The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Drupal Core: Cross Site Scripting via CKEditor Image Caption
An attacker can trigger a Cross Site Scripting via CKEditor Image Caption of Drupal Core, in order to run JavaScript code in the context of the web site...
Drupal Core: Cross Site Scripting via Forms
An attacker can trigger a Cross Site Scripting via Forms of Drupal Core, in order to run JavaScript code in the context of the web site...
Drupal Core: privilege escalation via Workspaces Module
An attacker can bypass restrictions via Workspaces Module of Drupal Core, in order to escalate his privileges...
Drupal Core: Cross Site Scripting via AJAX API JSONP
An attacker can trigger a Cross Site Scripting via AJAX API JSONP of Drupal Core, in order to run JavaScript code in the context of the web site...
Apple iOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple iOS...
Perl DBI: directory traversal via DBD-File
An attacker can traverse directories via DBD::File of Perl DBI, in order to read a file outside the service root path...
Perl DBI: memory corruption via Callbacks Arguments
An attacker can trigger a memory corruption via Callbacks Arguments of Perl DBI, in order to trigger a denial of service, and possibly to run code...
QEMU: memory corruption via hw/sd/sdhci.c
An attacker, inside a guest system, can trigger a memory corruption via hw/sd/sdhci.c of QEMU, in order to trigger a denial of service, and possibly to run code on the host system...
QEMU: use after free via hw/usb/hcd-ehci.c
An attacker, inside a guest system, can force the usage of a freed memory area via hw/usb/hcd-ehci.c of QEMU, in order to trigger a denial of service, and possibly to run code on the host system...
Trusted Firmware Mbed TLS: information disclosure via mbedtls_ssl_decrypt_buf
An attacker can bypass access restrictions to data via mbedtls_ssl_decrypt_buf() of Trusted Firmware Mbed TLS, in order to obtain sensitive information...
Linux kernel: out-of-bounds memory reading via vgacon_scrolldelta
An attacker can force a read at an invalid address via vgacon_scrolldelta() of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information...
Jenkins Plugins: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins Plugins...
Perl-DBI: buffer overflow via 300 Characters
An attacker can trigger a buffer overflow via 300 Characters of Perl-DBI, in order to trigger a denial of service, and possibly to run code...
Perl-DBI: memory corruption via dbd_db_login6_sv
An attacker can trigger a memory corruption via dbd_db_login6_sv() of Perl-DBI, in order to trigger a denial of service, and possibly to run code...
Microsoft Windows, Samba: privilege escalation via Active Directory Domain Services Zerologon
An attacker can bypass restrictions via Zerologon of Microsoft Windows with Active Directory Domain Services, of Samba without "server schannel" in order to escalate his privileges...
Node Core: overload via Unfinished HTTP/1.1 Requests
An attacker can trigger an overload via Unfinished HTTP/1.1 Requests of Node Core, in order to trigger a denial of service...
Node Core: information disclosure via CR-to-Hyphen HTTP Request Smuggling
An attacker can bypass access restrictions to data via CR-to-Hyphen HTTP Request Smuggling of Node Core, in order to obtain sensitive information...
Node Core: buffer overflow via fs.realpath.native
An attacker can trigger a buffer overflow via fs.realpath.native of Node Core, in order to trigger a denial of service, and possibly to run code...
Synology DSM Photo Station: multiple vulnerabilities
An attacker can use several vulnerabilities of Synology DSM Photo Station...
Trend Micro ServerProtect for Linux: privilege escalation via Command Injection
An attacker can bypass restrictions via Command Injection of Trend Micro ServerProtect for Linux, in order to escalate his privileges...
Linux kernel: information disclosure via mlx4_en_get_module_eeprom
A local attacker can read a memory fragment via mlx4_en_get_module_eeprom() of the Linux kernel, in order to obtain sensitive information...
IBM Spectrum Protect Plus: two vulnerabilities
An attacker can use several vulnerabilities of IBM Spectrum Protect Plus...
FreeBSD: privilege escalation via ftpd ftpchroot
An attacker, with a user account on the ftp service, can bypass restrictions via ftpd ftpchroot of FreeBSD, in order to escalate his privileges...
FreeBSD: privilege escalation via Bhyve SVM Guest Escape
An attacker can bypass restrictions via Bhyve SVM Guest Escape of FreeBSD, in order to escalate his privileges...
FreeBSD: privilege escalation via Bhyve VMCS Access
An attacker can bypass restrictions via Bhyve VMCS Access of FreeBSD, in order to escalate his privileges...
FreeBSD: information disclosure via ure packet-in-packet
An attacker can bypass access restrictions to data via ure packet-in-packet of FreeBSD, in order to obtain sensitive information...
Node.js renovate: information disclosure via Azure DevOps
An attacker can bypass access restrictions to data via Azure DevOps of Node.js renovate, in order to obtain sensitive information...
Alcatel-Lucent OmniSwitch: overload via SNMP Agent Bulk Data Transfers
An attacker can trigger an overload via SNMP Agent Bulk Data Transfers of Alcatel-Lucent OmniSwitch, in order to trigger a denial of service...
ModSecurity: overload via Regular Expressions Global Matching
An attacker can trigger an overload via Regular Expressions Global Matching of ModSecurity, in order to trigger a denial of service...
Linux kernel: buffer overflow via fbcon_redraw_softback
An attacker can trigger a buffer overflow via fbcon_redraw_softback() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1059 1060 1061 1062 1063 1064 1065 1066 1067 1069 1071 1072 1073 1074 1075 1076 1077 1078 1079 1081 1082