The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
ClusterLabs crmsh: code execution via Crm History
An attacker can use a vulnerability via Crm History of ClusterLabs crmsh, in order to run code...
ClusterLabs Hawk: code execution via hawk_remember_me_id
An attacker can use a vulnerability via hawk_remember_me_id of ClusterLabs Hawk, in order to run code...
Joomla: three vulnerabilities
An attacker can use several vulnerabilities of Joomla...
Centreon Web: multiple vulnerabilities
An attacker can use several vulnerabilities of Centreon Web...
SAP: multiple vulnerabilities of January 2021
An attacker can use several vulnerabilities of SAP products...
Cacti: SQL injection via data_debug.php
An attacker can use a SQL injection via data_debug.php of Cacti, in order to read or alter data...
NVIDIA GPU Display Driver: multiple vulnerabilities
An attacker can use several vulnerabilities of NVIDIA GPU Display Driver...
Linux kernel: denial of service via Iptables String Match
An attacker can trigger a fatal error via Iptables String Match of the Linux kernel, in order to trigger a denial of service...
Kubernetes Java Client: directory traversal via Pods Copy
An attacker can traverse directories via Pods Copy of Kubernetes Java Client, in order to read a file outside the service root path...
IBM API Connect: Cross Site Scripting via Web UI
An attacker can trigger a Cross Site Scripting via Web UI of IBM API Connect, in order to run JavaScript code in the context of the web site...
Sudo: multiple vulnerabilities
An attacker can use several vulnerabilities of Sudo...
coTURN: information disclosure via Loopback Addresses
An attacker can bypass access restrictions to data via Loopback Addresses of coTURN, in order to obtain sensitive information...
IBM MQ Appliance: denial of service via SNMP Query
An attacker can trigger a fatal error via SNMP Query of IBM MQ Appliance, in order to trigger a denial of service...
Linux kernel: use after free via IB/hfi1
An attacker can force the usage of a freed memory area via IB/hfi1 of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
IBM Spectrum Protect Plus: multiple vulnerabilities
An attacker can use several vulnerabilities of IBM Spectrum Protect Plus...
OpenJPEG: integer overflow via opj_t1_encode_cblks
An attacker can trigger an integer overflow via opj_t1_encode_cblks() of OpenJPEG, in order to trigger a denial of service, and possibly to run code...
Node.js urijs: spoofing via URL Backslashes
An attacker can create spoofed data via URL Backslashes of Node.js urijs, in order to deceive the victim...
PHP: spoofing via Url User Information
An attacker can create spoofed data via Url User Information of PHP, in order to deceive the victim...
Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Chrome...
EM-HTTP-Request: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on EM-HTTP-Request, in order to read or write data in the session...
binutils: NULL pointer dereference via bfd_pef_scan_start_address
An attacker can force a NULL pointer to be dereferenced via bfd_pef_scan_start_address() of binutils, in order to trigger a denial of service...
binutils: NULL pointer dereference via bfd_pef_parse_symbols
An attacker can force a NULL pointer to be dereferenced via bfd_pef_parse_symbols() of binutils, in order to trigger a denial of service...
binutils: information disclosure via tic4x_print_cond
A local attacker can read a memory fragment via tic4x_print_cond() of binutils, in order to obtain sensitive information...
binutils: buffer overflow via bfd_pef_parse_function_stub
An attacker can trigger a buffer overflow via bfd_pef_parse_function_stub() of binutils, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1090 1091 1092 1093 1094 1095 1096 1097 1098 1100 1102 1103 1104