The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Linux kernel: memory corruption via af_packet.c
An attacker can trigger a memory corruption via af_packet.c of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Node.js bestzip: code execution via Command Injection
An attacker can use a vulnerability via Command Injection of Node.js bestzip, in order to run code...
IBM API Connect: privilege escalation via API Manager
An attacker can bypass restrictions via API Manager of IBM API Connect, in order to escalate his privileges...
IBM API Connect: information disclosure via Registration Emails Phishing Attacks
An attacker can bypass access restrictions to data via Registration Emails Phishing Attacks of IBM API Connect, in order to obtain sensitive information...
FreeBSD: buffer overflow via Dhclient Option 119
An attacker can trigger a buffer overflow via Dhclient Option 119 of FreeBSD, in order to trigger a denial of service, and possibly to run code...
FreeBSD: use after free via Loopback IPv6 Hop-by-Hop Options
An attacker can force the usage of a freed memory area via Loopback IPv6 Hop-by-Hop Options of FreeBSD, in order to trigger a denial of service, and possibly to run code...
FreeBSD: use after free via SCTP Socket
An attacker can force the usage of a freed memory area via SCTP Socket of FreeBSD, in order to trigger a denial of service, and possibly to run code...
asyncpg: memory corruption via PostgreSQL Server Response
An attacker can trigger a memory corruption via PostgreSQL Server Response of asyncpg, in order to trigger a denial of service, and possibly to run code...
Linux kernel: denial of service via do_split
An attacker can trigger a fatal error via do_split() of the Linux kernel, in order to trigger a denial of service...
Cisco IOS XR: privilege escalation via CLI Task Group Assignment
An attacker can bypass restrictions via CLI Task Group Assignment of Cisco IOS XR, in order to escalate his privileges...
Cisco IOS XR: privilege escalation via CLI Task Group Assignment
An attacker can bypass restrictions via CLI Task Group Assignment of Cisco IOS XR, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1056 1057 1058 1059 1060 1061 1062 1063 1064 1066 1068 1069 1070