The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
OpenConnect: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on OpenConnect, in order to read or write data in the session...
OpenBSD: denial of service via wscons
An attacker can trigger a fatal error via wscons of OpenBSD, in order to trigger a denial of service...
IBM WebSphere Application Server Traditional: Server Side Request Forgery
An attacker can trigger a Server Side Request Forgery of IBM WebSphere Application Server Traditional, in order to force the victim to perform operations...
oddjob: file corruption
A local attacker can create a symbolic link, in order to alter the pointed file, with privileges of oddjob...
glpi: four vulnerabilities
An attacker can use several vulnerabilities of glpi...
Drupal reCAPTCHA v3: privilege escalation
An attacker can bypass restrictions of Drupal reCAPTCHA v3, in order to escalate his privileges...
Drupal Webform: information disclosure via 'Term checkboxes'
An attacker can bypass access restrictions to data via 'Term checkboxes' of Drupal Webform, in order to obtain sensitive information...
apt: denial of service via a deb package
An attacker can trigger a fatal error in apt via a deb file package, in order to trigger a denial of service...
Micro Focus Client for OES: buffer overflow via ncfsd.sys
An attacker can trigger a buffer overflow via ncfsd.sys of Micro Focus Client for OES, in order to trigger a denial of service, and possibly to run code...
Linux kernel: privilege escalation via signal
An attacker can bypass restrictions on the kill system call of the Linux kernel, in order to escalate his privileges...
PulseAudio: privilege escalation
An attacker can bypass restrictions of PulseAudio, in order to escalate his privileges...
mojarra: directory traversal
An attacker can traverse directories of mojarra, in order to read a file outside the service root path...
Hibernate ORM: SQL injection
An attacker can use a SQL injection of Hibernate ORM, in order to read or alter data...
Red Hat Single Sign-On: three vulnerabilities via keycloak
An attacker can use several vulnerabilities via keycloak of Red Hat Single Sign-On...
FreeBSD: use after free via SCTP-AUTH packet processing
An attacker can force the usage of a freed memory area in the handler of SCTP-AUTH in FreeBSD, in order to trigger a denial of service, and possibly to run code...
FreeBSD: denial of service via cryptodev
An attacker can trigger a fatal error via cryptodev of FreeBSD, in order to trigger a denial of service...
FreeBSD: use after free via cryptodev
An attacker can force the usage of a freed memory area via cryptodev of FreeBSD, in order to trigger a denial of service, and possibly to run code...
FreeBSD: buffer overflow via libalias
An attacker can trigger a buffer overflow via libalias of FreeBSD, in order to trigger a denial of service, and possibly to run code...
ClamAV: denial of service via the PDF parser
An attacker can trigger a fatal error in the PDF parser of ClamAV, in order to trigger a denial of service...
ClamAV: denial of service via an ARJ archive
An attacker can trigger a fatal error via an ARJ archive in ClamAV, in order to trigger a denial of service...
Microsoft Windows: vulnerabilities of May 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Visual Studio: vulnerabilities of May 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft SharePoint: vulnerabilities of May 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Office: code execution
An attacker can use a vulnerability of Microsoft Office, in order to run code...
Microsoft 365 Apps for Enterprise: code execution
An attacker can use a vulnerability of Microsoft 365 Apps for Enterprise, in order to run code...
Microsoft .NET: vulnerabilities of May 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Internet Explorer: vulnerabilities of May 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Edge EdgeHTML: vulnerabilities of May 2020
An attacker can use several vulnerabilities of Microsoft products...
Adobe Acrobat/Reader: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Acrobat/Reader...
Adminer: open redirect
An attacker can deceive the user of Adminer, in order to redirect him to a malicious site...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1023 1024 1025 1026 1027 1028 1029 1030 1031 1033 1035 1036