The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
inn: privilege escalation via innupgrade
An attacker can bypass restrictions via innupgrade of inn, in order to escalate his privileges...
F-Secure Anti-Virus: denial of service via FSAVD
An attacker can trigger a fatal error via FSAVD of F-Secure Anti-Virus, in order to trigger a denial of service...
pfSense: Cross Site Scripting via Captive Portal
An attacker can trigger a Cross Site Scripting via Captive Portal of pfSense, in order to run JavaScript code in the context of the web site...
Centreon Web 20-21: multiple vulnerabilities
An attacker can use several vulnerabilities of Centreon Web 20-21...
pki-core: information disclosure via Pkispawn Debug Mode Logged Password
An attacker can bypass access restrictions to data via Pkispawn Debug Mode Logged Password of pki-core, in order to obtain sensitive information...
polkit: privilege escalation via polkit_system_bus_name_get_creds_sync
An attacker can bypass restrictions via polkit_system_bus_name_get_creds_sync() of polkit, in order to escalate his privileges...
QEMU: NULL pointer dereference via megasas_command_cancelled
An attacker can force a NULL pointer to be dereferenced via megasas_command_cancelled() of QEMU, in order to trigger a denial of service...
JBoss RESTEasy: denial of service via RootNode Cache
An attacker can trigger a fatal error via RootNode Cache of JBoss RESTEasy, in order to trigger a denial of service...
JBoss Enterprise Application Platform: denial of service via /var/run/jboss-eap/ PID File Killing
An attacker can trigger a fatal error via /var/run/jboss-eap/ PID File Killing of JBoss Enterprise Application Platform, in order to trigger a denial of service...
Mapserver: privilege escalation via CGI Mapfile Loading
An attacker can bypass restrictions via CGI Mapfile Loading of Mapserver, in order to escalate his privileges...
ImageMagick: denial of service via division by zero Division By Zero
An attacker can trigger a fatal error via division by zero Division By Zero of ImageMagick, in order to trigger a denial of service...
Apache HTTP Server: multiple vulnerabilities
An attacker can use several vulnerabilities of Apache HTTP Server...
Wireshark: overload via DVB-S2-BB Dissector
An attacker can trigger an overload via DVB-S2-BB Dissector of Wireshark, in order to trigger a denial of service...
Drupal OpenID Connect: privilege escalation via Password Reset
An attacker can bypass restrictions via Password Reset of Drupal OpenID Connect, in order to escalate his privileges...
Drupal GraphQL: information disclosure via Exception/Error Messages
An attacker can bypass access restrictions to data via Exception/Error Messages of Drupal GraphQL, in order to obtain sensitive information...
Drupal Frequently Asked Questions: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Frequently Asked Questions, in order to run JavaScript code in the context of the web site...
Drupal Open Social: privilege escalation via social_magic_login
An attacker can bypass restrictions via social_magic_login of Drupal Open Social, in order to escalate his privileges...
Drupal Open Social: SQL injection via Turn-key System
An attacker can use a SQL injection via Turn-key System of Drupal Open Social, in order to read or alter data...
Cisco SD-WAN Software: privilege escalation via Privileged Processes
An attacker can bypass restrictions via Privileged Processes of Cisco SD-WAN Software, in order to escalate his privileges...
Cisco ASR 5000: privilege escalation via Authorization Bypass
An attacker can bypass restrictions via Authorization Bypass of Cisco ASR 5000, in order to escalate his privileges...
Node.js tinymce: Cross Site Scripting via URL Sanitization
An attacker can trigger a Cross Site Scripting via URL Sanitization of Node.js tinymce, in order to run JavaScript code in the context of the web site...
Node.js ws: overload via Regular Expression
An attacker can trigger an overload via Regular Expression of Node.js ws, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1121 1135 1136 1137 1138 1139 1140 1141 1142 1143 1145 1147 1148 1149 1150