The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
ROS actionlib: privilege escalation via YAML Python Objects Creation
An attacker can bypass restrictions via YAML Python Objects Creation of ROS actionlib, in order to escalate his privileges...
nDPI: out-of-bounds memory reading via ndpi_search_oracle
An attacker can force a read at an invalid address via ndpi_search_oracle() of nDPI, in order to trigger a denial of service, or to obtain sensitive information...
Bareos Director: buffer overflow
An attacker can trigger a buffer overflow of Bareos Director, in order to trigger a denial of service, and possibly to run code...
Horde Groupware: privilege escalation via File Manager
An attacker can bypass restrictions via File Manager of Horde Groupware, in order to escalate his privileges...
Horde Groupware: Cross Site Scripting via New Resource Name Field
An attacker can trigger a Cross Site Scripting via New Resource Name Field of Horde Groupware, in order to run JavaScript code in the context of the web site...
Cisco IOS XR: memory leak via DVMRP
An attacker can create a memory leak via DVMRP of Cisco IOS XR, in order to trigger a denial of service...
OpenVPN: out-of-bounds memory reading via resolve_remote
An attacker can force a read at an invalid address via resolve_remote() of OpenVPN, in order to trigger a denial of service, or to obtain sensitive information...
Qt: denial of service via QSslSocket
An attacker can trigger a fatal error via QSslSocket of Qt, in order to trigger a denial of service...
IBM Spectrum Protect Server: information disclosure via Object Second Chunk
An attacker can bypass access restrictions to data via Object Second Chunk of IBM Spectrum Protect Server, in order to obtain sensitive information...
IBM Spectrum Protect Server: denial of service
An attacker can trigger a fatal error of IBM Spectrum Protect Server, in order to trigger a denial of service...
openSUSE Leap: privilege escalation via inn
An attacker can bypass restrictions via inn of openSUSE Leap, in order to escalate his privileges...
eZ Publish: file upload
An attacker can upload a malicious file on eZ Publish, in order for example to upload a Trojan...
Cisco Data Center Network Manager: information disclosure
An attacker can bypass access restrictions to data of Cisco Data Center Network Manager, in order to obtain sensitive information...
Mitel MiVoice 6800/6900: information disclosure via Failed Login Attempts
A local attacker can read a memory fragment via Failed Login Attempts of Mitel MiVoice 6800/6900, in order to obtain sensitive information...
WebSphere Application Server ND: Cross Site Scripting via High Availability Deployment Manager
An attacker can trigger a Cross Site Scripting via High Availability Deployment Manager of WebSphere Application Server ND, in order to run JavaScript code in the context of the web site...
Graphviz: NULL pointer dereference via rebuild_vlists
An attacker can force a NULL pointer to be dereferenced via rebuild_vlists() of Graphviz, in order to trigger a denial of service...
Cisco NX-OS: denial of service via BGP MVPN
An attacker can trigger a fatal error via BGP MVPN of Cisco NX-OS, in order to trigger a denial of service...
Cisco NX-OS: denial of service via BGP
An attacker can trigger a fatal error via BGP of Cisco NX-OS, in order to trigger a denial of service...
Cisco NX-OS: denial of service via PIM6
An attacker can trigger a fatal error via PIM6 of Cisco NX-OS, in order to trigger a denial of service...
Cisco NX-OS: privilege escalation via DME
An attacker can bypass restrictions via DME of Cisco NX-OS, in order to escalate his privileges...
Cisco Nexus 3000/9000: privilege escalation via Enable Secret
An attacker can bypass restrictions via Enable Secret of Cisco Nexus 3000/9000, in order to escalate his privileges...
Cisco NX-OS: denial of service via Cisco Fabric Services Messages
An attacker can trigger a fatal error via Cisco Fabric Services Messages of Cisco NX-OS, in order to trigger a denial of service...
Cisco NX-OS: privilege escalation via Call Home
An attacker can bypass restrictions via Call Home of Cisco NX-OS, in order to escalate his privileges...
Cisco UCS Manager Software: denial of service via CLI
An attacker can trigger a fatal error via CLI of Cisco UCS Manager Software, in order to trigger a denial of service...
libmysofa: five vulnerabilities
An attacker can use several vulnerabilities of libmysofa...
Lua: memory corruption via ldebug.c
An attacker can trigger a memory corruption via ldebug.c of Lua, in order to trigger a denial of service, and possibly to run code...
Joomla Core: three vulnerabilities
An attacker can use several vulnerabilities of Joomla Core...
Google Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
McAfee Application and Change Control: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of McAfee Application and Change Control, in order to run JavaScript code in the context of the web site...
Sonatype Nexus Repository Manager: information disclosure via S3 Secret Key
An attacker can bypass access restrictions to data via S3 Secret Key of Sonatype Nexus Repository Manager, in order to obtain sensitive information...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1054 1055 1056 1057 1058 1059 1060 1061 1062 1064 1066 1067 1068 1069 1070