The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Zabbix: Cross Site Request Forgery via CControllerAuthenticationUpdate
An attacker can trigger a Cross Site Request Forgery via CControllerAuthenticationUpdate of Zabbix, in order to force the victim to perform operations...
Intel Graphics Drivers: multiple vulnerabilities
An attacker can use several vulnerabilities of Intel Graphics Drivers...
mbsync: directory traversal via Mailbox Name
An attacker can traverse directories via Mailbox Name of mbsync, in order to read a file outside the service root path...
Drupal Webform: spoofing via Email Sending
An attacker can create spoofed data via Email Sending of Drupal Webform, in order to deceive the victim...
Pulse Connect Secure Appliance: denial of service via BIOS Trickboot Erasing
An attacker can trigger a fatal error via BIOS Trickboot Erasing of Pulse Connect Secure Appliance, in order to trigger a denial of service...
Trend Micro Scan Engine: denial of service via Memory Exhaustion
An attacker can trigger a fatal error via Memory Exhaustion of Trend Micro Scan Engine, in order to trigger a denial of service...
Cisco ASR 5000: denial of service via ipsecmgr
An attacker can trigger a fatal error via ipsecmgr of Cisco ASR 5000, in order to trigger a denial of service...
Cisco SD-WAN vEdge Router: privilege escalation via Signature Verification Bypass
An attacker can bypass restrictions via Signature Verification Bypass of Cisco SD-WAN vEdge Router, in order to escalate his privileges...
Cisco IP Phone: multiple vulnerabilities via CDP/LLDP
An attacker can use several vulnerabilities of Cisco IP Phone...
Cisco ESA/CSMA: information disclosure via Web-based Management Interface
An attacker can bypass access restrictions to data via Web-based Management Interface of Cisco ESA/CSMA, in order to obtain sensitive information...
Node.js Modules: five vulnerabilities
An attacker can use several vulnerabilities of Node.js Modules...
Google Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
Microsoft Exchange Server: multiple vulnerabilities
An attacker can use several vulnerabilities of Microsoft Exchange Server...
SUSE LE: vulnerability via dnssec-keygen
A vulnerability via dnssec-keygen of SUSE LE was announced...
OpenSSH: use after free via ssh-agent
An attacker can force the usage of a freed memory area via ssh-agent of OpenSSH, in order to trigger a denial of service, and possibly to run code...
GRUB2: multiple vulnerabilities
An attacker can use several vulnerabilities of GRUB2...
Joomla Core: multiple vulnerabilities
An attacker can use several vulnerabilities of Joomla Core...
wpa_supplicant: use after free via Provision Discovery Request
An attacker can force the usage of a freed memory area via Provision Discovery Request of wpa_supplicant, in order to trigger a denial of service, and possibly to run code...
Node.js Modules: six vulnerabilities
An attacker can use several vulnerabilities of Node.js Modules...
Google Android/Pixel: multiple vulnerabilities of March 2021
An attacker can use several vulnerabilities of Google Android/Pixel...
Dell EMC OpenManage Server Administrator: two vulnerabilities
An attacker can use several vulnerabilities of Dell EMC OpenManage Server Administrator...
HCL Domino: information disclosure via Domino Access Services
An attacker can bypass access restrictions to data via Domino Access Services of HCL Domino, in order to obtain sensitive information...
HCL Domino: buffer overflow via Crafted Inputs
An attacker can trigger a buffer overflow via Crafted Inputs of HCL Domino, in order to trigger a denial of service, and possibly to run code...
HCL Domino: buffer overflow via iNotes
An attacker can trigger a buffer overflow via iNotes of HCL Domino, in order to trigger a denial of service, and possibly to run code...
MongoDB Server: denial of service via Regex Query
An attacker can trigger a fatal error via Regex Query of MongoDB Server, in order to trigger a denial of service...
MongoDB Server: denial of service via UUID Explain
An attacker can trigger a fatal error via UUID Explain of MongoDB Server, in order to trigger a denial of service...
uIP: memory corruption via uip_reass
An attacker can trigger a memory corruption via uip_reass() of uIP, in order to trigger a denial of service, and possibly to run code...
uIP: out-of-bounds memory reading via uip_process
An attacker can force a read at an invalid address via uip_process() of uIP, in order to trigger a denial of service, or to obtain sensitive information...
uIP: integer overflow via uip_process
An attacker can trigger an integer overflow via uip_process() of uIP, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1105 1106 1107 1108 1109 1110 1111 1112 1113 1115 1117 1118 1119 1120 1121 1122 1123 1124 1125