The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Check Point ZoneAlarm Extreme Security: two vulnerabilities
An attacker can use several vulnerabilities of Check Point ZoneAlarm Extreme Security...
Check Point Security Management: vulnerability via NGM App
A vulnerability via NGM App of Check Point Security Management was announced...
Check Point Endpoint Security Client: vulnerability via Caspule Docs Installation
A vulnerability via Caspule Docs Installation of Check Point Endpoint Security Client was announced...
Pacemaker: privilege escalation via CIB IPC
An attacker can bypass restrictions via CIB IPC of Pacemaker, in order to escalate his privileges...
Rails: denial of service via Pending Migrations
An attacker can trigger a fatal error via Pending Migrations of Rails, in order to trigger a denial of service...
RubyGem Puma: denial of service via Keepalive Requests
An attacker can trigger a fatal error via Keepalive Requests of RubyGem Puma, in order to trigger a denial of service...
atftp: assertion error via RRQ-Multicast Requests
An attacker can force an assertion error via RRQ-Multicast Requests of atftp, in order to trigger a denial of service...
KPMcore: vulnerability
A vulnerability of KPMcore was announced...
Artifex MuPDF: buffer overflow via JBIG2
An attacker can trigger a buffer overflow via JBIG2 of Artifex MuPDF, in order to trigger a denial of service, and possibly to run code...
Apache Ant: information disclosure via Fixcrlf Task Temporary Files Permissions
An attacker can bypass access restrictions to data via Fixcrlf Task Temporary Files Permissions of Apache Ant, in order to obtain sensitive information...
Fedora: denial of service via Suricata Configuration File
An attacker can trigger a fatal error via Suricata Configuration File of Fedora, in order to trigger a denial of service...
Singularity: directory traversal via SIF/SquashFS images
An attacker can traverse directories via SIF/SquashFS images of Singularity, in order to create a file outside the service root path...
fastd: denial of service via Invalid Packets Type Code
An attacker can trigger a fatal error via Invalid Packets Type Code of fastd, in order to trigger a denial of service...
Elasticsearch: information disclosure via Document/Field Level Security
An attacker can bypass access restrictions to data via Document/Field Level Security of Elasticsearch, in order to obtain sensitive information...
Eclipse Jetty: privilege escalation via Temporary Directory Race
An attacker can bypass restrictions via Temporary Directory Race of Eclipse Jetty, in order to escalate his privileges...
Cisco ASA Software: denial of service via SSL/TLS Handler
An attacker can trigger a fatal error via SSL/TLS Handler of Cisco ASA Software, in order to trigger a denial of service...
Apache mod_auth_mellon: information disclosure via Cross-Site Session Transfer
An attacker can bypass access restrictions to data via Cross-Site Session Transfer of Apache mod_auth_mellon, in order to obtain sensitive information...
Cisco ASA Software: Cross Site Scripting via Web Services
An attacker can trigger a Cross Site Scripting via Web Services of Cisco ASA Software, in order to run JavaScript code in the context of the web site...
Cisco ASA Software: denial of service via HTTP Requests
An attacker can trigger a fatal error via HTTP Requests of Cisco ASA Software, in order to trigger a denial of service...
Cisco ASA Software: denial of service via SSL VPN Direct Memory Access
An attacker can trigger a fatal error via SSL VPN Direct Memory Access of Cisco ASA Software, in order to trigger a denial of service...
Cisco ASA Software: denial of service via SIP
An attacker can trigger a fatal error via SIP of Cisco ASA Software, in order to trigger a denial of service...
Cisco ASA Software: privilege escalation via WebVPN Portal Access Rule Bypass
An attacker can bypass restrictions via WebVPN Portal Access Rule Bypass of Cisco ASA Software, in order to escalate his privileges...
Cisco ASA Software: denial of service via OSPFv2 Link-Local Signaling
An attacker can trigger a fatal error via OSPFv2 Link-Local Signaling of Cisco ASA Software, in order to trigger a denial of service...
Cisco ASA Software: read-write access via FTP Inspection Engine Bypass
An attacker can bypass access restrictions via FTP Inspection Engine Bypass of Cisco ASA Software, in order to read or alter data...
Cisco ASA Software: memory leak via IP Fragment
An attacker can create a memory leak via IP Fragment of Cisco ASA Software, in order to trigger a denial of service...
Cisco ASA Software: denial of service via File Upload
An attacker can trigger a fatal error via File Upload of Cisco ASA Software, in order to trigger a denial of service...
Cisco ASA Software: memory leak via TCP Packet
An attacker can create a memory leak via TCP Packet of Cisco ASA Software, in order to trigger a denial of service...
Cisco ASA Software: Cross Site Scripting via Web-Based Management Interface
An attacker can trigger a Cross Site Scripting via Web-Based Management Interface of Cisco ASA Software, in order to run JavaScript code in the context of the web site...
Cisco ASA Software: denial of service via SSL/TLS Session
An attacker can trigger a fatal error via SSL/TLS Session of Cisco ASA Software, in order to trigger a denial of service...
Cisco ASA Software: read-write access via WebVPN HTTP Headers Injection
An attacker can bypass access restrictions via WebVPN HTTP Headers Injection of Cisco ASA Software, in order to read or alter data...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1070 1071 1072 1073 1074 1075 1076 1077 1078 1080 1082 1083 1084 1085 1086 1087 1088 1089 1090