The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
FreeBSD: privilege escalation via ixl ioctl
An attacker can bypass restrictions via ixl ioctl of FreeBSD, in order to escalate his privileges...
FreeBSD: privilege escalation via oce ioctl
An attacker can bypass restrictions via oce ioctl of FreeBSD, in order to escalate his privileges...
FreeBSD: information disclosure via TCP IPv6 SYN Cache
A local attacker can read a memory fragment via TCP IPv6 SYN Cache of FreeBSD, in order to obtain sensitive information...
FreeBSD: denial of service via pfctl
An attacker can trigger a fatal error via pfctl of FreeBSD, in order to trigger a denial of service...
Apache CXF: Cross Site Scripting via Endpoint Names
An attacker can trigger a Cross Site Scripting via Endpoint Names of Apache CXF, in order to run JavaScript code in the context of the web site...
usrsctp: out-of-bounds memory reading via sctp_load_addresses_from_init
An attacker can force a read at an invalid address via sctp_load_addresses_from_init() of usrsctp, in order to trigger a denial of service, or to obtain sensitive information...
Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Chrome...
PHP: multiple vulnerabilities
An attacker can use several vulnerabilities of PHP...
Cisco SD-WAN Solution: privilege escalation
An attacker can bypass restrictions of Cisco SD-WAN Solution, in order to escalate his privileges...
Cisco SD-WAN Solution: code execution via Command Injection
An attacker can use a vulnerability via Command Injection of Cisco SD-WAN Solution, in order to run code...
Cisco SD-WAN Solution: buffer overflow
An attacker can trigger a buffer overflow of Cisco SD-WAN Solution, in order to trigger a denial of service, and possibly to run code...
Cisco SD-WAN Solution vManage: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco SD-WAN Solution vManage, in order to run JavaScript code in the context of the web site...
Cisco SD-WAN Solution vManage: SQL injection
An attacker can use a SQL injection of Cisco SD-WAN Solution vManage, in order to read or alter data...
NetHack: integer overflow via Run-time Configuration File
An attacker can trigger an integer overflow via Run-time Configuration File of NetHack, in order to trigger a denial of service, and possibly to run code...
Drupal CKEditor: Cross Site Scripting via Admin Section
An attacker can trigger a Cross Site Scripting via Admin Section of Drupal CKEditor, in order to run JavaScript code in the context of the web site...
CKEditor: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of CKEditor, in order to run JavaScript code in the context of the web site...
Ubuntu 18.04: security improvement via Apache httpd TLSv1.3 Support
The security of Ubuntu 18.04 was improved via Apache httpd TLSv1.3 Support...
lighttpd: use after free via FAMMonitorDirectory
An attacker can force the usage of a freed memory area via FAMMonitorDirectory of lighttpd, in order to trigger a denial of service, and possibly to run code...
lighttpd: privilege escalation via setuid/setgid/setgroups Unchecked Return Values
An attacker can bypass restrictions via setuid/setgid/setgroups Unchecked Return Values of lighttpd, in order to escalate his privileges...
McAfee Network Security Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of McAfee Network Security Manager, in order to run JavaScript code in the context of the web site...
Trend Micro OfficeScan XG: five vulnerabilities
An attacker can use several vulnerabilities of Trend Micro OfficeScan XG...
VMware Workstation: denial of service via Cortado Thinprint
An attacker can trigger a fatal error via Cortado Thinprint of VMware Workstation, in order to trigger a denial of service...
Python Twisted: information disclosure via HTTP Request Splitting
An attacker can bypass access restrictions to data via HTTP Request Splitting of Python Twisted, in order to obtain sensitive information...
Adobe Acrobat/Reader: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Acrobat/Reader...
ICU: integer overflow via UnicodeString-doAppend
An attacker can trigger an integer overflow via UnicodeString::doAppend() of ICU, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1008 1009 1010 1011 1012 1013 1014 1015 1016 1018 1020 1021 1022 1023 1024 1025 1026 1027 1028 1041 1061 1081 1090