The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Chrome...
Ansible Core: information disclosure via no_log Content Parameter
An attacker can bypass access restrictions to data via no_log Content Parameter of Ansible Core, in order to obtain sensitive information...
Ansible Core: information disclosure via no_log Response Keys
An attacker can bypass access restrictions to data via no_log Response Keys of Ansible Core, in order to obtain sensitive information...
Go: overload via ReadUvarint
An attacker can trigger an overload via ReadUvarint() of Go, in order to trigger a denial of service...
Eclipse OpenJ9: denial of service via System.arraycopy
An attacker can trigger a fatal error via System.arraycopy() of Eclipse OpenJ9, in order to trigger a denial of service...
QEMU: assertion error via net_tx_pkt_add_raw_fragment
An attacker, inside a guest system, can force an assertion error via net_tx_pkt_add_raw_fragment() of QEMU, in order to trigger a denial of service on the host system...
Ruby Kramdown: code execution via template option
An attacker can use a vulnerability via template option of Ruby Kramdown, in order to run code...
Sophos XG Firewall: code execution via User Portal
An attacker can use a vulnerability via User Portal of Sophos XG Firewall, in order to run code...
Apache httpd: denial of service via mod_http2 Push Diary Trace/Tebug
An attacker can trigger a fatal error via mod_http2 Push Diary Trace/Tebug of Apache httpd, in order to trigger a denial of service...
Apache httpd: buffer overflow via mod_proxy_uwsgi
An attacker can trigger a buffer overflow via mod_proxy_uwsgi of Apache httpd, in order to trigger a denial of service, and possibly to run code...
Apache httpd: IP Address Spoofing via mod_remoteip/mod_rewrite
An attacker can spoof an IP address via mod_remoteip/mod_rewrite of Apache httpd, in order to deceive the victim...
Apache httpd: memory corruption via mod_http2 Push Diary Cache-Digest
An attacker can trigger a memory corruption via mod_http2 Push Diary Cache-Digest of Apache httpd, in order to trigger a denial of service, and possibly to run code...
radare2: code execution via PDB File Names
An attacker can use a vulnerability via PDB File Names of radare2, in order to run code...
Firejail: code execution via Output Concatenation
An attacker can use a vulnerability via Output Concatenation of Firejail, in order to run code...
Firejail: code execution via End-of-options Separator Bypass
An attacker can use a vulnerability via End-of-options Separator Bypass of Firejail, in order to run code...
PHP: use after free via phar_parse_zipfile
An attacker can force the usage of a freed memory area via phar_parse_zipfile() of PHP, in order to trigger a denial of service, and possibly to run code...
FreeBSD: privilege escalation via sendmsg
An attacker can bypass restrictions via sendmsg() of FreeBSD, in order to escalate his privileges...
FreeBSD: memory corruption via USB Network Device Drivers
An attacker can trigger a memory corruption via USB Network Device Drivers of FreeBSD, in order to trigger a denial of service, and possibly to run code...
Drupal Group: information disclosure
An attacker can bypass access restrictions to data of Drupal Group, in order to obtain sensitive information...
Cisco UCS Director: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco UCS Director, in order to run JavaScript code in the context of the web site...
Cisco ESA/SMA: information disclosure via CLI
An attacker can bypass access restrictions to data via CLI of Cisco ESA/SMA, in order to obtain sensitive information...
Cisco Unified Communications Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Unified Communications Manager, in order to run JavaScript code in the context of the web site...
Cisco Unified Communications: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Unified Communications, in order to run JavaScript code in the context of the web site...
Cisco IOS XR: denial of service via BGP
An attacker can trigger a fatal error via BGP of Cisco IOS XR, in order to trigger a denial of service...
Cisco ASR 5000: denial of service via IPv6
An attacker can send malicious IPv6 packets to Cisco ASR 5000, in order to trigger a denial of service...
Cisco ASR 5000: denial of service via IPv6
An attacker can send malicious IPv6 packets to Cisco ASR 5000, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1049 1050 1051 1052 1053 1054 1055 1056 1057 1059 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070