The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Ansible Core: information disclosure via K8s Module Command Line Arguments
An attacker can bypass access restrictions to data via K8s Module Command Line Arguments of Ansible Core, in order to obtain sensitive information...
Ansible Core: information disclosure via Vault Encrypted Files
An attacker can bypass access restrictions to data via Vault Encrypted Files of Ansible Core, in order to obtain sensitive information...
Ansible Core: code execution via Previous Task
An attacker can use a vulnerability via Previous Task of Ansible Core, in order to run code...
Ansible Core: file reading via atomic_move
A local attacker can read a file via atomic_move of Ansible Core, in order to obtain sensitive information...
Ansible Core: directory traversal via Fetch Module
An attacker can traverse directories via Fetch Module of Ansible Core, in order to read a file outside the service root path...
tcpdump: out-of-bounds memory reading via EXTRACT_32BITS
An attacker can force a read at an invalid address via EXTRACT_32BITS() of tcpdump, in order to trigger a denial of service, or to obtain sensitive information...
Ubuntu: information disclosure via linux-image-4.15.0
An attacker can bypass access restrictions to data via linux-image-4.15.0 of Ubuntu, in order to obtain sensitive information...
Podman: file corruption via Container Image
A local attacker can create a symbolic link in a Container Image, in order to alter the pointed file, with privileges of Podman on the host system...
Horde_Form: file upload via add.php
An attacker can upload a malicious file via add.php on Horde_Form, in order for example to upload a Trojan...
FreeBSD: privilege escalation via grub2-bhyve Font Loading
An attacker, inside a guest system, can bypass restrictions via grub2-bhyve Font Loading of FreeBSD, in order to escalate his privileges on the host system...
FreeBSD: privilege escalation via grub2-bhyve Direct Commands
An attacker, inside a guest system, can bypass restrictions via grub2-bhyve Direct Commands of FreeBSD, in order to escalate his privileges on the host system...
SaltStack Salt: code execution via NET API Command Injection
An attacker can use a vulnerability via NET API Command Injection of SaltStack Salt, in order to run code...
IBM API Connect: information disclosure via Weak Cryptographic Algorithms
An attacker can bypass access restrictions to data via Weak Cryptographic Algorithms of IBM API Connect, in order to obtain sensitive information...
Ansible Core: directory traversal via win_unzip
An attacker can traverse directories via win_unzip of Ansible Core, in order to read a file outside the service root path...
Apache CouchDB: privilege escalation via HTTPS Database Server
An attacker can bypass restrictions via HTTPS Database Server of Apache CouchDB, in order to escalate his privileges...
Apache CouchDB: read-write access via Runtime Configuration
An attacker can bypass access restrictions via Runtime Configuration of Apache CouchDB, in order to read or alter data...
Apache CouchDB: privilege escalation via HTTPS Database Server
An attacker can bypass restrictions via HTTPS Database Server of Apache CouchDB, in order to escalate his privileges...
Python typed_ast: out-of-bounds memory reading via ast_for_arguments
An attacker can force a read at an invalid address via ast_for_arguments of Python typed_ast, in order to trigger a denial of service, or to obtain sensitive information...
Python typed_ast: out-of-bounds memory reading via handle_keywordonly_args
An attacker can force a read at an invalid address via handle_keywordonly_args of Python typed_ast, in order to trigger a denial of service, or to obtain sensitive information...
GNU Libc: buffer overflow
An attacker can trigger a buffer overflow of GNU Libc, in order to trigger a denial of service, and possibly to run code...
IBM MQ: information disclosure via runmqras
A local attacker can bypass access restrictions to data via runmqras of IBM MQ, in order to obtain sensitive information...
IBM MQ: information disclosure
A local attacker can bypass access restrictions to data of IBM MQ, in order to obtain sensitive information...
IBM MQ: denial of service via Error Messages
An attacker can trigger a fatal error of IBM MQ, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1008 1009 1010 1011 1012 1013 1014 1015 1016 1018 1020 1021 1022