The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
phpMyAdmin: SQL injection via Searching
An attacker can use a SQL injection via Searching of phpMyAdmin, in order to read or alter data...
phpMyAdmin: SQL injection via Username
An attacker can use a SQL injection via Username of phpMyAdmin, in order to read or alter data...
FasterXML jackson-databind: privilege escalation via ResourceRef
An attacker can bypass restrictions via ResourceRef of FasterXML jackson-databind, in order to escalate his privileges...
FasterXML jackson-databind: privilege escalation via XaPooledConnectionFactory
An attacker can bypass restrictions via XaPooledConnectionFactory of FasterXML jackson-databind, in order to escalate his privileges...
GraphicsMagick: file reading via TranslateTextEx
A local attacker can read a file via TranslateTextEx() of GraphicsMagick, in order to obtain sensitive information...
Joomla Simple Calendar: SQL injection
An attacker can use a SQL injection of Joomla Simple Calendar, in order to read or alter data...
Joomla Saxum Picker: SQL injection
An attacker can use a SQL injection of Joomla Saxum Picker, in order to read or alter data...
Centreon Web: privilege escalation
An attacker can bypass restrictions of Centreon Web, in order to escalate his privileges...
Connect2id Nimbus JOSE+JWT: privilege escalation via JWT Parsing
An attacker can bypass restrictions via JWT Parsing of Connect2id Nimbus JOSE+JWT, in order to escalate his privileges...
Rails ActionView: Cross Site Scripting via Literal Escape Helpers
An attacker can trigger a Cross Site Scripting via Literal Escape Helpers of Rails ActionView, in order to run JavaScript code in the context of the web site...
FreeBSD: information disclosure via jails
A local attacker, inside a guest system, can read a memory fragment via jails of FreeBSD, in order to obtain sensitive information on the host system...
FreeBSD: privilege escalation via epair
An attacker, inside a guest system, can bypass restrictions via epair of FreeBSD, in order to escalate his privileges on the host system...
FreeBSD: privilege escalation via ixl ioctl
An attacker can bypass restrictions via ixl ioctl of FreeBSD, in order to escalate his privileges...
FreeBSD: privilege escalation via oce ioctl
An attacker can bypass restrictions via oce ioctl of FreeBSD, in order to escalate his privileges...
FreeBSD: information disclosure via TCP IPv6 SYN Cache
A local attacker can read a memory fragment via TCP IPv6 SYN Cache of FreeBSD, in order to obtain sensitive information...
FreeBSD: denial of service via pfctl
An attacker can trigger a fatal error via pfctl of FreeBSD, in order to trigger a denial of service...
Apache CXF: Cross Site Scripting via Endpoint Names
An attacker can trigger a Cross Site Scripting via Endpoint Names of Apache CXF, in order to run JavaScript code in the context of the web site...
usrsctp: out-of-bounds memory reading via sctp_load_addresses_from_init
An attacker can force a read at an invalid address via sctp_load_addresses_from_init() of usrsctp, in order to trigger a denial of service, or to obtain sensitive information...
Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Chrome...
PHP: multiple vulnerabilities
An attacker can use several vulnerabilities of PHP...
Cisco SD-WAN Solution: privilege escalation
An attacker can bypass restrictions of Cisco SD-WAN Solution, in order to escalate his privileges...
Cisco SD-WAN Solution: code execution via Command Injection
An attacker can use a vulnerability via Command Injection of Cisco SD-WAN Solution, in order to run code...
Cisco SD-WAN Solution: buffer overflow
An attacker can trigger a buffer overflow of Cisco SD-WAN Solution, in order to trigger a denial of service, and possibly to run code...
Cisco SD-WAN Solution vManage: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco SD-WAN Solution vManage, in order to run JavaScript code in the context of the web site...
Cisco SD-WAN Solution vManage: SQL injection
An attacker can use a SQL injection of Cisco SD-WAN Solution vManage, in order to read or alter data...
NetHack: integer overflow via Run-time Configuration File
An attacker can trigger an integer overflow via Run-time Configuration File of NetHack, in order to trigger a denial of service, and possibly to run code...
Drupal CKEditor: Cross Site Scripting via Admin Section
An attacker can trigger a Cross Site Scripting via Admin Section of Drupal CKEditor, in order to run JavaScript code in the context of the web site...
CKEditor: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of CKEditor, in order to run JavaScript code in the context of the web site...
Ubuntu 18.04: security improvement via Apache httpd TLSv1.3 Support
The security of Ubuntu 18.04 was improved via Apache httpd TLSv1.3 Support...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1009 1010 1011 1012 1013 1014 1015 1016 1017 1019 1021 1022