The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Joomla Core: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla Core, in order to run JavaScript code in the context of the web site...
Joomla Core: Cross Site Request Forgery via com_postinstall
An attacker can trigger a Cross Site Request Forgery via com_postinstall of Joomla Core, in order to force the victim to perform operations...
Node Core: three vulnerabilities
An attacker can use several vulnerabilities of Node Core...
Docker Engine: Man-in-the-Middle via IPv6 Router Advertisement
An attacker can act as a Man-in-the-Middle via an IPv6 Router Advertisement against Docker Engine, in order to read or write data in the session...
Linux kernel: memory leak via go7007_snd_init
An attacker can create a memory leak via go7007_snd_init() of the Linux kernel, in order to trigger a denial of service...
Slurm: privilege escalation via Message Aggregation
An attacker can bypass restrictions via Message Aggregation of Slurm, in order to escalate his privileges...
Email-MIME: memory overuse via MIME
An attacker can send deeply nested MIME messages to trigger a memory overuse of Email-MIME and so a denial of service...
Symfony: Cross Site Request Forgery via LogoutListener
An attacker can trigger a Cross Site Request Forgery via LogoutListener of Symfony, in order to force the victim to perform operations...
HPE ArcSight Logger: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of HPE ArcSight Logger, in order to run JavaScript code in the context of the web site...
Mozilla Firefox: seven vulnerabilities
An attacker can use several vulnerabilities of Mozilla Firefox...
Mozilla Firefox ESR: three vulnerabilities
An attacker can use several vulnerabilities of Mozilla Firefox ESR...
Google Android/Pixel: multiple vulnerabilities of June 2020
An attacker can use several vulnerabilities of Google Android/Pixel...
FreeRDP: memory corruption
An attacker can trigger a memory corruption of FreeRDP, in order to trigger a denial of service, and possibly to run code...
QEMU: out-of-bounds memory reading via the support for Message Signalled Interrupt
An attacker can force a read at an invalid address via Message Signalled Interrupt of QEMU, in order to trigger a denial of service, or to obtain sensitive information...
QEMU: NULL pointer dereference via the MegaRAID SAS 8708EM device driver
An attacker can force a NULL pointer to be dereferenced via MegaRAID SAS 8708EM of QEMU, in order to trigger a denial of service...
Kubernetes kubelet: Man-in-the-Middle via IPv6 Router Advertisement
An attacker can act as a Man-in-the-Middle via an IPv6 Router Advertisement against Kubernetes kubelet, in order to read or write data in the session...
Kubernetes: Server Side Request Forgery via kube-controller-manager
An attacker can trigger a Server Side Request Forgery via kube-controller-manager of Kubernetes, in order to force the victim to perform operations...
Sympa: privilege escalation
An attacker can bypass restrictions of Sympa, in order to escalate his privileges...
Apache Ant: file corruption
A local attacker can create a symbolic link, in order to alter the pointed file, with privileges of Apache Ant...
Python httplib2: request tampering
An attacker can tamper with the URL to inject headers or requests in a program using the Python library httplib2...
Cisco NX-OS: IP filtering bypass with encapsulation
An attacker can encapsulate IP packets in IP packets in order to bypass the IP filtering rules or trigger a denial of service...
FortiClient for Windows: information disclosure via Hard-coded Cryptographic Key
An attacker can bypass access restrictions to data via Hard-coded Cryptographic Key of FortiClient for Windows, in order to obtain sensitive information...
Avast: memory corruption via Array.prototype.toString
An attacker can trigger a memory corruption via Array.prototype.toString of Avast, in order to trigger a denial of service, and possibly to run code...
Perl Core: memory corruption via Regular Expression S_study_chunk
An attacker can trigger a memory corruption via Regular Expression S_study_chunk() of Perl Core, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1027 1028 1029 1030 1031 1032 1033 1034 1035 1037 1039 1040 1041 1042 1043 1044 1045 1046 1047 1049