The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
AWL: privilege escalation via Long-term Session Continuity
An attacker can bypass restrictions via Long-term Session Continuity of AWL, in order to escalate his privileges...
AWL: privilege escalation via Session Key Guess
An attacker can bypass restrictions via Session Key Guess of AWL, in order to escalate his privileges...
Ansible Core: information disclosure via Modules Files Encrypted
An attacker can bypass access restrictions to data via Modules Files Encrypted of Ansible Core, in order to obtain sensitive information...
GStreamer: NULL pointer dereference via GstRTSPAuth
An attacker can force a NULL pointer to be dereferenced via GstRTSPAuth of GStreamer, in order to trigger a denial of service...
Sonatype Nexus Repository Manager: privilege escalation
An attacker can bypass restrictions of Sonatype Nexus Repository Manager, in order to escalate his privileges...
RHEL 7 Kernel: denial of service via kernel/audit.c
An attacker can trigger a fatal error via kernel/audit.c of RHEL 7 Kernel, in order to trigger a denial of service...
WebKitGTK: use after free via Web Content
An attacker can force the usage of a freed memory area via Web Content of WebKitGTK, in order to trigger a denial of service, and possibly to run code...
Ansible Core: write access via Galaxy Tar Extraction
An attacker can bypass access restrictions via Galaxy Tar Extraction of Ansible Core, in order to alter data...
Ansible Core: privilege escalation via ldap_attr / ldap_entry
An attacker can bypass restrictions via ldap_attr / ldap_entry of Ansible Core, in order to escalate his privileges...
OpenVPN: denial of service via Client Float
An attacker can trigger a fatal error via Client Float of OpenVPN, in order to trigger a denial of service...
Jenkins Plugins: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins Plugins...
Chrome: use after free via Speech Recognizer
An attacker can force the usage of a freed memory area via Speech Recognizer of Chrome, in order to trigger a denial of service, and possibly to run code...
PHP: multiple vulnerabilities
An attacker can use several vulnerabilities of PHP...
Cisco Wireless LAN Controller: denial of service via 802.11 Generic Advertisement
An attacker can trigger a fatal error via 802.11 Generic Advertisement of Cisco Wireless LAN Controller, in order to trigger a denial of service...
Cisco Wireless LAN Controller: denial of service via CAPWAP
An attacker can trigger a fatal error via CAPWAP of Cisco Wireless LAN Controller, in order to trigger a denial of service...
Cisco IP Phone: code execution via Web Server
An attacker can use a vulnerability via Web Server of Cisco IP Phone, in order to run code...
Cisco UCS Director: multiple vulnerabilities via REST API
An attacker can use several vulnerabilities via REST API of Cisco UCS Director...
Cisco Unified Communications Manager: directory traversal via TAPS
An attacker can traverse directories via TAPS of Cisco Unified Communications Manager, in order to read a file outside the service root path...
Cisco Aironet Series Access Point: denial of service via Client Packets
An attacker can send malicious Client Packets to Cisco Aironet Series Access Point, in order to trigger a denial of service...
ISC BIND: information disclosure via Forwarding DNS Rebinding
An attacker can bypass access restrictions to data via Forwarding DNS Rebinding of ISC BIND, in order to obtain sensitive information...
Buger Jsonparser: overload via Delete Call
An attacker can trigger an overload via Delete Call of Buger Jsonparser, in order to trigger a denial of service...
Drupal JSON-API: vulnerability
A vulnerability of Drupal JSON:API was announced...
MP3Gain: out-of-bounds memory reading via ReadMP3APETag
An attacker can force a read at an invalid address via ReadMP3APETag() of MP3Gain, in order to trigger a denial of service, or to obtain sensitive information...
MP3Gain: memory corruption via apetag.c
An attacker can trigger a memory corruption via apetag.c of MP3Gain, in order to trigger a denial of service, and possibly to run code...
IBM MQ: denial of service via Channel Processing
An attacker can trigger a fatal error via Channel Processing of IBM MQ, in order to trigger a denial of service...
IBM MQ: information disclosure
An attacker can bypass access restrictions to data of IBM MQ, in order to obtain sensitive information...
Percona XtraBackup, XtraDB Cluster: vulnerability
A vulnerability of Percona XtraBackup and XtraDB Cluster was announced...
Horde Groupware Webmail: code execution via edit.php
An attacker can use a vulnerability via edit.php of Horde Groupware Webmail, in order to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1016 1017 1018 1019 1020 1021 1022 1023 1024 1026 1028 1029 1030 1031 1032 1033 1034 1035 1036