The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Linux kernel: denial of service via CIPSO
An attacker can send malicious CIPSO packets to a Linux host, in order to trigger a denial of service...
TYPO3 Extensions: multiple vulnerabilities
An attacker can use several vulnerabilities of TYPO3 Extensions...
TYPO3 Core: six vulnerabilities
An attacker can use several vulnerabilities of TYPO3 Core...
libreswan: denial of service via IKE v1
An attacker can send malicious IKE v1 packets to libreswan, in order to trigger a denial of service...
SAP: multiple vulnerabilities of May 2020
An attacker can use several vulnerabilities of SAP products...
Symantec Endpoint Protection: privilege escalation
An attacker can bypass restrictions of Symantec Endpoint Protection, in order to escalate his privileges...
Exim: privilege escalation via SPA authentication
An attacker can bypass restrictions via SPA authentication of Exim, in order to escalate his privileges...
Red Hat JBoss Enterprise Application Platform: six vulnerabilities
An attacker can use several vulnerabilities of Red Hat JBoss Enterprise Application Platform...
Red Hat JBoss Enterprise Application Platform: two vulnerabilities
An attacker can use several vulnerabilities of Red Hat JBoss Enterprise Application Platform...
Python Markdown: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Python Markdown, in order to run JavaScript code in the context of the web site...
IBM API Connect: information disclosure via management server
An attacker can bypass access restrictions to data via management server of IBM API Connect, in order to obtain sensitive information...
IBM API Connect: privilege escalation via clickjacking
An attacker can bypass restrictions via clickjacking of IBM API Connect, in order to escalate his privileges...
Linux kernel: memory corruption via mptctl.c
An attacker can trigger a memory corruption via mptctl.c of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Oracle iPlanet Web Server: two vulnerabilities
An attacker can use several vulnerabilities of Oracle iPlanet Web Server...
Linux kernel: denial of service via btree_gc_coalesce
An attacker can trigger a fatal error via btree_gc_coalesce() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: denial of service via sg_write
An attacker can trigger a fatal error via sg_write() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: denial of service via dw_spi_irq
An attacker can trigger a fatal error via dw_spi_irq() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: memory leak via svm_cpu_init
An attacker can create a memory leak via svm_cpu_init() of the Linux kernel, in order to trigger a denial of service...
Webmin: code execution via /cpan/download.cgi
An attacker can use a vulnerability via /cpan/download.cgi of Webmin, in order to run code...
Linux kernel: buffer overflow via mwifiex_ret_wmm_get_status
An attacker can trigger a buffer overflow via mwifiex_ret_wmm_get_status() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: buffer overflow via mwifiex_cmd_append_vsie_tlv
An attacker can trigger a buffer overflow via mwifiex_cmd_append_vsie_tlv() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
RoundCube Webmail: two vulnerabilities
An attacker can use several vulnerabilities of RoundCube Webmail...
Libntlm: out-of-bounds memory reading via buildSmbNtlmAuthRequest
An attacker can force a read at an invalid address via buildSmbNtlmAuthRequest() of Libntlm, in order to trigger a denial of service, or to obtain sensitive information...
Linux kernel: use after free via IORING_OP_MADVISE
An attacker can force the usage of a freed memory area via IORING_OP_MADVISE of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: use after free via get_futex_key
An attacker can force the usage of a freed memory area via get_futex_key() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
SUSE syslog-ng: privilege escalation via Package Update
An attacker can bypass restrictions via Package Update of SUSE syslog-ng, in order to escalate his privileges...
OpenStack Keystone: privilege escalation via EC2 API Credential Creation
An attacker can bypass restrictions via EC2 API Credential Creation of OpenStack Keystone, in order to escalate his privileges...
Mozilla NSS: assertion error via SSL_ParseSessionTicket
An attacker can force an assertion error via SSL_ParseSessionTicket() of Mozilla NSS, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1032 1034 1035 1036