The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
exiv2: five vulnerabilities
An attacker can use several vulnerabilities of exiv2...
Cacti: multiple vulnerabilities
An attacker can use several vulnerabilities of Cacti...
Apple macOS: two vulnerabilities via WebKit
An attacker can use several vulnerabilities via WebKit of Apple macOS...
Apple iOS: four vulnerabilities via WebKit
An attacker can use several vulnerabilities of Apple iOS...
Apple iOS: two vulnerabilities via WebKit
An attacker can use several vulnerabilities of Apple iOS...
Python: audit bypass in the sqlite3 module
An attacker can call sqlite3.Connection() instead of sqlite3.connect() from the Python module, in order to bypass access control checks...
MongoDB Server: assertion error
An attacker can force an assertion error of MongoDB Server, in order to trigger a denial of service...
IBM Informix Dynamic Server: buffer overflow
A local attacker can trigger a buffer overflow of IBM Informix Dynamic Server, in order to trigger a denial of service, and possibly to run code...
webkit: code execution
An attacker can use a vulnerability of webkit, in order to run code...
netdata: four vulnerabilities
An attacker can use several vulnerabilities of netdata...
babel: directory traversal
An attacker can traverse directories of babel, in order to read a file outside the service root path...
libimage-exiftool-perl: code execution via DjVu
An attacker can use a vulnerability via DjVu of libimage-exiftool-perl, in order to run code...
SUSE CUPS: privilege escalation via lp
An attacker can bypass restrictions via lp of SUSE CUPS, in order to escalate his privileges...
Centreon Web 2.8: multiple vulnerabilities
An attacker can use several vulnerabilities of Centreon Web 2.8...
PHP: hearder injection via imap_mail_compose
An attacker can inject mail headers via imap_mail_compose of PHP...
Vtiger CRM: SQL injection via the calendar
An attacker can use a SQL injection via calendar of Vtiger CRM, in order to read or alter data...
PHP composer: code execution via Mercurial URL
An attacker can use a vulnerability via Mercurial of PHP composer, in order to run code...
XnView: vulnerability via GEM
A vulnerability via GEM of XnView was announced...
Samba: privilege escalation
An attacker can bypass restrictions of Samba, in order to escalate his privileges...
Cisco ASA: shell command injection via upgrade
An attacker can use a vulnerability via the upgrade function of Cisco ASA, in order to run code...
Cisco ASA: shell command execution via CLI
An attacker can use a vulnerability via CLI of Cisco ASA, in order to run code...
librsvg: buffer overflow
An attacker can trigger a buffer overflow of librsvg, in order to trigger a denial of service, and possibly to run code...
ISC BIND: buffer overflow via GSSAPI
An attacker can trigger a buffer overflow via GSSAPI of ISC BIND, in order to trigger a denial of service, and possibly to run code...
ISC BIND: assertion error via DNAME
An attacker can force an assertion error via DNAME of ISC BIND, in order to trigger a denial of service...
ISC BIND: denial of service via IXFR
An attacker can trigger a fatal error via IXFR of ISC BIND, in order to trigger a denial of service...
F5 BIG-IP: privilege escalation via WAF
An attacker can bypass restrictions via WAF of F5 BIG-IP, in order to escalate his privileges...
F5 BIG-IP: file reading via APM
A local attacker can read a file via APM of F5 BIG-IP, in order to obtain sensitive information...
F5 BIG-IP: file upload via WAF
An attacker can upload a malicious file via WAF on F5 BIG-IP, in order for example to upload a Trojan...
F5 BIG-IP: denial of service via SCTP
An attacker can trigger a fatal error via SCTP of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: shell command execution
An attacker can use a vulnerability of F5 BIG-IP, in order to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1121 1122 1123 1124 1125 1126 1127 1128 1129 1131 1133