The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Mozilla Firefox for Android: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Mozilla Firefox for Android, in order to run JavaScript code in the context of the web site...
Mozilla Firefox: code execution via Web Render Components
An attacker can use a vulnerability via Web Render Components of Mozilla Firefox, in order to run code...
Centreon Web: multiple vulnerabilities
An attacker can use several vulnerabilities of Centreon Web...
Xen: resource leak
An attacker can create a resource leak in Xen, in order to trigger a denial of service...
RabbitMQ: two vulnerabilities
An attacker can use several vulnerabilities of RabbitMQ...
NVIDIA drivers: two vulnerabilities
An attacker can use several vulnerabilities of NVIDIA drivers...
avahi: overload
An attacker can trigger an overload of avahi, in order to trigger a denial of service...
p7zip: NULL pointer dereference
An attacker can force a NULL pointer to be dereferenced of p7zip, in order to trigger a denial of service...
OpenEXR: multiple vulnerabilities
An attacker can use several vulnerabilities of OpenEXR...
Kubernetes: privilege escalation
An attacker can bypass restrictions of Kubernetes, in order to escalate his privileges...
Mozilla Firefox and Thunderbird on Windows: privilege escalation via the upgrade service
An attacker can tamper with the upgrade service of Mozilla Firefox on Windows...
yara: multiple vulnerabilities
An attacker can use several vulnerabilities of yara...
libtpms: wrong generation of RSA keys
An attacker can make profit of the bad quality of RSA key generation in libtpms...
pngcheck: division by zero
An attacker can trigger a division by zero in pngcheck...
libmicrohttpd: buffer overflow via post_process_urlencoded function
An attacker can trigger a buffer overflow via post_process_urlencoded function() of libmicrohttpd, in order to trigger a denial of service, and possibly to run code...
Exim: multiple vulnerabilities
An attacker can use several vulnerabilities of Exim...
Stormshield Network Security: denial of service via slapd
An attacker can trigger a fatal error via slapd of Stormshield Network Security, in order to trigger a denial of service...
Stormshield Network Security: denial of service via SNMP
An attacker can trigger a fatal error via SNMP of Stormshield Network Security, in order to trigger a denial of service...
IBM QRadar SIEM: six vulnerabilities
An attacker can use several vulnerabilities of IBM QRadar SIEM...
IBM QRadar SIEM: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on IBM QRadar SIEM, in order to read or write data in the session...
Django: file upload
An attacker can upload a malicious file on Django, in order for example to upload a Trojan...
Linux kernel: information disclosure via BPF
A local attacker can read a memory fragment via BPF of the Linux kernel, in order to obtain sensitive information...
Python: audit bypass via exceptions
An attacker can raise exception to run code without triggering audit calls, in order to bypass possible access control checks or logging...
Apache OpenOffice: code execution via non-https URL
An attacker can use a vulnerability via non-http(s) of Apache OpenOffice, in order to run code...
Linux kernel: integer overflow via eBPF
A local attacker can trigger an integer overflow via eBPF of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Google Android/Pixel: multiple vulnerabilities of May 2021
An attacker can use several vulnerabilities of Google Android/Pixel...
exiv2: five vulnerabilities
An attacker can use several vulnerabilities of exiv2...
Cacti: multiple vulnerabilities
An attacker can use several vulnerabilities of Cacti...
Apple macOS: two vulnerabilities via WebKit
An attacker can use several vulnerabilities via WebKit of Apple macOS...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1132