The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
pcp: privilege escalation via migrate_tempdirs
An attacker can bypass restrictions via migrate_tempdirs of pcp, in order to escalate his privileges...
pcp: privilege escalation via PCP_LOG_DIR/configs.sh
An attacker can bypass restrictions via PCP_LOG_DIR/configs.sh of pcp, in order to escalate his privileges...
OTRS Help Desk: spoofing via Spoofed Draft Messages
An attacker can create spoofed data via Spoofed Draft Messages of OTRS Help Desk, because of jQuery (VIGILANCE-VUL-29030), in order to deceive the victim...
OTRS Help Desk: unexpired session via SessionMaxIdleTime Ignored
Background tasks are counted for SessionMaxIdleTime of OTRS Help Desk, so an attacker can ensure that his session will never expire...
libexif: integer overflow via exif-data.c
An attacker can trigger an integer overflow via exif-data.c of libexif, in order to trigger a denial of service, and possibly to run code...
SUSE wicked: memory leak via DHCP4 FSM Other Client IDs
An attacker can create a memory leak via DHCP4 FSM Other Client IDs of SUSE wicked, in order to trigger a denial of service...
SUSE wicked: use after free via DHCP6 IA_PD Options
An attacker can force the usage of a freed memory area via DHCP6 IA_PD Options of SUSE wicked, in order to trigger a denial of service, and possibly to run code...
QEMU: out-of-bounds memory reading via snprintf
An attacker can force a read at an invalid address via snprintf() of QEMU, in order to trigger a denial of service, or to obtain sensitive information...
Node Core: three vulnerabilities
An attacker can use several vulnerabilities of Node Core...
Linux kernel: use after free via vgacon_invert_region
An attacker can force the usage of a freed memory area via vgacon_invert_region() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: use after free via n_tty_receive_buf_common
An attacker can force the usage of a freed memory area via n_tty_receive_buf_common() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: use after free via vc_do_resize
An attacker can force the usage of a freed memory area via vc_do_resize() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
F5 BIG-IP APM: privilege escalation via Edge Client for Windows
An attacker can bypass restrictions via Edge Client for Windows of F5 BIG-IP APM, in order to escalate his privileges...
F5 BIG-IP: denial of service via TMM Connector Profile
An attacker can trigger a fatal error via TMM Connector Profile of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP Virtual Edition AWS: denial of service via TMM
An attacker can trigger a fatal error via TMM of F5 BIG-IP Virtual Edition AWS, in order to trigger a denial of service...
Drupal Views Bulk Operations: privilege escalation via hook_action_info_alter
An attacker can bypass restrictions via hook_action_info_alter of Drupal Views Bulk Operations, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 999 1000 1001 1002 1003 1004 1005 1006 1007 1009 1011