The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Contao: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Contao, in order to run JavaScript code in the context of the web site...
Podman: privilege escalation via mounting
An attacker can bypass file permissions by mounting them with Podman, in order to escalate his privileges...
Check Point ZoneAlarm Anti-Ransomware: privilege escalation
An attacker can bypass restrictions of Check Point ZoneAlarm Anti-Ransomware, in order to escalate his privileges...
Wireshark: denial of service via the BLIP parser
An attacker can trigger a fatal error via the BLIP parser of Wireshark, in order to trigger a denial of service...
Wireshark: denial of service via TCP
An attacker can trigger a fatal error of Wireshark via TCP, in order to trigger a denial of service...
Wireshark: denial of service via the MIME parser
An attacker can trigger a fatal error via the MIME parser of Wireshark, in order to trigger a denial of service...
Fortinet FortiGate: IP flow hifing
An attacker can hide his atctivity, using an IP address owed by Fortinet FortiGate...
Pulse Secure Connect Secure: external XML entity injection
An attacker can transmit malicious XML data to Pulse Secure Connect Secure, in order to read a file, scan sites, or trigger a denial of service...
Pulse Secure Connect Secure: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Pulse Secure Connect Secure, in order to run JavaScript code in the context of the web site...
Pulse Secure Connect Secure: file upload
An attacker can upload a malicious file on Pulse Secure Connect Secure, in order for example to upload a Trojan...
mount.cifs: shell command execution
An attacker can use a vulnerability of mount.cifs, in order to run code...
Jenkins Plugins: seven vulnerabilities
An attacker can use several vulnerabilities of Jenkins Plugins...
Trend Micro Internet Security: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on Trend Micro Internet Security, in order to read or write data in the session...
Cisco AnyConnect Secure Mobility Client for Android: denial of service
An attacker can trigger a fatal error of Cisco AnyConnect Secure Mobility Client for Android, in order to trigger a denial of service...
Cisco Unity: directory traversal
An attacker can traverse directories of Cisco Unity, in order to read a file outside the service root path...
SUSE LE 15 openldap: vulnerability
A vulnerability of SUSE LE 15 openldap was announced...
Xen: denial of service
An attacker, inside a guest system, can trigger a fatal error of Xen, in order to trigger a denial of service on the host system...
Xen: privilege escalation via evtchn_reset
An attacker, inside a guest system, can bypass restrictions via evtchn_reset() of Xen, in order to escalate his privileges on the host system...
Xen: denial of service via channel limits
An attacker, inside a guest 32 bits system, can trigger a memory corruption via the channel limits in Xen, in order to trigger a denial of service on the host system...
Xen: denial of service via the synchronization of memory access
An attacker, inside a guest system, can trigger a fatal error in the synchronization of memory access in Xen, in order to trigger a denial of service on the host system...
Xen: denial of service via SYSENTER
An attacker can trigger a fatal error via SYSENTER of Xen, in order to trigger a denial of service...
Xen: denial of service via channels
An attacker, inside a guest system, can trigger a fatal error via channel reset in Xen, in order to trigger a denial of service on the host system...
Xen: denial of service via PCI
An attacker, inside a guest system, can trigger a fatal error via PCI of Xen, in order to trigger a denial of service on the host system...
Xen: denial of service via timers
An attacker, inside a guest system, can trigger a fatal error via Xen timers, in order to trigger a denial of service on the host system...
Xen: denial of service via XENMEM_acquire_resource
An attacker, inside a guest system, can trigger a livelock via XENMEM_acquire_resource of Xen, in order to trigger a denial of service on the host system...
Xen: denial of service via MSR_MISC_ENABLE
An attacker, inside a guest system, can trigger a fatal error via MSR_MISC_ENABLE of Xen, in order to trigger a denial of service on the host system...
Mozilla Firefox/Thunderbird: six vulnerabilities
An attacker can use several vulnerabilities of Mozilla Firefox/Thunderbird...
Perl DBI: NULL pointer dereference via dbi_profile
An attacker can force a NULL pointer to be dereferenced via dbi_profile() of Perl DBI, in order to trigger a denial of service...
Firefox for Android: code execution via SSDP
An attacker can use a vulnerability via SSDP of Firefox for Android, in order to run code...
Fortinet FortiAnalyzer: Cross Site Scripting via Storage Connectors
An attacker can trigger a Cross Site Scripting via Storage Connectors of Fortinet FortiAnalyzer, in order to run JavaScript code in the context of the web site...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1062 1063 1064 1065 1066 1067 1068 1069 1071 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082