The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
FreeRADIUS: bad logging via Global Logrotate Change
The FreeRADIUS service modifies Logrotate's global configuration with a user change option, which can lead to bad logging...
Asterisk: denial of service via T.38 Zero Port
An attacker can trigger a fatal error via T.38 Zero Port of Asterisk, in order to trigger a denial of service...
Snort: denial of service via Ethernet Frame Decoder
An attacker can trigger a fatal error via Ethernet Frame Decoder of Snort, in order to trigger a denial of service...
Xen, Linux: denial of service via Map Foreign Pages
An attacker, inside a guest system, can trigger a fatal error via Map Foreign Pages of Xen with Linux, in order to trigger a denial of service on the host system...
Xen, Linux: denial of service via Netback Grant Mapping Errors
An attacker, inside a guest system, can trigger a fatal error via Netback Grant Mapping Errors of Xen with Linux, in order to trigger a denial of service on the host system...
Zabbix: Cross Site Request Forgery via CControllerAuthenticationUpdate
An attacker can trigger a Cross Site Request Forgery via CControllerAuthenticationUpdate of Zabbix, in order to force the victim to perform operations...
Intel Graphics Drivers: multiple vulnerabilities
An attacker can use several vulnerabilities of Intel Graphics Drivers...
mbsync: directory traversal via Mailbox Name
An attacker can traverse directories via Mailbox Name of mbsync, in order to read a file outside the service root path...
Drupal Webform: spoofing via Email Sending
An attacker can create spoofed data via Email Sending of Drupal Webform, in order to deceive the victim...
Pulse Connect Secure Appliance: denial of service via BIOS Trickboot Erasing
An attacker can trigger a fatal error via BIOS Trickboot Erasing of Pulse Connect Secure Appliance, in order to trigger a denial of service...
Trend Micro Scan Engine: denial of service via Memory Exhaustion
An attacker can trigger a fatal error via Memory Exhaustion of Trend Micro Scan Engine, in order to trigger a denial of service...
Cisco ASR 5000: denial of service via ipsecmgr
An attacker can trigger a fatal error via ipsecmgr of Cisco ASR 5000, in order to trigger a denial of service...
Cisco SD-WAN vEdge Router: privilege escalation via Signature Verification Bypass
An attacker can bypass restrictions via Signature Verification Bypass of Cisco SD-WAN vEdge Router, in order to escalate his privileges...
Cisco IP Phone: multiple vulnerabilities via CDP/LLDP
An attacker can use several vulnerabilities of Cisco IP Phone...
Cisco ESA/CSMA: information disclosure via Web-based Management Interface
An attacker can bypass access restrictions to data via Web-based Management Interface of Cisco ESA/CSMA, in order to obtain sensitive information...
Node.js Modules: five vulnerabilities
An attacker can use several vulnerabilities of Node.js Modules...
Google Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
Microsoft Exchange Server: multiple vulnerabilities
An attacker can use several vulnerabilities of Microsoft Exchange Server...
SUSE LE: vulnerability via dnssec-keygen
A vulnerability via dnssec-keygen of SUSE LE was announced...
OpenSSH: use after free via ssh-agent
An attacker can force the usage of a freed memory area via ssh-agent of OpenSSH, in order to trigger a denial of service, and possibly to run code...
GRUB2: multiple vulnerabilities
An attacker can use several vulnerabilities of GRUB2...
Joomla Core: multiple vulnerabilities
An attacker can use several vulnerabilities of Joomla Core...
wpa_supplicant: use after free via Provision Discovery Request
An attacker can force the usage of a freed memory area via Provision Discovery Request of wpa_supplicant, in order to trigger a denial of service, and possibly to run code...
Node.js Modules: six vulnerabilities
An attacker can use several vulnerabilities of Node.js Modules...
Google Android/Pixel: multiple vulnerabilities of March 2021
An attacker can use several vulnerabilities of Google Android/Pixel...
Dell EMC OpenManage Server Administrator: two vulnerabilities
An attacker can use several vulnerabilities of Dell EMC OpenManage Server Administrator...
HCL Domino: information disclosure via Domino Access Services
An attacker can bypass access restrictions to data via Domino Access Services of HCL Domino, in order to obtain sensitive information...
HCL Domino: buffer overflow via Crafted Inputs
An attacker can trigger a buffer overflow via Crafted Inputs of HCL Domino, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1106 1107 1108 1109 1110 1111 1112 1113 1114 1116