The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Node.js nwmatcher: denial of service via Regular Expression
An attacker can trigger a fatal error via Regular Expression of Node.js nwmatcher, in order to trigger a denial of service...
Microsoft System Center 2019 Operations Manager: privilege escalation
An attacker can bypass restrictions of Microsoft System Center 2019 Operations Manager, in order to escalate his privileges...
libcni: code execution via CNI Configuration Type Field
An attacker can use a vulnerability via CNI Configuration Type Field of libcni, in order to run code...
libmysofa: five vulnerabilities
An attacker can use several vulnerabilities of libmysofa...
PySAML2: Man-in-the-Middle via CryptoBackendXmlSec1
An attacker can act as a Man-in-the-Middle via CryptoBackendXmlSec1 on PySAML2, in order to read or write data in the session...
glibc: assertion error via iconv ISO-2022-JP-3 Encoding
An attacker can force an assertion error via iconv() ISO-2022-JP-3 Encoding of glibc, in order to trigger a denial of service...
LibTIFF: buffer overflow via t2p_read_tiff_size
An attacker can trigger a buffer overflow via t2p_read_tiff_size() of LibTIFF, in order to trigger a denial of service, and possibly to run code...
LibTIFF: buffer overflow via gtTileContig
An attacker can trigger a buffer overflow via gtTileContig() of LibTIFF, in order to trigger a denial of service, and possibly to run code...
Python Jinja: overload via Regular Expression
An attacker can trigger an overload via Regular Expression of Python Jinja, in order to trigger a denial of service...
ImageMagick: denial of service via WriteJP2Image
An attacker can trigger a fatal error via WriteJP2Image() of ImageMagick, in order to trigger a denial of service...
ImageMagick: denial of service via ScaleResampleFilter
An attacker can trigger a fatal error via ScaleResampleFilter() of ImageMagick, in order to trigger a denial of service...
ImageMagick: denial of service via ImplodeImage
An attacker can trigger a fatal error via ImplodeImage() of ImageMagick, in order to trigger a denial of service...
ImageMagick: denial of service via GetResizeFilterWeight
An attacker can trigger a fatal error via GetResizeFilterWeight() of ImageMagick, in order to trigger a denial of service...
Node.js esm: denial of service via Regular Expression
An attacker can trigger a fatal error via Regular Expression of Node.js esm, in order to trigger a denial of service...
Node.js diff: overload via Regular Expression
An attacker can trigger an overload via Regular Expression of Node.js diff, in order to trigger a denial of service...
Node.js angular: Cross Site Scripting via JSONP
An attacker can trigger a Cross Site Scripting via JSONP of Node.js angular, in order to run JavaScript code in the context of the web site...
QEMU: overload via e1000
An attacker, inside a guest system, can trigger an overload via e1000 of QEMU, in order to trigger a denial of service on the host system...
QEMU: denial of service via eepro100
An attacker, inside a guest system, can trigger a fatal error via eepro100 of QEMU, in order to trigger a denial of service on the host system...
Linux kernel: privilege escalation via Signal Sending
An attacker can bypass restrictions via Signal Sending of the Linux kernel, in order to escalate his privileges...
radare2: memory corruption via r_x509_parse_algorithmidentifier
An attacker can trigger a memory corruption via r_x509_parse_algorithmidentifier() of radare2, in order to trigger a denial of service, and possibly to run code...
radare2: memory corruption via parse_typedef
An attacker can trigger a memory corruption via parse_typedef() of radare2, in order to trigger a denial of service, and possibly to run code...
Keylime: privilege escalation via Invalid Chain Of Trust
An attacker can bypass restrictions via Invalid Chain Of Trust of Keylime, in order to escalate his privileges...
OpenBSD: assertion error via Overlapping IPv4 Fragments
An attacker can force an assertion error via Overlapping IPv4 Fragments of OpenBSD, in order to trigger a denial of service...
Cisco NX-OS: code execution via UDLD
An attacker can use a vulnerability via UDLD of Cisco NX-OS, in order to run code...
Cisco Nexus 9500: denial of service via PIM
An attacker can trigger a fatal error via PIM of Cisco Nexus 9500, in order to trigger a denial of service...
Cisco NX-OS: Cross Site Request Forgery via NX-AP
An attacker can trigger a Cross Site Request Forgery via NX-AP of Cisco NX-OS, in order to force the victim to perform operations...
Cisco NX-OS: denial of service via IPv6 Netstack
An attacker can trigger a fatal error via IPv6 Netstack of Cisco NX-OS, in order to trigger a denial of service...
Cisco Nexus 9000 ACI: data transit via VLAN
An attacker can bypass filtering rules via VLAN of Cisco Nexus 9000 ACI, in order to transmit malicious data...
Cisco Nexus 9000 ACI: denial of service via BGP Route Installation
An attacker can trigger a fatal error via BGP Route Installation of Cisco Nexus 9000 ACI, in order to trigger a denial of service...
Cisco NX-OS: memory leak via ICMPv6 Packet
An attacker can create a memory leak via ICMPv6 Packet of Cisco NX-OS, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1104 1105 1106 1107 1108 1109 1110 1111 1112 1114 1116 1117 1118 1119 1120 1121 1122 1123 1124 1126