The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
IBM QRadar SIEM: information disclosure via QRadar Advisor With Watson App
An attacker can bypass access restrictions to data via QRadar Advisor With Watson App of IBM QRadar SIEM, in order to obtain sensitive information...
F5 BIG-IP Edge Client for Windows: executing DLL code via cachecleaner.dll
An attacker can create a malicious cachecleaner.dll DLL, and then put it in the current directory of F5 BIG-IP Edge Client for Windows, in order to execute code...
F5 BIG-IP Edge Client for Windows: privilege escalation via Installer Service Temporary Folder
An attacker can bypass restrictions via Installer Service Temporary Folder of F5 BIG-IP Edge Client for Windows, in order to escalate his privileges...
Django: information disclosure via IPv4 Addresses Leading Zeros
An attacker can bypass access restrictions to data via IPv4 Addresses Leading Zeros of Django, in order to obtain sensitive information...
Django: directory traversal via admindocs
An attacker can traverse directories via admindocs of Django, in order to read a file outside the service root path...
pfSense: Cross Site Scripting via load_balancer_monitor
An attacker can trigger a Cross Site Scripting via load_balancer_monitor of pfSense, in order to run JavaScript code in the context of the web site...
FortiGate: Man-in-the-Middle via SSL-VPN Certificate Chain Trust
An attacker can act as a Man-in-the-Middle via SSL-VPN Certificate Chain Trust on FortiGate, in order to read or write data in the session...
FortiGate: Cross Site Scripting via SSL VPN Portal Error Page
An attacker can trigger a Cross Site Scripting via SSL VPN Portal Error Page of FortiGate, in order to run JavaScript code in the context of the web site...
Redis: integer overflow via STRALGO LCS
An attacker can trigger an integer overflow via STRALGO LCS of Redis, in order to trigger a denial of service, and possibly to run code...
Python ipaddress: data transit via IPv4 Leading Zeros
An attacker can bypass filtering rules via IPv4 Leading Zeros of Python ipaddress, in order to transmit malicious data...
libwebp: five vulnerabilities
An attacker can use several vulnerabilities of libwebp...
libwebp: six vulnerabilities
An attacker can use several vulnerabilities of libwebp...
GUPnP: information disclosure via DNS Rebinding
An attacker can bypass access restrictions to data via DNS Rebinding of GUPnP, in order to obtain sensitive information...
Gstreamer: memory corruption via H264 Header
An attacker can trigger a memory corruption via H264 Header of Gstreamer, in order to trigger a denial of service, and possibly to run code...
Mozilla Firefox: multiple vulnerabilities
An attacker can use several vulnerabilities of Mozilla Firefox...
Lasso: privilege escalation via Unsigned AuthnResponse Messages Assertion
An attacker can bypass restrictions via Unsigned AuthnResponse Messages Assertion of Lasso, in order to escalate his privileges...
Linux kernel: denial of service via nitro_enclaves
An attacker can trigger a fatal error via nitro_enclaves of the Linux kernel, in order to trigger a denial of service...
Linux kernel: NULL pointer dereference via llcp_sock_getname
An attacker can force a NULL pointer to be dereferenced via llcp_sock_getname of the Linux kernel, in order to trigger a denial of service...
QEMU: three vulnerabilities via vhost-user-gpu
An attacker, inside a guest system, can use several vulnerabilities via vhost-user-gpu of QEMU sur le système hôte...
cflow: use after free via src/parser.c
An attacker can force the usage of a freed memory area via src/parser.c of cflow, in order to trigger a denial of service, and possibly to run code...
OpenDMARC: data transit via SPF/DKIM Authentication Results
An attacker can bypass filtering rules via SPF/DKIM Authentication Results of OpenDMARC, in order to transmit malicious data...
OpenDMARC: data transit via MAIL FROM HELO SPF/DMARC Bypass
An attacker can bypass filtering rules via MAIL FROM HELO SPF/DMARC Bypass of OpenDMARC, in order to transmit malicious data...
Cranelift: privilege escalation via Code Generation
An attacker can bypass restrictions via Code Generation of Cranelift, in order to escalate his privileges...
rxvt: code execution via ESC G Q
An attacker can use a vulnerability via ESC G Q of rxvt, in order to run code...
HyperKitty: information disclosure via Private Mailing Import
An attacker can bypass access restrictions to data via Private Mailing Import of HyperKitty, in order to obtain sensitive information...
SIMATIC: read-write access via Memory Protection Bypass
An attacker can bypass access restrictions via Memory Protection Bypass of SIMATIC, in order to read or alter data...
Ansible: information disclosure via Random Password Lookups
An attacker can bypass access restrictions to data via Random Password Lookups of Ansible, in order to obtain sensitive information...
Microsoft Edge Chromium: two vulnerabilities
An attacker can use several vulnerabilities of Microsoft Edge Chromium...
WebSphere AS ND: directory traversal
An attacker can traverse directories of WebSphere AS ND, in order to read a file outside the service root path...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1121 1134 1135 1136 1137 1138 1139 1140 1141 1142 1144 1146 1147 1148 1149 1150