The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Vim: use after free via autocmd
An attacker can force the usage of a freed memory area via autocmd of Vim, in order to trigger a denial of service, and possibly to run code...
libvterm: denial of service via Out-of-memory
An attacker can trigger a fatal error via Out-of-memory of libvterm, in order to trigger a denial of service...
strongSwan: denial of service via rsa_pss_params_parse
An attacker can trigger a fatal error via rsa_pss_params_parse() of strongSwan, in order to trigger a denial of service...
Okular: code execution via PDF Files
An attacker can use a vulnerability via PDF Files of Okular, in order to run code...
RSA Authentication Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of RSA Authentication Manager, in order to run JavaScript code in the context of the web site...
Windows: memory corruption via Type 1 Font Parsing
An attacker can trigger a memory corruption via Type 1 Font Parsing of Windows, in order to trigger a denial of service, and possibly to run code...
Keycloak: privilege escalation via FailedLogin Event BruteForceProtector Bypass
An attacker can bypass restrictions via FailedLogin Event BruteForceProtector Bypass of Keycloak, in order to escalate his privileges...
Kubernetes: denial of service via API Server
An attacker can trigger a fatal error via API Server of Kubernetes, in order to trigger a denial of service...
Kubernetes: denial of service via Kubelet
An attacker can trigger a fatal error via Kubelet of Kubernetes, in order to trigger a denial of service...
Squid cache: Cross Site Scripting via Hostname cachemgr.cgi
An attacker can trigger a Cross Site Scripting via Hostname cachemgr.cgi of Squid cache, in order to run JavaScript code in the context of the web site...
Tor: overload
An attacker can trigger an overload of Tor, in order to trigger a denial of service...
Python Bleach: Cross Site Scripting via RCDATA
An attacker can trigger a Cross Site Scripting via RCDATA of Python Bleach, in order to run JavaScript code in the context of the web site...
phpMyAdmin: SQL injection via Data Display
An attacker can use a SQL injection via Data Display of phpMyAdmin, in order to read or alter data...
phpMyAdmin: SQL injection via Searching
An attacker can use a SQL injection via Searching of phpMyAdmin, in order to read or alter data...
phpMyAdmin: SQL injection via Username
An attacker can use a SQL injection via Username of phpMyAdmin, in order to read or alter data...
FasterXML jackson-databind: privilege escalation via ResourceRef
An attacker can bypass restrictions via ResourceRef of FasterXML jackson-databind, in order to escalate his privileges...
FasterXML jackson-databind: privilege escalation via XaPooledConnectionFactory
An attacker can bypass restrictions via XaPooledConnectionFactory of FasterXML jackson-databind, in order to escalate his privileges...
GraphicsMagick: file reading via TranslateTextEx
A local attacker can read a file via TranslateTextEx() of GraphicsMagick, in order to obtain sensitive information...
Joomla Simple Calendar: SQL injection
An attacker can use a SQL injection of Joomla Simple Calendar, in order to read or alter data...
Joomla Saxum Picker: SQL injection
An attacker can use a SQL injection of Joomla Saxum Picker, in order to read or alter data...
Centreon Web: privilege escalation
An attacker can bypass restrictions of Centreon Web, in order to escalate his privileges...
Connect2id Nimbus JOSE+JWT: privilege escalation via JWT Parsing
An attacker can bypass restrictions via JWT Parsing of Connect2id Nimbus JOSE+JWT, in order to escalate his privileges...
Rails ActionView: Cross Site Scripting via Literal Escape Helpers
An attacker can trigger a Cross Site Scripting via Literal Escape Helpers of Rails ActionView, in order to run JavaScript code in the context of the web site...
FreeBSD: information disclosure via jails
A local attacker, inside a guest system, can read a memory fragment via jails of FreeBSD, in order to obtain sensitive information on the host system...
FreeBSD: privilege escalation via epair
An attacker, inside a guest system, can bypass restrictions via epair of FreeBSD, in order to escalate his privileges on the host system...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1009 1010 1011 1012 1013 1014 1015 1016 1017 1019 1021 1022 1023 1024 1025 1026 1027 1028 1029 1041 1061 1081 1090