The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Samba: two vulnerabilities
An attacker can use several vulnerabilities of Samba...
Ruby JSON: memory corruption
An attacker can trigger a memory corruption of Ruby JSON, in order to trigger a denial of service, and possibly to run code...
HPE ProLiant: code execution
An attacker can use a vulnerability of HPE ProLiant, in order to run code...
Sonatype Nexus Repository Manager: LDAP server credentials disclosure
An attacker can get the credentials of the system account used by the LDAP server of Sonatype Nexus Repository Manager...
Wind River VxWorks: use after free via tftp
An attacker can force the usage of a freed memory area via tftp of Wind River VxWorks, in order to trigger a denial of service, and possibly to run code...
WebKitGTK, WPE WebKit: eight vulnerabilities
An attacker can use several vulnerabilities of WebKitGTK, WPE WebKit...
Teeworlds: two vulnerabilities
An attacker can use several vulnerabilities of Teeworlds...
Juniper Junos J-Web: directory traversal
An attacker can traverse directories of Juniper Junos J-Web, in order to read a file outside the service root path...
IBM WebSphere Application Server: information disclosure
An attacker can bypass access restrictions to data of WebSphere Application Server, in order to obtain sensitive information...
ESET NOD32 Antivirus: file corruption
A local attacker can create a link, in order to alter the pointed file, with privileges of ESET NOD32 Antivirus...
OpenEXR: multiple vulnerabilities
An attacker can use several vulnerabilities of OpenEXR...
OTRS Help Desk: private key disclosure
An attacker can bypass access restrictions to data in OTRS Help Desk, in order to obtain sensitive information...
Sophos XG Firewall: SQL injection
An attacker can use a SQL injection of Sophos XG Firewall, in order to read or alter data...
Grafana: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Grafana, in order to run JavaScript code in the context of the web site...
QEMU: integer overflow via ati_2d_blt
An attacker can trigger an integer overflow via ati_2d_blt() of QEMU, in order to trigger a denial of service, and possibly to run code...
Dungeon Crawl Stone Soup: code execution via Lua Bytecode
An attacker can use a vulnerability via Lua Bytecode of Dungeon Crawl Stone Soup, in order to run code...
gnuchess: buffer overflow via cmd_load
An attacker can trigger a buffer overflow via cmd_load() of gnuchess, in order to trigger a denial of service, and possibly to run code...
snakeyaml: external YAML entity injection
An attacker can transmit malicious YAML data to snakeyaml, in order to read a file, scan sites, or trigger a denial of service...
libLAS: multiple vulnerabilities
An attacker can use several vulnerabilities of libLAS...
dolphin-emu: vulnerability
A vulnerability of dolphin-emu was announced...
Qt: external XML entity injection
An attacker can transmit malicious XML data to Qt, in order to read a file, scan sites, or trigger a denial of service...
mailman: Cross Site Scripting via attachement
An attacker can trigger a Cross Site Scripting via attachement of mailman, in order to run JavaScript code in the context of the web site...
ncmpc: NULL pointer dereference
An attacker can force a NULL pointer to be dereferenced of ncmpc, in order to trigger a denial of service...
Apache log4j: Man-in-the-Middle via SmtpAppender
An attacker can act as a Man-in-the-Middle via SmtpAppender on Apache log4j, in order to read or write data in the session...
Nagios Core: vulnerability
A vulnerability of Nagios Core was announced...
Ansible Tower: three vulnerabilities
An attacker can use several vulnerabilities of Ansible Tower...
ClusterLabs resource-agents: multiple vulnerabilities
An attacker can use several vulnerabilities of ClusterLabs resource-agents...
McAfee VirusScan: file deletion
A local attacker can create a symbolic link, in order to make McAfee VirusScan remove the pointed file...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1018 1019 1020 1021 1022 1023 1024 1025 1026 1028 1030 1031 1032 1033 1034 1035 1036