du 20 d\u00e9cembre 2023", "url": null } ] }
CERTFR-2023-AVI-0764
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans les produits TrendMicro. Elle permet à un attaquant de provoquer une exécution de code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
ESET | Security | TrendMicro Worry-Free Business Security en mode SaaS (WFBSS) sans le correctif mensuel de maintenance du 31 juillet 2023 | ||
Trend Micro | Apex One | TrendMicro Apex One versions 2019 (On-prem) sans le correctif de sécurité SP1 Patch 1 (B12380) | ||
Trend Micro | Apex One | TrendMicro Apex One en mode SaaS sans le correctif mensuel de sécurité du mois de juillet 2023 (202307) | ||
ESET | Security | TrendMicro Worry-Free Business Security (WFBS) version 10.0 SP1 sans le correctif de sécurité SP1 Patch 2495 |
Title | Publication Time | Tags | |
---|---|---|---|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "TrendMicro Worry-Free Business Security en mode SaaS (WFBSS) sans le correctif mensuel de maintenance du 31 juillet 2023", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "TrendMicro Apex One versions 2019 (On-prem) sans le correctif de s\u00e9curit\u00e9 SP1 Patch 1 (B12380)", "product": { "name": "Apex One", "vendor": { "name": "Trend Micro", "scada": false } } }, { "description": "TrendMicro Apex One en mode SaaS sans le correctif mensuel de s\u00e9curit\u00e9 du mois de juillet 2023 (202307)", "product": { "name": "Apex One", "vendor": { "name": "Trend Micro", "scada": false } } }, { "description": "TrendMicro Worry-Free Business Security (WFBS) version 10.0 SP1 sans le correctif de s\u00e9curit\u00e9 SP1 Patch 2495", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-41179", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41179" } ], "initial_release_date": "2023-09-20T00:00:00", "last_revision_date": "2023-09-20T00:00:00", "links": [ { "title": "Bulletin de s\u00e9curit\u00e9 TrendMicro\u00a0000294994 du 19 septembre 2023", "url": "https://success.trendmicro.com/dcx/s/solution/000294994?language=en_US" } ], "reference": "CERTFR-2023-AVI-0764", "revisions": [ { "description": "Version initiale", "revision_date": "2023-09-20T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan class=\"textit\"\u003eles\nproduits TrendMicro\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire.\n", "title": "Vuln\u00e9rabilit\u00e9 dans les produits TrendMicro", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 TrendMicro 000294994 du 19 septembre 2023", "url": null } ] }
CERTFR-2023-AVI-0755
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits F-Secure. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Microsoft | Windows | WithSecure Endpoint Protection pour Windows sans le correctif de sécurité automatique 2023-09-11_07 | ||
ESET | Server Security | WithSecure Server Security versions 15 sans le correctif de sécurité automatique 2023-09-11_07 | ||
ESET | Security | WithSecure Client Security versions 15 sans le correctif de sécurité automatique 2023-09-11_07 | ||
WithSecure | N/A | WithSecure Endpoint Protection pour Mac sans le correctif de sécurité automatique 2023-09-11_07 | ||
N/A | N/A | Linux Protection versions 12.0 sans le correctif de sécurité automatique 2023-09-11_07 | ||
ESET | Security | Linux Security 64 versions 12.0 sans le correctif de sécurité automatique 2023-09-11_07 | ||
ESET | Server Security | WithSecure Email and Server Security versions 15 sans le correctif de sécurité automatique 2023-09-11_07 | ||
ESET | Security | WithSecure Client Security pour Mac versions 15 sans le correctif de sécurité automatique 2023-09-11_07 | ||
WithSecure | N/A | WithSecure Endpoint Protection pour Linux sans le correctif de sécurité automatique 2023-09-11_07 | ||
WithSecure | N/A | WithSecure Elements Endpoint Protection versions 17 sans le correctif de sécurité automatique 2023-09-11_07 | ||
WithSecure | N/A | WithSecure Atlant (anciennement F-Secure Atlant) versions 1.0.35-1 sans le correctif de sécurité automatique 2023-09-11_07 | ||
WithSecure | N/A | WithSecure Elements Endpoint Protection pour Mac 17 sans le correctif de sécurité automatique 2023-09-11_07 |
Title | Publication Time | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "WithSecure Endpoint Protection pour Windows sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "WithSecure Server Security versions 15 sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07", "product": { "name": "Server Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "WithSecure Client Security versions 15 sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "WithSecure Endpoint Protection pour Mac sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07", "product": { "name": "N/A", "vendor": { "name": "WithSecure", "scada": false } } }, { "description": "Linux Protection versions 12.0 sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "Linux Security 64 versions 12.0 sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "WithSecure Email and Server Security versions 15 sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07", "product": { "name": "Server Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "WithSecure Client Security pour Mac versions 15 sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "WithSecure Endpoint Protection pour Linux sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07", "product": { "name": "N/A", "vendor": { "name": "WithSecure", "scada": false } } }, { "description": "WithSecure Elements Endpoint Protection versions 17 sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07", "product": { "name": "N/A", "vendor": { "name": "WithSecure", "scada": false } } }, { "description": "WithSecure Atlant (anciennement F-Secure Atlant) versions 1.0.35-1 sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07", "product": { "name": "N/A", "vendor": { "name": "WithSecure", "scada": false } } }, { "description": "WithSecure Elements Endpoint Protection pour Mac 17 sans le correctif de s\u00e9curit\u00e9 automatique 2023-09-11_07", "product": { "name": "N/A", "vendor": { "name": "WithSecure", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-42523", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42523" }, { "name": "CVE-2023-42521", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42521" }, { "name": "CVE-2023-42524", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42524" }, { "name": "CVE-2023-42526", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42526" }, { "name": "CVE-2023-42522", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42522" } ], "initial_release_date": "2023-09-15T00:00:00", "last_revision_date": "2023-09-15T00:00:00", "links": [ { "title": "Bulletin de s\u00e9curit\u00e9 F-Secure\u00a0cve-2023-42521 du 14 septembre 2023", "url": "https://www.withsecure.com/en/support/security-advisories/cve-2023-42521" } ], "reference": "CERTFR-2023-AVI-0755", "revisions": [ { "description": "Version initiale", "revision_date": "2023-09-15T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits F-Secure\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits F-Secure", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 F-Secure cve-2023-42523 du 14 septembre 2023", "url": "https://www.withsecure.com/en/support/security-advisories/cve-2023-42523" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 F-Secure cve-2023-42521 du 14 septembre 2023", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 F-Secure cve-2023-42526 du 14 septembre 2023", "url": "https://www.withsecure.com/en/support/security-advisories/cve-2023-42526" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 F-Secure cve-2023-42522 du 14 septembre 2023", "url": "https://www.withsecure.com/en/support/security-advisories/cve-2023-42522" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 F-Secure cve-2023-42524 du 14 septembre 2023", "url": "https://www.withsecure.com/en/support/security-advisories/cve-2023-42524" } ] }
CERTFR-2023-AVI-0384
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans TrendMicro Mobile Security (entreprise). Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "TrendMicro Mobile Security (entreprise) version 9.8 SP5 sans le correctif de s\u00e9curit\u00e9 B3284", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-32523", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32523" }, { "name": "CVE-2023-32526", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32526" }, { "name": "CVE-2023-32527", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32527" }, { "name": "CVE-2023-32528", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32528" }, { "name": "CVE-2023-32521", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32521" }, { "name": "CVE-2023-32522", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32522" }, { "name": "CVE-2023-32524", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32524" }, { "name": "CVE-2023-32525", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32525" } ], "initial_release_date": "2023-05-15T00:00:00", "last_revision_date": "2023-05-15T00:00:00", "links": [], "reference": "CERTFR-2023-AVI-0384", "revisions": [ { "description": "Version initiale", "revision_date": "2023-05-15T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eTrendMicro Mobile Security (entreprise)\u003c/span\u003e. Elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9 et une atteinte\n\u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans TrendMicro Mobile Security (entreprise)", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 TrendMicro 000293106 du 12 mai 2023", "url": "https://success.trendmicro.com/dcx/s/solution/000293106?language=en_US" } ] }
CERTFR-2023-AVI-0217
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans TrendMicro Worry-Free Business Security. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité, une atteinte à l'intégrité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "WFBSS versions ant\u00e9rieures \u00e0 f\u00e9vrier 2023", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "WFBS version 10.0 SP1 sans le dernier correctif de s\u00e9curit\u00e9 2459", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-25146", "url": "https://www.cve.org/CVERecord?id=CVE-2023-25146" }, { "name": "CVE-2023-25144", "url": "https://www.cve.org/CVERecord?id=CVE-2023-25144" }, { "name": "CVE-2022-45797", "url": "https://www.cve.org/CVERecord?id=CVE-2022-45797" }, { "name": "CVE-2023-25148", "url": "https://www.cve.org/CVERecord?id=CVE-2023-25148" }, { "name": "CVE-2023-25145", "url": "https://www.cve.org/CVERecord?id=CVE-2023-25145" }, { "name": "CVE-2023-25147", "url": "https://www.cve.org/CVERecord?id=CVE-2023-25147" } ], "initial_release_date": "2023-03-14T00:00:00", "last_revision_date": "2023-03-14T00:00:00", "links": [], "reference": "CERTFR-2023-AVI-0217", "revisions": [ { "description": "Version initiale", "revision_date": "2023-03-14T00:00:00.000000" } ], "risks": [ { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans TrendMicro\nWorry-Free Business Security. Elles permettent \u00e0 un attaquant de\nprovoquer un contournement de la politique de s\u00e9curit\u00e9, une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de privil\u00e8ges.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans TrendMicro Worry-Free Business Security", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 TrendMicro 000292454 du 13 mars 2023", "url": "https://success.trendmicro.com/dcx/s/solution/000292454" } ] }
CERTFR-2023-AVI-0106
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans TrendMicro. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité, une élévation de privilèges et une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Trend Micro | Apex One | Apex One 2019 sans le correctif de sécurité SP1 b11564 | ||
ESET | Security | Worry-Free Business Security 10.0 SP1 sans le correctif de sécurité Patch 2454 | ||
N/A | N/A | Apex One as a Service sans le correctif de sécurité Build 202301 Security Agent version: 14.0.11960 | ||
ESET | Security | Worry-Free Business Security Services sans le correctif de sécurité (6.7.3064 / 14.2.3044) |
Title | Publication Time | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Apex One 2019 sans le correctif de s\u00e9curit\u00e9 SP1 b11564", "product": { "name": "Apex One", "vendor": { "name": "Trend Micro", "scada": false } } }, { "description": "Worry-Free Business Security 10.0 SP1 sans le correctif de s\u00e9curit\u00e9 Patch 2454", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Apex One as a Service sans le correctif de s\u00e9curit\u00e9 Build 202301 Security Agent version: 14.0.11960", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "Worry-Free Business Security Services sans le correctif de s\u00e9curit\u00e9 (6.7.3064 / 14.2.3044)", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-25143", "url": "https://www.cve.org/CVERecord?id=CVE-2023-25143" }, { "name": "CVE-2022-44649", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44649" }, { "name": "CVE-2023-25146", "url": "https://www.cve.org/CVERecord?id=CVE-2023-25146" }, { "name": "CVE-2023-25144", "url": "https://www.cve.org/CVERecord?id=CVE-2023-25144" }, { "name": "CVE-2023-0587", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0587" }, { "name": "CVE-2022-44650", "url": "https://www.cve.org/CVERecord?id=CVE-2022-44650" }, { "name": "CVE-2022-45798", "url": "https://www.cve.org/CVERecord?id=CVE-2022-45798" }, { "name": "CVE-2023-25148", "url": "https://www.cve.org/CVERecord?id=CVE-2023-25148" }, { "name": "CVE-2023-25145", "url": "https://www.cve.org/CVERecord?id=CVE-2023-25145" }, { "name": "CVE-2023-25147", "url": "https://www.cve.org/CVERecord?id=CVE-2023-25147" } ], "initial_release_date": "2023-02-09T00:00:00", "last_revision_date": "2023-02-09T00:00:00", "links": [ { "title": "Bulletin de s\u00e9curit\u00e9 TrendMicro 000292209 du 09 f\u00e9vrier 2023", "url": "https://success.trendmicro.com/dcx/s/solution/000292209?language=en_US" } ], "reference": "CERTFR-2023-AVI-0106", "revisions": [ { "description": "Version initiale", "revision_date": "2023-02-09T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eTrendMicro\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer un contournement de la politique de s\u00e9curit\u00e9, une \u00e9l\u00e9vation de\nprivil\u00e8ges et une ex\u00e9cution de code arbitraire \u00e0 distance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits TrendMicro", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 TrendMicro 000292209 du 08 f\u00e9vrier 2023", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 TrendMicro 000292202 du 08 f\u00e9vrier 2023", "url": "https://success.trendmicro.com/dcx/s/solution/000292202?language=en_US" } ] }
CERTFR-2022-AVI-833
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans les produits F-Secure. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Contournement provisoire
NoneVendor | Product | Description | ||
---|---|---|---|---|
Microsoft | Windows | WithSecure Endpoint Protection pour Windows 32-bit sans le correctif de sécurité automatique Capricorn 2022-09-13_07 | ||
WithSecure | N/A | WithSecure Collaboration Protection sans le correctif de sécurité automatique Capricorn 2022-09-13_07 | ||
ESET | Security | F-Secure Linux Security 32 sans le correctif de sécurité automatique Capricorn 2022-09-13_07 | ||
N/A | N/A | F-Secure Internet Gatekeeper sans le correctif de sécurité automatique Capricorn 2022-09-13_07 | ||
WithSecure | N/A | WithSecure Cloud Protection for Salesforce sans le correctif de sécurité automatique Capricorn 2022-09-13_07 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "WithSecure Endpoint Protection pour Windows 32-bit sans le correctif de s\u00e9curit\u00e9 automatique Capricorn 2022-09-13_07", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "WithSecure Collaboration Protection sans le correctif de s\u00e9curit\u00e9 automatique Capricorn 2022-09-13_07", "product": { "name": "N/A", "vendor": { "name": "WithSecure", "scada": false } } }, { "description": "F-Secure Linux Security 32 sans le correctif de s\u00e9curit\u00e9 automatique Capricorn 2022-09-13_07", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "F-Secure Internet Gatekeeper sans le correctif de s\u00e9curit\u00e9 automatique Capricorn 2022-09-13_07", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "WithSecure Cloud Protection for Salesforce sans le correctif de s\u00e9curit\u00e9 automatique Capricorn 2022-09-13_07", "product": { "name": "N/A", "vendor": { "name": "WithSecure", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n\n## Contournement provisoire\n", "cves": [ { "name": "CVE-2022-28886", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28886" } ], "initial_release_date": "2022-09-20T00:00:00", "last_revision_date": "2022-09-20T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-833", "revisions": [ { "description": "Version initiale", "revision_date": "2022-09-20T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits F-Secure. Elle\npermet \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n", "title": "Vuln\u00e9rabilit\u00e9 dans les produits F-Secure", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 F-Secure cve-2022-28886 du 19 septembre 2022", "url": "https://www.withsecure.com/en/support/security-advisories/cve-2022-28886" } ] }
CERTFR-2022-AVI-764
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans F-Secure les produits F-Secure. Elles permettent à un attaquant de provoquer un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Microsoft | N/A | F-Secure Internet Gatekeeper | ||
N/A | N/A | F-Secure Atlant | ||
ESET | Security | F-Secure Linux Security 64 | ||
Microsoft | Windows | Produits WithSecure Endpoint Protection pour Windows et Mac | ||
WithSecure | N/A | WithSecure Collaboration Protection | ||
WithSecure | N/A | WithSecure Cloud Protection for Salesforce | ||
ESET | Security | F-Secure Linux Security (32-bit) |
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "F-Secure Internet Gatekeeper", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "F-Secure Atlant", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "F-Secure Linux Security 64", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Produits WithSecure Endpoint Protection pour Windows et Mac", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "WithSecure Collaboration Protection", "product": { "name": "N/A", "vendor": { "name": "WithSecure", "scada": false } } }, { "description": "WithSecure Cloud Protection for Salesforce", "product": { "name": "N/A", "vendor": { "name": "WithSecure", "scada": false } } }, { "description": "F-Secure Linux Security (32-bit)", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2022-28883", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28883" }, { "name": "CVE-2022-28882", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28882" } ], "initial_release_date": "2022-08-24T00:00:00", "last_revision_date": "2022-08-24T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-764", "revisions": [ { "description": "Version initiale", "revision_date": "2022-08-24T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans F-Secure les\nproduits F-Secure. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni\nde service.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits F-Secure", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 F-Secure cve-2022-28883 du 23 ao\u00fbt 2022", "url": "https://www.withsecure.com/en/support/security-advisories/cve-2022-28883" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 F-Secure cve-2022-28882 du 23 ao\u00fbt 2022", "url": "https://www.withsecure.com/en/support/security-advisories/cve-2022-28882" } ] }
CERTFR-2022-AVI-708
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans F-Secure. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
N/A | N/A | F-Secure Internet Gatekeeper | ||
N/A | N/A | F-Secure Atlant | ||
Microsoft | Windows | Les produits WithSecure endpoint protection pour Windows et Mac | ||
WithSecure | N/A | WithSecure Collaboration Protection | ||
WithSecure | N/A | WithSecure Cloud Protection for Salesforce | ||
ESET | Security | F-Secure Linux Security (64-bit) | ||
ESET | Security | F-Secure Linux Security (32-bit) |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "F-Secure Internet Gatekeeper", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "F-Secure Atlant", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "Les produits WithSecure endpoint protection pour Windows et Mac", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "WithSecure Collaboration Protection", "product": { "name": "N/A", "vendor": { "name": "WithSecure", "scada": false } } }, { "description": "WithSecure Cloud Protection for Salesforce", "product": { "name": "N/A", "vendor": { "name": "WithSecure", "scada": false } } }, { "description": "F-Secure Linux Security (64-bit)", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "F-Secure Linux Security (32-bit)", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2022-28880", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28880" } ], "initial_release_date": "2022-08-04T00:00:00", "last_revision_date": "2022-08-04T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-708", "revisions": [ { "description": "Version initiale", "revision_date": "2022-08-04T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans F-Secure. Elle permet \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n", "title": "Vuln\u00e9rabilit\u00e9 dans F-Secure", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 F-Secure cve-2022-28880 du 03 ao\u00fbt 2022", "url": "https://www.withsecure.com/en/support/security-advisories/cve-2022-28880" } ] }
CERTFR-2022-AVI-433
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans les produits F-Secure. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
ESET | N/A | F-Secure Cloud Protection for Salesforce sans le correctif de sécurité HydraLinux update 2022-04-12_01 | ||
N/A | N/A | F-Secure Internet Gatekeeper sans le correctif de sécurité HydraLinux update 2022-04-12_01 | ||
Microsoft | Windows | WithSecure Endpoint Protection sur Windows et Mac sans le correctif de sécurité HydraLinux update 2022-04-12_01 | ||
Microsoft | N/A | F-Secure Elements for Microsoft 365 sans le correctif de sécurité HydraLinux update 2022-04-12_01 | ||
N/A | N/A | F-Secure Atlant sans le correctif de sécurité HydraLinux update 2022-04-12_01 | ||
ESET | Security | F-Secure Linux Security (32-bit) sans le correctif de sécurité HydraLinux update 2022-04-12_01 | ||
ESET | Security | F-Secure Linux Security 64 sans le correctif de sécurité HydraLinux update 2022-04-12_01 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "F-Secure Cloud Protection for Salesforce sans le correctif de s\u00e9curit\u00e9 HydraLinux update 2022-04-12_01", "product": { "name": "N/A", "vendor": { "name": "ESET", "scada": false } } }, { "description": "F-Secure Internet Gatekeeper sans le correctif de s\u00e9curit\u00e9 HydraLinux update 2022-04-12_01", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "WithSecure Endpoint Protection sur Windows et Mac sans le correctif de s\u00e9curit\u00e9 HydraLinux update 2022-04-12_01", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "F-Secure Elements for Microsoft 365 sans le correctif de s\u00e9curit\u00e9 HydraLinux update 2022-04-12_01", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "F-Secure Atlant sans le correctif de s\u00e9curit\u00e9 HydraLinux update 2022-04-12_01", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "F-Secure Linux Security (32-bit) sans le correctif de s\u00e9curit\u00e9 HydraLinux update 2022-04-12_01", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "F-Secure Linux Security 64 sans le correctif de s\u00e9curit\u00e9 HydraLinux update 2022-04-12_01", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2022-28871", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28871" } ], "initial_release_date": "2022-05-10T00:00:00", "last_revision_date": "2022-05-10T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-433", "revisions": [ { "description": "Version initiale", "revision_date": "2022-05-10T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits F-Secure. Elle\npermet \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n", "title": "Vuln\u00e9rabilit\u00e9 dans les produits F-Secure", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 F-Secure du 25 avril 2022", "url": "https://www.withsecure.com/en/support/security-advisories/cve-2022-28871" } ] }
CERTFR-2022-AVI-128
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans les produits F-Secure. Elle permet à un attaquant de provoquer un déni de service.
Solution
Le correctif a été déployé automatiquement lors de la mise jour Capricorn update 2022-02-01_01, cf. le bulletin de sécurité de l'éditeur (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
N/A | N/A | F-Secure Internet Gatekeeper | ||
ESET | Security | F-Secure Security Cloud | ||
N/A | N/A | F-Secure Atlant | ||
ESET | Security | F-Secure Linux Security 64 | ||
Microsoft | Windows | F-Secure All F-Secure Endpoint Protection products on Windows and Mac | ||
ESET | Security | F-Secure Linux Security (32-bit) |
Title | Publication Time | Tags | |
---|---|---|---|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "F-Secure Internet Gatekeeper", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "F-Secure Security Cloud", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "F-Secure Atlant", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "F-Secure Linux Security 64", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "F-Secure All F-Secure Endpoint Protection products on Windows and Mac", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "F-Secure Linux Security (32-bit)", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nLe correctif a \u00e9t\u00e9 d\u00e9ploy\u00e9 automatiquement lors de la mise jour\n*Capricorn update 2022-02-01_01,* cf. le bulletin de s\u00e9curit\u00e9 de\nl\u0027\u00e9diteur (cf. section Documentation).\n", "cves": [ { "name": "CVE-2021-40837", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40837" } ], "initial_release_date": "2022-02-09T00:00:00", "last_revision_date": "2022-02-09T00:00:00", "links": [ { "title": "Bulletin de s\u00e9curit\u00e9 F-Secure cve-2021-40837 du 9 f\u00e9vrier 2022", "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40837" } ], "reference": "CERTFR-2022-AVI-128", "revisions": [ { "description": "Version initiale", "revision_date": "2022-02-09T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits F-Secure. Elle\npermet \u00e0 un attaquant de provoquer un d\u00e9ni de service.\n", "title": "Vuln\u00e9rabilit\u00e9 dans les produits F-Secure", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 F-Secure cve-2021-40837 du 09 f\u00e9vrier 2022", "url": null } ] }
CERTFR-2022-AVI-095
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans les produits ESET. Elle permet à un attaquant de provoquer une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctif (cf. section Documentation).
Contournement provisoire
L'éditeur propose une mesure de contournement si l'installation des correctifs n'est pas envisageable (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
ESET | Security | ESET Security for Microsoft SharePoint Server versions antérieures à 8.0.15006.0 (mise à jour du 16 décembre 2021) | ||
ESET | Security | ESET Security for Microsoft SharePoint Server versions antérieures à 7.3.15002.0 (mise à jour du 12 janvier 2022) | ||
ESET | Mail Security | ESET Mail Security for IBM Domino versions antérieures à 7.3.14003.0 (mise à jour du 26 janvier 2022) | ||
ESET | N/A | ESET Endpoint Antivirus for Windows et ESET Endpoint Security for Windows versions antérieures à 8.0.2028.3, 8.0.2028.4, 8.0.2039.3, 8.0.2039.4, 8.0.2044.3, 8.0.2044.4, 8.1.2031.3, 8.1.2031.4, 8.1.2037.9 et 8.1.2037.10 (mise à jour du 25 janvier 2022) | ||
ESET | N/A | ESET Endpoint Antivirus for Windows et ESET Endpoint Security for Windows versions antérieures à 7.3.2055.0 et 7.3.2055.1 (mise à jour du 31 janvier 2022) | ||
ESET | File Security | ESET File Security for Microsoft Windows Server versions antérieures à 7.3.12008.0 (mise à jour du 12 janvier 2022) | ||
ESET | N/A | ESET NOD32 Antivirus, ESET Internet Security, ESET Smart Security et ESET Smart Security versiosn antérieures à 15.0.19.0 (mise à jour du 8 décembre 2021) | ||
ESET | Server Security | ESET Server Security for Microsoft Windows Server versions antérieures à 8.0.12010.0 (mise à jour du 16 décembre 2021) | ||
ESET | Mail Security | ESET Mail Security for IBM Domino versions antérieures à 8.0.14006.0 (mise à jour du 16 décembre 2021) | ||
ESET | Mail Security | ESET Mail Security for Microsoft Exchange Server versions antérieures à 7.3.10014.0 (mise à jour du 26 janvier 2022) | ||
ESET | N/A | ESET Endpoint Antivirus for Windows et ESET Endpoint Security for Windows versions antérieures à 9.0.2032.6 et 9.0.2032.7 (mise à jour du 16 décembre 2021) | ||
ESET | Mail Security | ESET Mail Security for Microsoft Exchange Server versions antérieures à 8.0.10018.0 (mise à jour du 16 décembre 2021) |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "ESET Security for Microsoft SharePoint Server versions ant\u00e9rieures \u00e0 8.0.15006.0 (mise \u00e0 jour du 16 d\u00e9cembre 2021)", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Security for Microsoft SharePoint Server versions ant\u00e9rieures \u00e0 7.3.15002.0 (mise \u00e0 jour du 12 janvier 2022)", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Mail Security for IBM Domino versions ant\u00e9rieures \u00e0 7.3.14003.0 (mise \u00e0 jour du 26 janvier 2022)", "product": { "name": "Mail Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Endpoint Antivirus for Windows et ESET Endpoint Security for Windows versions ant\u00e9rieures \u00e0 8.0.2028.3, 8.0.2028.4, 8.0.2039.3, 8.0.2039.4, 8.0.2044.3, 8.0.2044.4, 8.1.2031.3, 8.1.2031.4, 8.1.2037.9 et 8.1.2037.10 (mise \u00e0 jour du 25 janvier 2022)", "product": { "name": "N/A", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Endpoint Antivirus for Windows et ESET Endpoint Security for Windows versions ant\u00e9rieures \u00e0 7.3.2055.0 et 7.3.2055.1 (mise \u00e0 jour du 31 janvier 2022)", "product": { "name": "N/A", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET File Security for Microsoft Windows Server versions ant\u00e9rieures \u00e0 7.3.12008.0 (mise \u00e0 jour du 12 janvier 2022)", "product": { "name": "File Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET NOD32 Antivirus, ESET Internet Security, ESET Smart Security et ESET Smart Security versiosn ant\u00e9rieures \u00e0 15.0.19.0 (mise \u00e0 jour du 8 d\u00e9cembre 2021)", "product": { "name": "N/A", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Server Security for Microsoft Windows Server versions ant\u00e9rieures \u00e0 8.0.12010.0 (mise \u00e0 jour du 16 d\u00e9cembre 2021)", "product": { "name": "Server Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Mail Security for IBM Domino versions ant\u00e9rieures \u00e0 8.0.14006.0 (mise \u00e0 jour du 16 d\u00e9cembre 2021)", "product": { "name": "Mail Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Mail Security for Microsoft Exchange Server versions ant\u00e9rieures \u00e0 7.3.10014.0 (mise \u00e0 jour du 26 janvier 2022)", "product": { "name": "Mail Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Endpoint Antivirus for Windows et ESET Endpoint Security for Windows versions ant\u00e9rieures \u00e0 9.0.2032.6 et 9.0.2032.7 (mise \u00e0 jour du 16 d\u00e9cembre 2021)", "product": { "name": "N/A", "vendor": { "name": "ESET", "scada": false } } }, { "description": "ESET Mail Security for Microsoft Exchange Server versions ant\u00e9rieures \u00e0 8.0.10018.0 (mise \u00e0 jour du 16 d\u00e9cembre 2021)", "product": { "name": "Mail Security", "vendor": { "name": "ESET", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectif (cf. section Documentation).\n\n## Contournement provisoire\n\nL\u0027\u00e9diteur propose une mesure de contournement si l\u0027installation des\ncorrectifs n\u0027est pas envisageable (cf. section Documentation).\n", "cves": [ { "name": "CVE-2021-37852", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37852" } ], "initial_release_date": "2022-01-31T00:00:00", "last_revision_date": "2022-01-31T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-095", "revisions": [ { "description": "Version initiale", "revision_date": "2022-01-31T00:00:00.000000" } ], "risks": [ { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits ESET. Elle permet \u00e0\nun attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.\n", "title": "Vuln\u00e9rabilit\u00e9 dans les produits ESET", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 ESET du 31 janvier 2022", "url": "https://support.eset.com/en/ca8223-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows" } ] }
CERTFR-2021-AVI-980
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans les produits F-Secure. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Tous les produits F-Secure Endpoint Protection sur Windows et Mac", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "F-Secure Internet Gatekeeper", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "F-Secure Atlant", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "F-Secure Linux Security 64", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "F-Secure Linux Security (32-bit)", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2021-40836", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40836" } ], "initial_release_date": "2021-12-22T00:00:00", "last_revision_date": "2021-12-22T00:00:00", "links": [], "reference": "CERTFR-2021-AVI-980", "revisions": [ { "description": "Version initiale", "revision_date": "2021-12-22T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits F-Secure. Elle\npermet \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n", "title": "Vuln\u00e9rabilit\u00e9 dans les produits F-Secure", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 F-Secure cve-2021-40836 du 22 d\u00e9cembre 2021", "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40836" } ] }
CERTFR-2021-AVI-905
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans F-Secure. Elle permet à un attaquant de provoquer un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "F-Secure Internet Gatekeeper", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "F-Secure Atlant", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "F-Secure Linux Security 64", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "F-Secure F-Secure Endpoint Protection sur Windows et Mac", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "F-Secure Linux Security (32-bit)", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2021-40833", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40833" } ], "initial_release_date": "2021-11-26T00:00:00", "last_revision_date": "2021-11-26T00:00:00", "links": [], "reference": "CERTFR-2021-AVI-905", "revisions": [ { "description": "Version initiale", "revision_date": "2021-11-26T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans F-Secure. Elle permet \u00e0 un\nattaquant de provoquer un d\u00e9ni de service.\n", "title": "Vuln\u00e9rabilit\u00e9 dans F-Secure", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 F-Secure du 26 novembre 2021", "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40833" } ] }
CERTFR-2021-AVI-790
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits TrendMicro. Elles permettent à un attaquant de provoquer un déni de service et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Trend Micro | Apex One | Apex One SaaS sans la mise à jour mensuelle de septembre 2021 | ||
ESET | Security | Worry-Free Business Security (WFBS) version 10.0SP1 sans le correctif 2342 | ||
Trend Micro | Apex One | Apex One 2019 (On-prem) versions antérieures à CP 9645 | ||
ESET | Security | Worry-Free Business Security Services (WFBSS) versions antérieures à 6.7.1648 ou 14.2.1349 |
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Apex One SaaS sans la mise \u00e0 jour mensuelle de septembre 2021", "product": { "name": "Apex One", "vendor": { "name": "Trend Micro", "scada": false } } }, { "description": "Worry-Free Business Security (WFBS) version 10.0SP1 sans le correctif 2342", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Apex One 2019 (On-prem) versions ant\u00e9rieures \u00e0 CP 9645", "product": { "name": "Apex One", "vendor": { "name": "Trend Micro", "scada": false } } }, { "description": "Worry-Free Business Security Services (WFBSS) versions ant\u00e9rieures \u00e0 6.7.1648 ou 14.2.1349", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2021-42012", "url": "https://www.cve.org/CVERecord?id=CVE-2021-42012" }, { "name": "CVE-2021-23139", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23139" }, { "name": "CVE-2021-42011", "url": "https://www.cve.org/CVERecord?id=CVE-2021-42011" }, { "name": "CVE-2021-42108", "url": "https://www.cve.org/CVERecord?id=CVE-2021-42108" }, { "name": "CVE-2021-42104", "url": "https://www.cve.org/CVERecord?id=CVE-2021-42104" }, { "name": "CVE-2021-42101", "url": "https://www.cve.org/CVERecord?id=CVE-2021-42101" }, { "name": "CVE-2021-42103", "url": "https://www.cve.org/CVERecord?id=CVE-2021-42103" } ], "initial_release_date": "2021-10-15T00:00:00", "last_revision_date": "2021-10-15T00:00:00", "links": [], "reference": "CERTFR-2021-AVI-790", "revisions": [ { "description": "Version initiale", "revision_date": "2021-10-15T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nTrendMicro. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de\nservice et une \u00e9l\u00e9vation de privil\u00e8ges.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits TrendMicro", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 TrendMicro 000289229 du 14 octobre 2021", "url": "https://success.trendmicro.com/solution/000289229" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 TrendMicro 000289230 du 14 octobre 2021", "url": "https://success.trendmicro.com/solution/000289230" } ] }
CERTFR-2021-AVI-675
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans les produits F-Secure. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
ESET | N/A | F-Secure Cloud Protection for Salesforce sans le correctif Capricorn 2021-08-25_04 | ||
Microsoft | Windows | Tous les équipements de F-Secure sur Windows et Mac sans le correctif Capricorn 2021-08-25_04 | ||
ESET | N/A | F-Secure Atlant sans le correctif Capricorn 2021-08-25_04 | ||
ESET | Security | F-Secure Linux Security sans le correctif Capricorn 2021-08-25_04 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "F-Secure Cloud Protection for Salesforce sans le correctif Capricorn 2021-08-25_04", "product": { "name": "N/A", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Tous les \u00e9quipements de F-Secure sur Windows et Mac sans le correctif Capricorn 2021-08-25_04", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "F-Secure Atlant sans le correctif Capricorn 2021-08-25_04", "product": { "name": "N/A", "vendor": { "name": "ESET", "scada": false } } }, { "description": "F-Secure Linux Security sans le correctif Capricorn 2021-08-25_04", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2021-33599", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33599" } ], "initial_release_date": "2021-09-03T00:00:00", "last_revision_date": "2021-09-03T00:00:00", "links": [], "reference": "CERTFR-2021-AVI-675", "revisions": [ { "description": "Version initiale", "revision_date": "2021-09-03T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits F-Secure. Elle\npermet \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n", "title": "Vuln\u00e9rabilit\u00e9 dans les produits F-Secure", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 F-Secure cve-2021-33599 du 3 septembre 2021", "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-33599" } ] }
CERTFR-2021-AVI-650
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans les produits F-Secure. Elle permet à un attaquant de provoquer un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "F-Secure Linux Security sans le dernier correctif du 2021-08-10_07", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "F-Secure endpoint protection sur Windows et Mac sans le dernier correctif du 2021-08-10_07", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2021-33598", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33598" } ], "initial_release_date": "2021-08-23T00:00:00", "last_revision_date": "2021-08-23T00:00:00", "links": [], "reference": "CERTFR-2021-AVI-650", "revisions": [ { "description": "Version initiale", "revision_date": "2021-08-23T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits F-Secure. Elle\npermet \u00e0 un attaquant de provoquer un d\u00e9ni de service.\n", "title": "Vuln\u00e9rabilit\u00e9 dans les produits F-Secure", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 F-Secure fsc-2021-33598 du 23 ao\u00fbt 2021", "url": "https://www.f-secure.com/en/business/support-and-downloads/security-advisories/fsc-2021-33598" } ] }
CERTFR-2021-AVI-513
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans les produits TrendMicro. Elle permet à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
ESET | Security | Worry-Free Business Security version 10.0 SP1 sans le correctif 2329 | ||
Trend Micro | Apex One | Apex One version 2019 (on-premise) sans le correctif 5 b9565 |
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Worry-Free Business Security version 10.0 SP1 sans le correctif 2329", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Apex One version 2019 (on-premise) sans le correctif 5 b9565", "product": { "name": "Apex One", "vendor": { "name": "Trend Micro", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2021-32463", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32463" } ], "initial_release_date": "2021-07-12T00:00:00", "last_revision_date": "2021-07-12T00:00:00", "links": [], "reference": "CERTFR-2021-AVI-513", "revisions": [ { "description": "Version initiale", "revision_date": "2021-07-12T00:00:00.000000" } ], "risks": [ { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "D\u00e9ni de service" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits TrendMicro. Elle\npermet \u00e0 un attaquant de provoquer un d\u00e9ni de service, une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de privil\u00e8ges.\n", "title": "Vuln\u00e9rabilit\u00e9 dans les produits TrendMicro", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 TrendMicro 000286856 du 09 juillet 2021", "url": "https://success.trendmicro.com/solution/000286856" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 TrendMicro 000286855 du 09 juillet 2021", "url": "https://success.trendmicro.com/solution/000286855" } ] }
CERTFR-2018-AVI-269
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans les produits F-Secure. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
ESET | N/A | F-Secure Computer Protection Premium | ||
ESET | Server Security | F-Secure PSB Server Security | ||
ESET | Server Security | F-Secure Server Security Premium | ||
ESET | Server Security | F-Secure PSB Email et Server Security | ||
ESET | Server Security | F-Secure Email et Server Security | ||
ESET | Security | F-Secure PSB Workstation Security | ||
ESET | Server Security | F-Secure Server Security | ||
ESET | Security | F-Secure Client Security Premium | ||
ESET | Security | F-Secure Client Security | ||
Microsoft | Windows | F-Secure SAFE pour Windows | ||
ESET | N/A | F-Secure Computer Protection | ||
ESET | Server Security | F-Secure Email et Server Security Premium |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "F-Secure Computer Protection Premium", "product": { "name": "N/A", "vendor": { "name": "ESET", "scada": false } } }, { "description": "F-Secure PSB Server Security", "product": { "name": "Server Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "F-Secure Server Security Premium", "product": { "name": "Server Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "F-Secure PSB Email et Server Security", "product": { "name": "Server Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "F-Secure Email et Server Security", "product": { "name": "Server Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "F-Secure PSB Workstation Security", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "F-Secure Server Security", "product": { "name": "Server Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "F-Secure Client Security Premium", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "F-Secure Client Security", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "F-Secure SAFE pour Windows", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "F-Secure Computer Protection", "product": { "name": "N/A", "vendor": { "name": "ESET", "scada": false } } }, { "description": "F-Secure Email et Server Security Premium", "product": { "name": "Server Security", "vendor": { "name": "ESET", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [], "initial_release_date": "2018-06-06T00:00:00", "last_revision_date": "2018-06-06T00:00:00", "links": [], "reference": "CERTFR-2018-AVI-269", "revisions": [ { "description": "Version initiale", "revision_date": "2018-06-06T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits F-Secure. Elle\npermet \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0\ndistance.\n", "title": "Vuln\u00e9rabilit\u00e9 dans les produits F-Secure", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 F-Secure FSC-2018-2 du 1 juin 2018", "url": "https://www.f-secure.com/en/web/labs_global/fsc-2018-2" } ] }
CERTFR-2018-AVI-026
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Juniper Networks | Junos OS | Junos OS versions 15.1X53 antérieures à 15.1X53-D232 sur QFX5200/5110 | ||
Juniper Networks | Junos OS | Junos OS versions 17.1 antérieures à 17.1R2-S5, 17.1R3 et 17.1R3 sur MX series | ||
Juniper Networks | Junos OS | Junos OS versions 15.1 antérieures à 15.1F2-S17, 15.1F5-S8, 15.1F6-S8, 15.1R5-S7, 15.1R7 | ||
Juniper Networks | Junos OS | Junos OS versions 16.1 antérieures à 16.1R6 sur MX series | ||
Juniper Networks | Junos OS | Junos OS versions 15.1X53 antérieures à 15.1X53-D70, 15.1X53-D231 | ||
Juniper Networks | Junos OS | Junos OS versions 14.1 antérieures à 14.1R9 sur MX series | ||
Juniper Networks | Junos OS | Junos OS versions 16.2 antérieures à 16.2R2, 16.2R2-S2, 16.2R3 | ||
Juniper Networks | Junos OS | Junos OS versions 14.2 antérieures à 14.2R8 | ||
N/A | N/A | CTPView versions 7.1, 7.2 et 7.3. | ||
Juniper Networks | Junos OS | Junos OS versions 15.1 antérieures à 15.1F5-S8, 15.1F6-S8, 15.1R5-S6, 15.1R6-S3, 15.1R7, 15.1F6, 15.1R3 | ||
Juniper Networks | Junos OS | Junos OS versions 15.1 antérieures à 15.1R6-S2, 15.1R7 | ||
Juniper Networks | Junos OS | Junos OS versions 16.1 antérieures à 16.1R5-S1, 16.1R6 | ||
Juniper Networks | Junos Space | Junos Space antérieures à 17.2R1 | ||
Juniper Networks | Junos OS | Junos OS versions 15.1 antérieures à 15.1R5-S8, 15.1F6-S9, 15.1R6-S4, 15.1R7 sur MX series | ||
Juniper Networks | Junos OS | Junos OS versions 16.2 antérieures à 16.2R3 sur MX series | ||
Juniper Networks | Junos OS | Junos OS versions 15.1X49 versions 15.1X49-D100 et supérieures mais antérieures à 15.1X49-D121 | ||
Juniper Networks | Junos OS | Junos OS versions 14.1X53 antérieures à 14.1X53-D40 sur QFX, EX | ||
Juniper Networks | Junos OS | Junos OS versions 14.2 antérieures à 14.2R8 sur MX series | ||
Juniper Networks | Junos OS | Junos OS versions 12.1X46 antérieures à 12.1X46-D71 | ||
Juniper Networks | Junos OS | Junos OS versions 15.1X49 antérieures à 15.1X49-D110 sur SRX | ||
N/A | N/A | ScreenOS toutes versions sans le dernier correctif de sécurité | ||
Juniper Networks | Junos OS | Junos OS versions 16.1X65 antérieures à 16.1X65-D45 | ||
Juniper Networks | Junos OS | Junos OS versions 14.1 antérieures à 14.1R8-S5, 14.1R9 | ||
Juniper Networks | Junos OS | Junos OS versions 12.3X48 antérieures à 12.3X48-D55 sur SRX | ||
Juniper Networks | Junos OS | Junos OS versions 15.1R5-S4, 15.1R5-S5 et 15.1R6 | ||
Juniper Networks | Junos OS | Junos OS versions 12.1X46 antérieures à 12.1X46-D71 sur SRX | ||
Juniper Networks | Junos OS | Junos OS versions 12.3 antérieures à 12.3R12-S7 | ||
Juniper Networks | Junos OS | Junos OS versions 14.1X53 antérieures à 14.1X53-D46, 14.1X53-D50 et 14.1X53-D107 | ||
Juniper Networks | Junos OS | Junos OS versions 12.3R antérieures à 12.3R12-S7 | ||
Juniper Networks | Junos OS | Junos OS versions 12.3X48 antérieures à 12.3X48-D55 | ||
Juniper Networks | Junos OS | Junos OS versions 12.3R12 antérieures à 12.3R12-S7 | ||
Juniper Networks | Junos OS | Junos OS versions 12.3X48 versions 12.3X48-D55 et supérieures mais antérieures à 12.3X48-D65 | ||
Juniper Networks | Junos OS | Junos OS versions 17.2X75 antérieures à 17.2X75-D50 | ||
Juniper Networks | Junos OS | Junos OS versions 15.1X53 antérieures à 15.1X53-D49, 15.1X53-D470 sur NFX | ||
Juniper Networks | Junos OS | Junos OS versions 15.1X53 antérieures à 15.1X53-D65 sur QFX10K | ||
Juniper Networks | Junos OS | Junos OS versions 16.1 antérieures à 16.1R3-S6, 16.1R4-S6 et 16.1R5 | ||
ESET | Security | Security Director et Log Collector antérieures à 17.2R1 | ||
Juniper Networks | Junos OS | Junos OS versions 14.2 antérieures à 14.2R7-S9, 14.2R8 |
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Junos OS versions 15.1X53 ant\u00e9rieures \u00e0 15.1X53-D232 sur QFX5200/5110", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS versions 17.1 ant\u00e9rieures \u00e0 17.1R2-S5, 17.1R3 et 17.1R3 sur MX series", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS versions 15.1 ant\u00e9rieures \u00e0 15.1F2-S17, 15.1F5-S8, 15.1F6-S8, 15.1R5-S7, 15.1R7", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS versions 16.1 ant\u00e9rieures \u00e0 16.1R6 sur MX series", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS versions 15.1X53 ant\u00e9rieures \u00e0 15.1X53-D70, 15.1X53-D231", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS versions 14.1 ant\u00e9rieures \u00e0 14.1R9 sur MX series", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS versions 16.2 ant\u00e9rieures \u00e0 16.2R2, 16.2R2-S2, 16.2R3", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS versions 14.2 ant\u00e9rieures \u00e0 14.2R8", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "CTPView versions 7.1, 7.2 et 7.3.", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "Junos OS versions 15.1 ant\u00e9rieures \u00e0 15.1F5-S8, 15.1F6-S8, 15.1R5-S6, 15.1R6-S3, 15.1R7, 15.1F6, 15.1R3", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS versions 15.1 ant\u00e9rieures \u00e0 15.1R6-S2, 15.1R7", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS versions 16.1 ant\u00e9rieures \u00e0 16.1R5-S1, 16.1R6", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos Space ant\u00e9rieures \u00e0 17.2R1", "product": { "name": "Junos Space", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS versions 15.1 ant\u00e9rieures \u00e0 15.1R5-S8, 15.1F6-S9, 15.1R6-S4, 15.1R7 sur MX series", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS versions 16.2 ant\u00e9rieures \u00e0 16.2R3 sur MX series", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS versions 15.1X49 versions 15.1X49-D100 et sup\u00e9rieures mais ant\u00e9rieures \u00e0 15.1X49-D121", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS versions 14.1X53 ant\u00e9rieures \u00e0 14.1X53-D40 sur QFX, EX", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS versions 14.2 ant\u00e9rieures \u00e0 14.2R8 sur MX series", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS versions 12.1X46 ant\u00e9rieures \u00e0 12.1X46-D71", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS versions 15.1X49 ant\u00e9rieures \u00e0 15.1X49-D110 sur SRX", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "ScreenOS toutes versions sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "Junos OS versions 16.1X65 ant\u00e9rieures \u00e0 16.1X65-D45", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS versions 14.1 ant\u00e9rieures \u00e0 14.1R8-S5, 14.1R9", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS versions 12.3X48 ant\u00e9rieures \u00e0 12.3X48-D55 sur SRX", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS versions 15.1R5-S4, 15.1R5-S5 et 15.1R6", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS versions 12.1X46 ant\u00e9rieures \u00e0 12.1X46-D71 sur SRX", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS versions 12.3 ant\u00e9rieures \u00e0 12.3R12-S7", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS versions 14.1X53 ant\u00e9rieures \u00e0 14.1X53-D46, 14.1X53-D50 et 14.1X53-D107", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS versions 12.3R ant\u00e9rieures \u00e0 12.3R12-S7", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS versions 12.3X48 ant\u00e9rieures \u00e0 12.3X48-D55", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS versions 12.3R12 ant\u00e9rieures \u00e0 12.3R12-S7", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS versions 12.3X48 versions 12.3X48-D55 et sup\u00e9rieures mais ant\u00e9rieures \u00e0 12.3X48-D65", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS versions 17.2X75 ant\u00e9rieures \u00e0 17.2X75-D50", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS versions 15.1X53 ant\u00e9rieures \u00e0 15.1X53-D49, 15.1X53-D470 sur NFX", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS versions 15.1X53 ant\u00e9rieures \u00e0 15.1X53-D65 sur QFX10K", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS versions 16.1 ant\u00e9rieures \u00e0 16.1R3-S6, 16.1R4-S6 et 16.1R5", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Security Director et Log Collector ant\u00e9rieures \u00e0 17.2R1", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Junos OS versions 14.2 ant\u00e9rieures \u00e0 14.2R7-S9, 14.2R8", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2017-3169", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3169" }, { "name": "CVE-2017-14106", "url": "https://www.cve.org/CVERecord?id=CVE-2017-14106" }, { "name": "CVE-2018-0002", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0002" }, { "name": "CVE-2015-5600", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5600" }, { "name": "CVE-2018-0008", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0008" }, { "name": "CVE-2015-6563", "url": "https://www.cve.org/CVERecord?id=CVE-2015-6563" }, { "name": "CVE-2018-0013", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0013" }, { "name": "CVE-2015-6564", "url": "https://www.cve.org/CVERecord?id=CVE-2015-6564" }, { "name": "CVE-2015-7236", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7236" }, { "name": "CVE-2017-7668", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7668" }, { "name": "CVE-2017-9798", "url": "https://www.cve.org/CVERecord?id=CVE-2017-9798" }, { "name": "CVE-2018-0011", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0011" }, { "name": "CVE-2016-2141", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2141" }, { "name": "CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "name": "CVE-2015-5304", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5304" }, { "name": "CVE-2018-0012", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0012" }, { "name": "CVE-2018-0003", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0003" }, { "name": "CVE-2017-9788", "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788" }, { "name": "CVE-2015-5174", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5174" }, { "name": "CVE-2017-1000112", "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000112" }, { "name": "CVE-2016-8858", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8858" }, { "name": "CVE-2017-5664", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5664" }, { "name": "CVE-2017-1000111", "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000111" }, { "name": "CVE-2017-6074", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6074" }, { "name": "CVE-2017-5645", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5645" }, { "name": "CVE-2018-0010", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0010" }, { "name": "CVE-2018-0005", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0005" }, { "name": "CVE-2018-0007", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0007" }, { "name": "CVE-2016-8655", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8655" }, { "name": "CVE-2017-3167", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3167" }, { "name": "CVE-2015-5188", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5188" }, { "name": "CVE-2018-0009", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0009" }, { "name": "CVE-2017-7679", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7679" }, { "name": "CVE-2018-0004", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0004" }, { "name": "CVE-2018-0014", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0014" }, { "name": "CVE-2017-2634", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2634" }, { "name": "CVE-2016-8743", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8743" }, { "name": "CVE-2015-5220", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5220" }, { "name": "CVE-2018-0006", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0006" }, { "name": "CVE-2018-0001", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0001" } ], "initial_release_date": "2018-01-11T00:00:00", "last_revision_date": "2018-01-11T00:00:00", "links": [], "reference": "CERTFR-2018-AVI-026", "revisions": [ { "description": "Version initiale", "revision_date": "2018-01-11T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10838 du 10 janvier 2018", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10838\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10831 du 10 janvier 2018", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10831\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10835 du 10 janvier 2018", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10835\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10833 du 10 janvier 2018", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10833\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10837 du 10 janvier 2018", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10837\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10841 du 10 janvier 2018", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10841\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10828 du 10 janvier 2018", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10828\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10834 du 10 janvier 2018", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10834\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10829 du 10 janvier 2018", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10829\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10836 du 10 janvier 2018", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10836\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10839 du 10 janvier 2018", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10839\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10830 du 10 janvier 2018", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10830\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10832 du 10 janvier 2018", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10832\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10840 du 10 janvier 2018", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10840\u0026cat=SIRT_1\u0026actp=LIST" } ] }
CERTFR-2016-AVI-277
Vulnerability from certfr_avis
Une vulnérabilité a été corrigée dans Huawei Unified Security Gateway. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
ESET | Security | Huawei USG2100, version antérieure à V300R001C10SPC600 | ||
ESET | Security | Huawei USG5100, version antérieure à V300R001C10SPC600 | ||
ESET | Security | Huawei USG2200, version antérieure à V300R001C10SPC600 | ||
ESET | Security | Huawei USG5500, version antérieure à V300R001C10SPC600 |
Title | Publication Time | Tags | |
---|---|---|---|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Huawei USG2100, version ant\u00e9rieure \u00e0 V300R001C10SPC600", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Huawei USG5100, version ant\u00e9rieure \u00e0 V300R001C10SPC600", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Huawei USG2200, version ant\u00e9rieure \u00e0 V300R001C10SPC600", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Huawei USG5500, version ant\u00e9rieure \u00e0 V300R001C10SPC600", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [], "initial_release_date": "2016-08-11T00:00:00", "last_revision_date": "2016-08-11T00:00:00", "links": [ { "title": "Bulletin de s\u00e9curit\u00e9 Huawei huawei-sa-20160810-01-usg du 10 ao\u00fbt 2016", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160810-01-usg-en" } ], "reference": "CERTFR-2016-AVI-277", "revisions": [ { "description": "version initiale.", "revision_date": "2016-08-11T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 corrig\u00e9e dans \u003cspan class=\"textit\"\u003eHuawei\nUnified Security Gateway\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance.\n", "title": "Vuln\u00e9rabilit\u00e9 dans Huawei Unified Security Gateway", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Huawei huawei-sa-20160810-01-usg du 10 ao\u00fbt 2016", "url": null } ] }
CERTFR-2015-AVI-286
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une élévation de privilèges.
Contournement provisoire
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "SRX Network Security Daemon", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Junos OS avec J-Web activ\u00e9", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "Junos OS 12.1X46-D15 et versions ult\u00e9rieures", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "CTPView version 7.1R1", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } } ], "affected_systems_content": null, "content": "## Contournement provisoire\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2015-3007", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3007" }, { "name": "CVE-2015-5362", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5362" }, { "name": "CVE-2014-0226", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0226" }, { "name": "CVE-2015-3456", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3456" }, { "name": "CVE-2015-5358", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5358" }, { "name": "CVE-2014-6447", "url": "https://www.cve.org/CVERecord?id=CVE-2014-6447" }, { "name": "CVE-2015-5363", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5363" }, { "name": "CVE-2015-5357", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5357" }, { "name": "CVE-2015-5359", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5359" }, { "name": "CVE-2015-5360", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5360" } ], "initial_release_date": "2015-07-09T00:00:00", "last_revision_date": "2015-07-09T00:00:00", "links": [ { "title": "R\u00e9f\u00e9rence CVE CVE-2015-3456", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3456" }, { "title": "R\u00e9f\u00e9rence CVE CVE-2015-3007", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3007" }, { "title": "R\u00e9f\u00e9rence CVE CVE-2014-6447", "url": "https://www.cve.org/CVERecord?id=CVE-2014-6447" }, { "title": "Bulletin de s\u00e9curit\u00e9 Juniper du 09 juillet 2015", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10684\u0026cat=SIRT_1\u0026actp=LIST" }, { "title": "Bulletin de s\u00e9curit\u00e9 Juniper du 09 juillet 2015", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10692\u0026cat=SIRT_1\u0026actp=LIST" }, { "title": "R\u00e9f\u00e9rence CVE CVE-2015-5359", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5359" }, { "title": "Bulletin de s\u00e9curit\u00e9 Juniper du 09 juillet 2015", "url": "http://http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10682\u0026cat=SIRT_1\u0026actp=LIST" }, { "title": "Bulletin de s\u00e9curit\u00e9 Juniper du 09 juillet 2015", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10693\u0026cat=SIRT_1\u0026actp=LIST" }, { "title": "Bulletin de s\u00e9curit\u00e9 Juniper du 09 juillet 2015 http://", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10682\u0026cat=SIRT_1\u0026actp=LIST" }, { "title": "Bulletin de s\u00e9curit\u00e9 Juniper du 09 juillet 2015", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10688\u0026cat=SIRT_1\u0026actp=LIST" }, { "title": "R\u00e9f\u00e9rence CVE CVE-2015-5360", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5360" }, { "title": "R\u00e9f\u00e9rence CVE CVE-2015-5363", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5363" }, { "title": "R\u00e9f\u00e9rence CVE CVE-2015-5358", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5358" }, { "title": "Bulletin de s\u00e9curit\u00e9 Juniper du 09 juillet 2015", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10690\u0026cat=SIRT_1\u0026actp=LIST" }, { "title": "R\u00e9f\u00e9rence CVE CVE-2015-5362", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5362" }, { "title": "Bulletin de s\u00e9curit\u00e9 Juniper du 09 juillet 2015", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10691\u0026cat=SIRT_1\u0026actp=LIST" }, { "title": "R\u00e9f\u00e9rence CVE CVE-2014-0226", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0226" }, { "title": "Bulletin de s\u00e9curit\u00e9 Juniper du 09 juillet 2015", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10687\u0026cat=SIRT_1\u0026actp=LIST" }, { "title": "R\u00e9f\u00e9rence CVE CVE-2015-5357", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5357" }, { "title": "Bulletin de s\u00e9curit\u00e9 Juniper du 09 juillet 2015", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10686\u0026cat=SIRT_1\u0026actp=LIST" }, { "title": "Bulletin de s\u00e9curit\u00e9 Juniper du 09 juillet 2015", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10685\u0026cat=SIRT_1\u0026actp=LIST" } ], "reference": "CERTFR-2015-AVI-286", "revisions": [ { "description": "version initiale.", "revision_date": "2015-07-09T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Juniper\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper", "vendor_advisories": [] }
CERTFR-2014-AVI-480
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Juniper Networks | N/A | CTPOS versions antérieures à 6.6R2 | ||
ESET | Security | Juniper Security Threat Response Manager versions 2012.1, 2013.1, 2013.2 | ||
Juniper Networks | N/A | CTPView versions 4.2, 4.3, 4.4, 4.5, 4.6 | ||
Juniper Networks | Junos Space | Junos Space jusqu'à la version 13.3 | ||
Juniper Networks | Secure Analytics | Juniper Secure Analytics versions 2013.2, 2014.1, 2014.2 | ||
ESET | Security | Network and Security Manager (NSM) version 2012.2 |
Title | Publication Time | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "CTPOS versions ant\u00e9rieures \u00e0 6.6R2", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Security Threat Response Manager versions 2012.1, 2013.1, 2013.2", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "CTPView versions 4.2, 4.3, 4.4, 4.5, 4.6", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos Space jusqu\u0027\u00e0 la version 13.3", "product": { "name": "Junos Space", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper Secure Analytics versions 2013.2, 2014.1, 2014.2", "product": { "name": "Secure Analytics", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Network and Security Manager (NSM) version 2012.2", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2012-3158", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3158" }, { "name": "CVE-2010-3853", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3853" }, { "name": "CVE-2014-0075", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0075" }, { "name": "CVE-2010-3081", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3081" }, { "name": "CVE-2012-0789", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0789" }, { "name": "CVE-2012-2329", "url": "https://www.cve.org/CVERecord?id=CVE-2012-2329" }, { "name": "CVE-2014-0460", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0460" }, { "name": "CVE-2011-4609", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4609" }, { "name": "CVE-2011-0421", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0421" }, { "name": "CVE-2012-0781", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0781" }, { "name": "CVE-2014-4827", "url": "https://www.cve.org/CVERecord?id=CVE-2014-4827" }, { "name": "CVE-2013-1635", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1635" }, { "name": "CVE-2011-0216", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0216" }, { "name": "CVE-2013-1620", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1620" }, { "name": "CVE-2014-0119", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0119" }, { "name": "CVE-2012-2110", "url": "https://www.cve.org/CVERecord?id=CVE-2012-2110" }, { "name": "CVE-2014-7186", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7186" }, { "name": "CVE-2009-2416", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2416" }, { "name": "CVE-2012-0788", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0788" }, { "name": "CVE-2010-4755", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4755" }, { "name": "CVE-2013-1775", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1775" }, { "name": "CVE-2009-5029", "url": "https://www.cve.org/CVERecord?id=CVE-2009-5029" }, { "name": "CVE-2011-1153", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1153" }, { "name": "CVE-2009-3563", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3563" }, { "name": "CVE-2014-0411", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0411" }, { "name": "CVE-2013-1643", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1643" }, { "name": "CVE-2013-0791", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0791" }, { "name": "CVE-2010-1646", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1646" }, { "name": "CVE-2014-7169", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7169" }, { "name": "CVE-2011-1944", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1944" }, { "name": "CVE-2014-0099", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0099" }, { "name": "CVE-2011-0010", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0010" }, { "name": "CVE-2011-1398", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1398" }, { "name": "CVE-2011-2834", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2834" }, { "name": "CVE-2014-4825", "url": "https://www.cve.org/CVERecord?id=CVE-2014-4825" }, { "name": "CVE-2010-4707", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4707" }, { "name": "CVE-2012-0882", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0882" }, { "name": "CVE-2009-0159", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0159" }, { "name": "CVE-2014-0453", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0453" }, { "name": "CVE-2011-0708", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0708" }, { "name": "CVE-2014-6271", "url": "https://www.cve.org/CVERecord?id=CVE-2014-6271" }, { "name": "CVE-2014-6277", "url": "https://www.cve.org/CVERecord?id=CVE-2014-6277" }, { "name": "CVE-2014-1568", "url": "https://www.cve.org/CVERecord?id=CVE-2014-1568" }, { "name": "CVE-2010-0830", "url": "https://www.cve.org/CVERecord?id=CVE-2010-0830" }, { "name": "CVE-2010-0426", "url": "https://www.cve.org/CVERecord?id=CVE-2010-0426" }, { "name": "CVE-2014-0423", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0423" }, { "name": "CVE-2012-2311", "url": "https://www.cve.org/CVERecord?id=CVE-2012-2311" }, { "name": "CVE-2014-0224", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0224" }, { "name": "CVE-2014-4830", "url": "https://www.cve.org/CVERecord?id=CVE-2014-4830" }, { "name": "CVE-2011-3368", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3368" }, { "name": "CVE-2014-2532", "url": "https://www.cve.org/CVERecord?id=CVE-2014-2532" }, { "name": "CVE-2014-4828", "url": "https://www.cve.org/CVERecord?id=CVE-2014-4828" }, { "name": "CVE-2014-0095", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0095" }, { "name": "CVE-2010-0427", "url": "https://www.cve.org/CVERecord?id=CVE-2010-0427" }, { "name": "CVE-2014-3470", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3470" }, { "name": "CVE-2014-3062", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3062" }, { "name": "CVE-2012-0831", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0831" }, { "name": "CVE-2009-2414", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2414" }, { "name": "CVE-2012-0057", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0057" }, { "name": "CVE-2014-7187", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7187" }, { "name": "CVE-2010-2956", "url": "https://www.cve.org/CVERecord?id=CVE-2010-2956" }, { "name": "CVE-2011-3905", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3905" }, { "name": "CVE-2014-4833", "url": "https://www.cve.org/CVERecord?id=CVE-2014-4833" }, { "name": "CVE-2011-4566", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4566" }, { "name": "CVE-2014-0837", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0837" }, { "name": "CVE-2010-4008", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4008" }, { "name": "CVE-2014-6278", "url": "https://www.cve.org/CVERecord?id=CVE-2014-6278" }, { "name": "CVE-2012-1172", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1172" }, { "name": "CVE-2014-0076", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0076" }, { "name": "CVE-2010-1163", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1163" }, { "name": "CVE-2011-4317", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4317" }, { "name": "CVE-2011-4885", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4885" }, { "name": "CVE-2010-5107", "url": "https://www.cve.org/CVERecord?id=CVE-2010-5107" }, { "name": "CVE-2009-1265", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1265" }, { "name": "CVE-2010-3316", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3316" }, { "name": "CVE-2012-3510", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3510" }, { "name": "CVE-2011-5000", "url": "https://www.cve.org/CVERecord?id=CVE-2011-5000" }, { "name": "CVE-2010-3435", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3435" }, { "name": "CVE-2011-3919", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3919" }, { "name": "CVE-2012-2337", "url": "https://www.cve.org/CVERecord?id=CVE-2012-2337" }, { "name": "CVE-2011-1089", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1089" }, { "name": "CVE-2014-0096", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0096" }, { "name": "CVE-2013-5908", "url": "https://www.cve.org/CVERecord?id=CVE-2013-5908" }, { "name": "CVE-2014-3091", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3091" }, { "name": "CVE-2012-2131", "url": "https://www.cve.org/CVERecord?id=CVE-2012-2131" } ], "initial_release_date": "2014-11-13T00:00:00", "last_revision_date": "2014-11-13T00:00:00", "links": [], "reference": "CERTFR-2014-AVI-480", "revisions": [ { "description": "version initiale.", "revision_date": "2014-11-13T00:00:00.000000" } ], "risks": [ { "description": "Injection de code indirecte \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" }, { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "D\u00e9ni de service" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eJuniper\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une\nex\u00e9cution de code arbitraire et un d\u00e9ni de service \u00e0 distance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10661 du 11 novembre 2014", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10661" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10657 du 11 novembre 2014", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10657" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10658 du 11 novembre 2014", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10658" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10659 du 11 novembre 2014", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10659" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10660 du 11 novembre 2014", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10660" } ] }
CERTFR-2014-AVI-357
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans les produits Juniper. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
N/A | N/A | NSM3000 | ||
ESET | Security | Security Threat Response Manager | ||
Juniper Networks | Secure Analytics | Juniper Secure Analytics | ||
N/A | N/A | NSMExpress |
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "NSM3000", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "Security Threat Response Manager", "product": { "name": "Security", "vendor": { "name": "ESET", "scada": false } } }, { "description": "Juniper Secure Analytics", "product": { "name": "Secure Analytics", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "NSMExpress", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2012-0053", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0053" }, { "name": "CVE-2011-3192", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3192" }, { "name": "CVE-2014-0460", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0460" }, { "name": "CVE-2014-0063", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0063" }, { "name": "CVE-2013-4286", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4286" }, { "name": "CVE-2013-4002", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4002" }, { "name": "CVE-2013-5823", "url": "https://www.cve.org/CVERecord?id=CVE-2013-5823" }, { "name": "CVE-2013-4590", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4590" }, { "name": "CVE-2012-5081", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5081" }, { "name": "CVE-2014-0061", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0061" }, { "name": "CVE-2013-2457", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2457" }, { "name": "CVE-2013-5803", "url": "https://www.cve.org/CVERecord?id=CVE-2013-5803" }, { "name": "CVE-2012-0031", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0031" }, { "name": "CVE-2014-0114", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0114" }, { "name": "CVE-2014-0067", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0067" }, { "name": "CVE-2014-0411", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0411" }, { "name": "CVE-2013-2461", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2461" }, { "name": "CVE-2013-0443", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0443" }, { "name": "CVE-2014-0098", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0098" }, { "name": "CVE-2014-0453", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0453" }, { "name": "CVE-2013-0169", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0169" }, { "name": "CVE-2013-5802", "url": "https://www.cve.org/CVERecord?id=CVE-2013-5802" }, { "name": "CVE-2014-0423", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0423" }, { "name": "CVE-2014-0224", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0224" }, { "name": "CVE-2013-0440", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0440" }, { "name": "CVE-2011-3368", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3368" }, { "name": "CVE-2013-4322", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4322" }, { "name": "CVE-2013-5780", "url": "https://www.cve.org/CVERecord?id=CVE-2013-5780" }, { "name": "CVE-2014-0064", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0064" }, { "name": "CVE-2014-0065", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0065" }, { "name": "CVE-2013-2451", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2451" }, { "name": "CVE-2014-0107", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0107" }, { "name": "CVE-2013-2407", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2407" }, { "name": "CVE-2014-0033", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0033" }, { "name": "CVE-2014-0062", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0062" }, { "name": "CVE-2014-0060", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0060" }, { "name": "CVE-2010-5298", "url": "https://www.cve.org/CVERecord?id=CVE-2010-5298" }, { "name": "CVE-2013-5825", "url": "https://www.cve.org/CVERecord?id=CVE-2013-5825" }, { "name": "CVE-2013-1537", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1537" }, { "name": "CVE-2014-0198", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0198" }, { "name": "CVE-2011-0419", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0419" }, { "name": "CVE-2013-5830", "url": "https://www.cve.org/CVERecord?id=CVE-2013-5830" }, { "name": "CVE-2014-0066", "url": "https://www.cve.org/CVERecord?id=CVE-2014-0066" } ], "initial_release_date": "2014-08-14T00:00:00", "last_revision_date": "2014-08-14T00:00:00", "links": [], "reference": "CERTFR-2014-AVI-357", "revisions": [ { "description": "version initiale.", "revision_date": "2014-08-14T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eJuniper\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10642 du 13 ao\u00fbt 2014", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10642" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10643 du 13 ao\u00fbt 2014", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10643" } ] }