The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
OVMF: spoofing via DxeImageVerificationHandler
An attacker can create spoofed data via DxeImageVerificationHandler of OVMF, in order to deceive the victim...
OVMF: memory leak via ARP
An attacker can create a memory leak via ARP of OVMF, in order to trigger a denial of service...
OVMF: memory corruption via Numeric Truncation
An attacker can trigger a memory corruption via Numeric Truncation of OVMF, in order to trigger a denial of service, and possibly to run code...
Ruby Rake: code execution via Rake-FileList Command Injection
An attacker can use a vulnerability via Rake::FileList Command Injection of Ruby Rake, in order to run code...
Broadcom Wi-Fi Chipsets: information disclosure via Frames Decryption
An attacker can bypass access restrictions to data via Frames Decryption of Broadcom Wi-Fi Chipsets, in order to obtain sensitive information...
Cisco UCS Manager Software: privilege escalation via CLI Command Injection
An attacker can bypass restrictions via CLI Command Injection of Cisco UCS Manager Software, in order to escalate his privileges...
Cisco NX-OS: privilege escalation via BGP MD5 Authentication Bypass
An attacker can bypass restrictions via BGP MD5 Authentication Bypass of Cisco NX-OS, in order to escalate his privileges...
Cisco NX-OS: spoofing via ARP Anycast Gateway
An attacker can create spoofed data via ARP Anycast Gateway of Cisco NX-OS, in order to deceive the victim...
Cisco Nexus 7000 Series Switches: denial of service via NX-API
An attacker can trigger a fatal error via NX-API of Cisco Nexus 7000 Series Switches, in order to trigger a denial of service...
Cisco Nexus 1000V Switch for VMware vSphere: denial of service via VSM Secure Login Enhancements
An attacker can trigger a fatal error via VSM Secure Login Enhancements of Cisco Nexus 1000V Switch for VMware vSphere, in order to trigger a denial of service...
Cisco UCS Manager Software: privilege escalation via Command Arguments
An attacker can bypass restrictions via Command Arguments of Cisco UCS Manager Software, in order to escalate his privileges...
Cisco UCS Manager Software: privilege escalation via Command Injection
An attacker can bypass restrictions via Command Injection of Cisco UCS Manager Software, in order to escalate his privileges...
Cisco NX-OS: code execution via Cisco Discovery Protocol
An attacker can use a vulnerability via Cisco Discovery Protocol of Cisco NX-OS, in order to run code...
Kaspersky Anti-Virus: privilege escalation via Interprocess Communications
An attacker can bypass restrictions via Interprocess Communications of Kaspersky Anti-Virus, in order to escalate his privileges...
Dell EMC Avamar Server: open redirect
An attacker can deceive the user of Dell EMC Avamar Server, in order to redirect him to a malicious site...
Linux kernel: memory corruption via AArch64 Brk Top Byte
An attacker can trigger a memory corruption via AArch64 Brk Top Byte of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
NetworkManager VPN plugin for SSH: privilege escalation
An attacker can bypass restrictions of NetworkManager VPN plugin for SSH, in order to escalate his privileges...
Linux kernel: privilege escalation via KVM Nested VMX
An attacker, inside a guest system, can bypass restrictions via KVM Nested VMX of the Linux kernel, in order to escalate his privileges on the host system...
Python: overload via Lib/zipfile.py
An attacker can trigger an overload via Lib/zipfile.py of Python, in order to trigger a denial of service...
Chrome: three vulnerabilities
An attacker can use several vulnerabilities of Chrome...
Sophos Endpoint Protection: vulnerability via ZIP Archive Bypass
A vulnerability via ZIP Archive Bypass of Sophos Endpoint Protection was announced...
Centreon Web: privilege escalation via Blank contact_autologin_key
An attacker can bypass restrictions via Blank contact_autologin_key of Centreon Web, in order to escalate his privileges...
Centreon Web: information disclosure via URL Session ID
An attacker can bypass access restrictions to data via URL Session ID of Centreon Web, in order to obtain sensitive information...
OpenSMTPD: code execution via Multi-line Response
An attacker can use a vulnerability via Multi-line Response of OpenSMTPD, in order to run code...
IBM QRadar Advisor With Watson App for IBM QRadar SIEM: information disclosure via HTTP Requests
An attacker can bypass access restrictions to data via HTTP Requests of IBM QRadar Advisor With Watson App for IBM QRadar SIEM, in order to obtain sensitive information...
IBM QRadar Advisor With Watson App for IBM QRadar SIEM: information disclosure via Weak Cryptographic Algorithms
An attacker can bypass access restrictions to data via Weak Cryptographic Algorithms of IBM QRadar Advisor With Watson App for IBM QRadar SIEM, in order to obtain sensitive information...
Intel Processors: information disclosure via Cleanup Errors
An attacker can bypass access restrictions to data via Cleanup Errors of Intel Processors, in order to obtain sensitive information...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1004 1005 1006 1007 1008 1009 1010 1011 1012 1014 1016 1017 1018 1019 1020 1021 1022