The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Dell hardware: multiple vulnerabilities of IPMI via iDRAC
An attacker can use several vulnerabilities of the iDRAC (Dell Remote Access Card) in Dell hardware...
HP hardware: IPMI command execution via iLO
An attacker can use an arbitrary password and no encryption, in order to execute IPMI commands via HP Integrated Lights-Out (iLO)...
IBM hardware: multiple vulnerabilities of IPMI via IMM
An attacker can use several vulnerabilities of the IMM (Integrated Management Module) in IBM hardware...
SAP NetWeaver: SQL injection of ABAD0_DELETE_DERIVATION_TABLE
An attacker can use a SQL injection in ABAD0_DELETE_DERIVATION_TABLE of SAP NetWeaver, in order to read or alter data...
Cisco IOS XR: denial of service via ICMP
A local attacker can interrupt a ping command on Cisco IOS XR, in order to trigger a denial of service...
Python: bypassing of X.509 subjectAltName check
An attacker can send an X.509 certificate containing a null byte to a client written in Python in order to spoof another server...
libvirt: memory corruption via xenDaemonListDefinedDomains
A local attacker can generate a memory corruption in the xenDaemonListDefinedDomains() function of libvirt, in order to trigger a denial of service, and possibly to execute code...
Agnitum Outpost Security Suite: privilege escalation
A local attacker can use several vulnerabilities of Agnitum Outpost Security Suite...
libtiff: multiple vulnerabilities
An attacker can use several vulnerabilities of libtiff...
PuTTY: multiple vulnerabilities
An attacker can use several vulnerabilities of PuTTY...
glibc: buffer overflow of readdir_r
An attacker can generate a buffer overflow in applications using the readdir_r() function of glibc, in order to trigger a denial of service, and possibly to execute code...
PHP: integer overflow of Calendar SdnToJewish
An attacker can generate an integer overflow in the SdnToJewish() function of PHP, in order to trigger a denial of service...
Poppler, Xpdf: character injection
An attacker can create a malformed PDF document, containing special characters, which are not filtered by Poppler/Xpdf, in order to inject them is a shell terminal...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 389 390 391 392 393 394 395 396 397 399 401 402 403 404 405 406 407 408 409 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1050