The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
GRUB2: code execution via Unsigned Kernels Loading Without Shim
An attacker can use a vulnerability via Unsigned Kernels Loading Without Shim of GRUB2, in order to run code...
GRUB2: integer overflow via grub_ext2_read_link
An attacker can trigger an integer overflow via grub_ext2_read_link() of GRUB2, in order to trigger a denial of service, and possibly to run code...
GRUB2: integer overflow via read_section_from_string
An attacker can trigger an integer overflow via read_section_from_string() of GRUB2, in order to trigger a denial of service, and possibly to run code...
GRUB2: buffer overflow via grub_squash_read_symlink
An attacker can trigger a buffer overflow via grub_squash_read_symlink() of GRUB2, in order to trigger a denial of service, and possibly to run code...
GRUB2: buffer overflow via grub_malloc
An attacker can trigger a buffer overflow via grub_malloc() of GRUB2, in order to trigger a denial of service, and possibly to run code...
GRUB2: buffer overflow via grub.cfg, BootHole
An attacker can trigger a buffer overflow via grub.cfg of GRUB2, in order to trigger a denial of service, and possibly to run code...
TYPO3 Kitodo.Presentation: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of TYPO3 Kitodo.Presentation, in order to run JavaScript code in the context of the web site...
TeamViewer: vulnerability via URI Handling
A vulnerability via URI Handling of TeamViewer was announced...
IBM Informix Server: privilege escalation via bts_tracefile
An attacker can bypass restrictions via bts_tracefile of IBM Informix Server, in order to escalate his privileges...
IBM MQ: buffer overflow via Channel Processing
An attacker can trigger a buffer overflow via Channel Processing of IBM MQ, in order to trigger a denial of service, and possibly to run code...
IBM MQ: memory leak via Dynamic Queue Error
An attacker can create a memory leak via Dynamic Queue Error of IBM MQ, in order to trigger a denial of service...
IBM MQ Appliance: information disclosure via Pre-v7 Pubsub Logic Error Message
An attacker can bypass access restrictions to data via Pre-v7 Pubsub Logic Error Message of IBM MQ Appliance, in order to obtain sensitive information...
IBM MQ Appliance: information disclosure via Trace File
An attacker can bypass access restrictions to data via Trace File of IBM MQ Appliance, in order to obtain sensitive information...
LuaJit: out-of-bounds memory reading via Frame Traversal
An attacker can force a read at an invalid address via Frame Traversal of LuaJit, in order to trigger a denial of service, or to obtain sensitive information...
Magento Commerce/OpenSource: four vulnerabilities
An attacker can use several vulnerabilities of Magento Commerce/OpenSource...
Node.js scratch-vm: code execution via Extension URLs
An attacker can use a vulnerability via Extension URLs of Node.js scratch-vm, in order to run code...
TYPO3 Core 6, TYPO Mediace Extension: privilege escalation via HMAC-SHA1
An attacker can bypass restrictions via HMAC-SHA1 of TYPO3 Core 6 or the Mediace extension, in order to escalate his privileges...
TYPO3 Core: information disclosure via Backend User Interface
An attacker can bypass access restrictions to data via Backend User Interface of TYPO3 Core, in order to obtain sensitive information...
TYPO3 Core: privilege escalation via HMAC-SHA1
An attacker can bypass restrictions via HMAC-SHA1 of TYPO3 Core, in order to escalate his privileges...
PostgreSQL JDBC: external XML entity injection
An attacker can transmit malicious XML data to PostgreSQL JDBC, in order to read a file, scan sites, or trigger a denial of service...
Google Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
Dell EMC OpenManage Server Administrator: directory traversal
An attacker can traverse directories of Dell EMC OpenManage Server Administrator, in order to read/write a file outside the service root path...
IBM MQ Appliance: information disclosure via Trace Files
An attacker can bypass access restrictions to data via Trace Files of IBM MQ Appliance, in order to obtain sensitive information...
Pulse Connect Secure: multiple vulnerabilities
An attacker can use several vulnerabilities of Pulse Connect Secure...
Grafana: Cross Site Scripting via Snapshot Original Dashboard Link
An attacker can trigger a Cross Site Scripting via Snapshot Original Dashboard Link of Grafana, in order to run JavaScript code in the context of the web site...
Linux kernel: buffer overflow via vgacon_scrollback_update
An attacker can trigger a buffer overflow via vgacon_scrollback_update() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Mozilla Firefox/Thunderbird: multiple vulnerabilities
An attacker can use several vulnerabilities of Mozilla Firefox/Thunderbird...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1046 1047 1048 1049 1050 1051 1052 1053 1054 1056 1058 1059 1060