The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
F5 BIG-IP APM/Edge: privilege escalation via Edge Client
An attacker can bypass restrictions via Edge Client of F5 BIG-IP APM/Edge, in order to escalate his privileges...
IBM DB2: executing DLL code
An attacker can create a malicious DLL, and then put it in the current directory of IBM DB2, in order to execute code...
Go: code execution via Argument Injection
An attacker can use a vulnerability via Argument Injection of Go, in order to run code...
Go: code execution via Code Injection
An attacker can use a vulnerability via Code Injection of Go, in order to run code...
Go: denial of service
An attacker can trigger a fatal error of Go, in order to trigger a denial of service...
Perl DBI: file reading via F_dir Attribute
A local attacker can read a file via F_dir Attribute of Perl DBI, in order to obtain sensitive information...
Linux kernel: out-of-bounds memory reading via fbcon_get_font
An attacker can force a read at an invalid address via fbcon_get_font() of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information...
Linux kernel: NULL pointer dereference via spk_ttyio_ldisc_close
An attacker can force a NULL pointer to be dereferenced via spk_ttyio_ldisc_close of the Linux kernel, in order to trigger a denial of service...
IBM DB2: buffer overflow
An attacker can trigger a buffer overflow of IBM DB2, in order to trigger a denial of service, and possibly to run code...
F5 BIG-IP Virtual Server: information disclosure via TCP Sequence Numbers Reuse
An attacker can bypass access restrictions to data via TCP Sequence Numbers Reuse of F5 BIG-IP Virtual Server, in order to obtain sensitive information...
Drupal Media oEmbed: file upload
An attacker can upload a malicious file on Drupal Media oEmbed, in order for example to upload a Trojan...
Drupal Ink Filepicker: vulnerability
A vulnerability of Drupal Ink Filepicker was announced...
Drupal Core: file upload
An attacker can upload a malicious file on Drupal Core, in order for example to upload a Trojan...
Drupal Examples for Developers: code execution
An attacker can use a vulnerability of Drupal Examples for Developers, in order to run code...
Drupal SAML SP 2.0 Single Sign On: privilege escalation
An attacker can bypass restrictions of Drupal SAML SP 2.0 Single Sign On, in order to escalate his privileges...
Skia: information disclosure via Timing Side-channel drawImage
An attacker can bypass access restrictions to data via Timing Side-channel drawImage() of Skia, in order to obtain sensitive information...
Cisco Secure Web Appliance: privilege escalation via Log Subscription Subsystem
An attacker can bypass restrictions via Log Subscription Subsystem of Cisco Secure Web Appliance, in order to escalate his privileges...
Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Chrome...
Trend Micro OfficeScan XG: multiple vulnerabilities
An attacker can use several vulnerabilities of Trend Micro OfficeScan XG...
TYPO3 Authenticator: denial of service
An attacker can trigger a fatal error of TYPO3 Authenticator, in order to trigger a denial of service...
TYPO3 View Frontend Statistics: information disclosure
An attacker can bypass access restrictions to data of TYPO3 View Frontend Statistics, in order to obtain sensitive information...
Ceph: privilege escalation via Cephx Authorizer Replay
An attacker can bypass restrictions via Cephx Authorizer Replay of Ceph, in order to escalate his privileges...
Firefox/Thunderbird: multiple vulnerabilities
An attacker can use several vulnerabilities of Firefox/Thunderbird...
OpenLDAP: assertion error via CSN Normalization
An attacker can force an assertion error via CSN Normalization of OpenLDAP, in order to trigger a denial of service...
OpenLDAP: assertion error via Certificate List Syntax
An attacker can force an assertion error via Certificate List Syntax of OpenLDAP, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1078 1079 1080 1081 1082 1083 1084 1085 1086 1088 1090 1091 1092 1093 1094 1095 1096 1097 1098 1101 1121 1141 1149