The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
F5 BIG-IP: denial of service via MPTCP
An attacker can trigger a fatal error via MPTCP of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: code execution via Appliance Mode TMUI
An attacker can use a vulnerability via Appliance Mode TMUI of F5 BIG-IP, in order to run code...
F5 BIG-IP ASM: write access via iControl REST File Upload
An attacker can bypass access restrictions via iControl REST File Upload of F5 BIG-IP ASM, in order to prepare an attack or to trigger a denial of service...
F5 BIG-IP: code execution via iControl REST
An attacker can use a vulnerability via iControl REST of F5 BIG-IP, in order to run code...
F5 BIG-IP: denial of service via HTTP/2 Connect
An attacker can trigger a fatal error via HTTP/2 Connect of F5 BIG-IP, in order to trigger a denial of service...
IBM DB2: read-write access via Insecure File Permissions
An attacker can bypass access restrictions via Insecure File Permissions of IBM DB2, in order to read or alter data...
Node.js mquery: read-write access via Prototype Pollution
An attacker can bypass access restrictions via Prototype Pollution of Node.js mquery, in order to read or alter data...
Squid Cache: out-of-bounds memory reading via WCCP Protocol Data
An attacker can force a read at an invalid address via WCCP Protocol Data of Squid Cache, in order to trigger a denial of service, or to obtain sensitive information...
Linux kernel: privilege escalation via dev_map_init_map
An attacker can bypass restrictions via dev_map_init_map() of the Linux kernel, in order to escalate his privileges...
LibTIFF: denial of service via tiff2rgba
An attacker can trigger a fatal error via tiff2rgba of LibTIFF, in order to trigger a denial of service...
libtpms: information disclosure via CryptSym AES Output IV
An attacker can bypass access restrictions to data via CryptSym AES Output IV of libtpms, in order to obtain sensitive information...
WebSphere AS: directory traversal via JAX-RPC Applications
An attacker can traverse directories via JAX-RPC Applications of WebSphere AS, in order to read a file outside the service root path...
Windows: vulnerabilities of March 2021
An attacker can use several vulnerabilities of Microsoft products...
Git: code execution via Symbolic Links Clean/smudge Filters Cloning
An attacker can use a vulnerability via Symbolic Links Clean/smudge Filters Cloning of Git, in order to run code...
Microsoft SharePoint: vulnerabilities of March 2021
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Office: vulnerabilities of March 2021
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Edge EdgeHTML: code execution
An attacker can use a vulnerability of Microsoft Edge EdgeHTML, in order to run code...
Microsoft 365 Apps for Enterprise: vulnerabilities of March 2021
An attacker can use several vulnerabilities of Microsoft products...
Internet Explorer: vulnerabilities of March 2021
An attacker can use several vulnerabilities of Microsoft products...
eZ Platform, Ibexa DXP: information disclosure via /user/sessions
An attacker can bypass access restrictions to data via /user/sessions of eZ Platform and Ibexa DXP, in order to obtain sensitive information...
Ansible Tower: privilege escalation via Playbook Author
An attacker can bypass restrictions via Playbook Author of Ansible Tower, in order to escalate his privileges...
Privoxy: five vulnerabilities
An attacker can use several vulnerabilities of Privoxy...
SAP: multiple vulnerabilities of March 2021
An attacker can use several vulnerabilities of SAP products...
Siemens SIMATIC S7-PLCSIM: three vulnerabilities
An attacker can use several vulnerabilities of Siemens SIMATIC S7-PLCSIM...
Siemens RUGGEDCOM RM1224: denial of service via Failed SSH Authentication
An attacker can trigger a fatal error via Failed SSH Authentication of Siemens RUGGEDCOM RM1224, in order to trigger a denial of service...
Siemens SIMATIC MV400: two vulnerabilities via TCP Stack
An attacker can use several vulnerabilities via TCP Stack of Siemens SIMATIC MV400...
Siemens RUGGEDCOM RM1224: buffer overflow via STP BPDU Frames
An attacker can trigger a buffer overflow via STP BPDU Frames of Siemens RUGGEDCOM RM1224, in order to trigger a denial of service, and possibly to run code...
QEMU: memory corruption via sdhci
An attacker, inside a guest system, can trigger a memory corruption via sdhci of QEMU, in order to trigger a denial of service, and possibly to run code on the host system...
Synology DSM: code execution via Download Station
An attacker can use a vulnerability via Download Station of Synology DSM, in order to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1107 1108 1109 1110 1111 1112 1113 1114 1115 1117 1119 1120 1121 1122 1123 1124 1125