The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
FreeBSD: information disclosure via ure packet-in-packet
An attacker can bypass access restrictions to data via ure packet-in-packet of FreeBSD, in order to obtain sensitive information...
Node.js renovate: information disclosure via Azure DevOps
An attacker can bypass access restrictions to data via Azure DevOps of Node.js renovate, in order to obtain sensitive information...
Alcatel-Lucent OmniSwitch: overload via SNMP Agent Bulk Data Transfers
An attacker can trigger an overload via SNMP Agent Bulk Data Transfers of Alcatel-Lucent OmniSwitch, in order to trigger a denial of service...
ModSecurity: overload via Regular Expressions Global Matching
An attacker can trigger an overload via Regular Expressions Global Matching of ModSecurity, in order to trigger a denial of service...
Linux kernel: buffer overflow via fbcon_redraw_softback
An attacker can trigger a buffer overflow via fbcon_redraw_softback() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
McAfee Email Gateway: directory traversal via Web Mail User Interface
An attacker can traverse directories via Web Mail User Interface of McAfee Email Gateway, in order to read a file outside the service root path...
VMware Workstation: multiple vulnerabilities
An attacker can use several vulnerabilities of VMware Workstation...
JBossWeb: denial of service via Multiple Invalid Payload Length
An attacker can trigger a fatal error via Multiple Invalid Payload Length of JBossWeb, in order to trigger a denial of service...
Linux kernel: memory corruption via expand_downwards
An attacker can trigger a memory corruption via expand_downwards() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: NULL pointer dereference via mm/hugetlb.c
An attacker can force a NULL pointer to be dereferenced via mm/hugetlb.c of the Linux kernel, in order to trigger a denial of service...
Linux kernel: privilege escalation via Rbd Devices Access
An attacker can bypass restrictions via Rbd Devices Access of the Linux kernel, in order to escalate his privileges...
libproxy: overload via url-recvline
An attacker can trigger an overload via url::recvline() of libproxy, in order to trigger a denial of service...
Bluetooth: Man-in-the-Middle via Cross-Transport Key Derivation
An attacker can act as a Man-in-the-Middle via Cross-Transport Key Derivation on Bluetooth, in order to read or write data in the session...
Python pip: directory traversal via Install Command
An attacker can traverse directories via Install Command of Python pip, in order to alter a file outside the service root path...
Node.js lemonldap-ng-handler: privilege escalation via URL Encodings
An attacker can bypass restrictions via URL Encodings of Node.js lemonldap-ng-handler, in order to escalate his privileges...
Node.js Node Fetch: denial of service via Redirect Size Option
An attacker can trigger a fatal error via Redirect Size Option of Node.js Node Fetch, in order to trigger a denial of service...
Node.js lodash: privilege escalation via Prototype Pollution
An attacker can bypass restrictions via Prototype Pollution of Node.js lodash, in order to escalate his privileges...
Linux kernel: privilege escalation via get_gate_page
An attacker can bypass restrictions via get_gate_page() of the Linux kernel, in order to escalate his privileges...
IBM Spectrum Scale: denial of service via Kernel Module
An attacker can trigger a fatal error via Kernel Module of IBM Spectrum Scale, in order to trigger a denial of service...
IBM Spectrum Scale: denial of service via mmfsd/mmsdrserv
An attacker can trigger a fatal error via mmfsd/mmsdrserv of IBM Spectrum Scale, in order to trigger a denial of service...
Palo Alto PAN-OS: information disclosure via Logged Passwords
An attacker can bypass access restrictions to data via Logged Passwords of Palo Alto PAN-OS, in order to obtain sensitive information...
Palo Alto PAN-OS: information disclosure via Logged Passwords
An attacker can bypass access restrictions to data via Logged Passwords of Palo Alto PAN-OS, in order to obtain sensitive information...
Palo Alto PAN-OS: privilege escalation via Management Web Interface
An attacker can bypass restrictions via Management Web Interface of Palo Alto PAN-OS, in order to escalate his privileges...
Palo Alto PAN-OS: denial of service via Management Web Interface
An attacker can trigger a fatal error via Management Web Interface of Palo Alto PAN-OS, in order to trigger a denial of service...
Palo Alto PAN-OS: buffer overflow via Captive Portal / Multi-Factor Authentication
An attacker can trigger a buffer overflow via Captive Portal / Multi-Factor Authentication of Palo Alto PAN-OS, in order to trigger a denial of service, and possibly to run code...
Palo Alto PAN-OS: denial of service via Unauthenticated File Upload
An attacker can trigger a fatal error via Unauthenticated File Upload of Palo Alto PAN-OS, in order to trigger a denial of service...
Palo Alto PAN-OS: code execution via OS Command Injection
An attacker can use a vulnerability via OS Command Injection of Palo Alto PAN-OS, in order to run code...
Palo Alto PAN-OS: code execution via OS Command Injection
An attacker can use a vulnerability via OS Command Injection of Palo Alto PAN-OS, in order to run code...
Palo Alto PAN-OS: Cross Site Scripting via Management Web Interface
An attacker can trigger a Cross Site Scripting via Management Web Interface of Palo Alto PAN-OS, in order to run JavaScript code in the context of the web site...
Linux kernel: use after free via cgroups no_refcnt
An attacker can force the usage of a freed memory area via cgroups no_refcnt of the Linux kernel, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1058 1059 1060 1061 1062 1063 1064 1065 1066 1068 1070 1071 1072