The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Linux kernel: information disclosure via SSBD Shutdown
An attacker can bypass access restrictions to data via SSBD Shutdown of the Linux kernel, in order to obtain sensitive information...
Dell EMC Unisphere for PowerMax: privilege escalation via Database Statistics
An attacker can bypass restrictions via Database Statistics of Dell EMC Unisphere for PowerMax, in order to escalate his privileges...
Dell EMC Unisphere for PowerMax: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on Dell EMC Unisphere for PowerMax, in order to read or write data in the session...
Node.js sap-cloud-sdk/core: privilege escalation via verifyJwt
An attacker can bypass restrictions via verifyJwt() of Node.js sap-cloud-sdk/core, in order to escalate his privileges...
Linux kernel: use after free via Video Driver
An attacker can force the usage of a freed memory area via Video Driver of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
GEGL: buffer overflow via process
An attacker can trigger a buffer overflow via process() of GEGL, in order to trigger a denial of service, and possibly to run code...
Gnuplot: memory corruption via load_tic_series
An attacker can trigger a memory corruption via load_tic_series() of Gnuplot, in order to trigger a denial of service, and possibly to run code...
Mozilla NSS: information disclosure via MPI Modular Inversion
An attacker can bypass access restrictions to data via MPI Modular Inversion of Mozilla NSS, in order to obtain sensitive information...
adns: multiple vulnerabilities
An attacker can use several vulnerabilities of adns...
GNOME glib-networking: Man-in-the-Middle via GTlsClientConnection
An attacker can act as a Man-in-the-Middle via GTlsClientConnection on GNOME glib-networking, in order to read or write data in the session...
Drupal Internationalization: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Internationalization, in order to run JavaScript code in the context of the web site...
Drupal Core: privilege escalation via JSON-API PATCH Requests
An attacker can bypass restrictions via JSON:API PATCH Requests of Drupal Core, in order to escalate his privileges...
Drupal Core: code execution via named directory
An attacker can use a vulnerability via named directory of Drupal Core, in order to run code...
Drupal Core: Cross Site Request Forgery via Form API
An attacker can trigger a Cross Site Request Forgery via Form API of Drupal Core, in order to force the victim to perform operations...
Linux kernel: denial of service via Zram Sysfs
An attacker can trigger a fatal error via Zram Sysfs of the Linux kernel, in order to trigger a denial of service...
BIND: denial of service via Asterisk Empty Non-terminal
An attacker can trigger a fatal error via Asterisk Empty Non-terminal of BIND, in order to trigger a denial of service...
BIND: assertion error via Large Zone Transfer
An attacker can force an assertion error via Large Zone Transfer of BIND, in order to trigger a denial of service...
Cisco IOS XR: privilege escalation via ACL Bypass
An attacker can bypass restrictions via ACL Bypass of Cisco IOS XR, in order to escalate his privileges...
Cisco UCS Director: directory traversal
An attacker can traverse directories of Cisco UCS Director, in order to read a file outside the service root path...
Cisco UCS Director: information disclosure
An attacker can bypass access restrictions to data of Cisco UCS Director, in order to obtain sensitive information...
Cisco IP Phone: information disclosure via Call Log
An attacker can bypass access restrictions to data via Call Log of Cisco IP Phone, in order to obtain sensitive information...
Cisco Email Security Appliance: privilege escalation via URL Filtering Bypass
An attacker can bypass restrictions via URL Filtering Bypass of Cisco Email Security Appliance, in order to escalate his privileges...
Cisco Data Center Network Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Data Center Network Manager, in order to run JavaScript code in the context of the web site...
Cisco Data Center Network Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Data Center Network Manager, in order to run JavaScript code in the context of the web site...
Cisco Data Center Network Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Data Center Network Manager, in order to run JavaScript code in the context of the web site...
Cisco ASR 5000: privilege escalation via Enhanced Charging Service
An attacker can bypass restrictions via Enhanced Charging Service of Cisco ASR 5000, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1033 1034 1035 1036 1037 1038 1039 1040 1041 1043 1045 1046 1047 1048 1049 1050