The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Cisco ASA: denial of service via DNS
An attacker can send a malicious DNS packet to Cisco ASA, in order to trigger a denial of service...
Cisco ASA: denial of service via DHCPv6
An attacker can send a malicious DHCPv6 packet to Cisco ASA, in order to trigger a denial of service...
Linux kernel: information disclosure via dgnc_mgmt_ioctl
A local attacker can read a memory fragment via dgnc_mgmt_ioctl() of the Linux kernel, in order to obtain sensitive information...
Linux kernel: information disclosure via vivid_fb_ioctl
A local attacker can read a memory fragment via vivid_fb_ioctl() of the Linux kernel, in order to obtain sensitive information...
BusyBox: directory traversal of tar
An attacker can create a malicious tar archive, to traverse directories in BusyBox, in order to create a file outside the service root path...
MiniUPnP: buffer overflow
An attacker can generate a buffer overflow of MiniUPnP, in order to trigger a denial of service, and possibly to run code...
V8: vulnerability
A vulnerability of V8 was announced...
MySQL: multiple vulnerabilities
An attacker can use several vulnerabilities of MySQL...
Oracle VM VirtualBox: several vulnerabilities of October 2015
An attacker can use several vulnerabilities of Oracle VM VirtualBox...
Oracle Solaris: several vulnerabilities of October 2015
An attacker can use several vulnerabilities of Oracle Solaris...
Oracle Java: several vulnerabilities of October 2015
An attacker can use several vulnerabilities of Oracle Java...
Oracle Communications: several vulnerabilities of October 2015
An attacker can use several vulnerabilities of Oracle Communications...
Oracle Outside In Technology: several vulnerabilities of October 2015
An attacker can use several vulnerabilities of Oracle Database...
Oracle Fusion Middleware: several vulnerabilities of October 2015
An attacker can use several vulnerabilities of Oracle Fusion Middleware...
Oracle Database: several vulnerabilities of October 2015
An attacker can use several vulnerabilities of Oracle Database...
VideoLAN VLC: denial of service via vlm_MessageAdd
An attacker can invite the victim to open a malicious MP3 file with VideoLAN VLC, in order to trigger a denial of service...
Linux kernel: use after free via key_garbage_collector
An attacker can force the usage of a freed memory area in key_garbage_collector() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
librsvg: external XML entity injection
An attacker can transmit malicious XML data to librsvg, in order to read a file, scan sites, or trigger a denial of service...
Linux kernel: denial of service via USBVision
An attacker can plug a malicious USB device to trigger an error in the USBVision driver of the Linux kernel, in order to force a denial of service...
HP ArcSight Logger: brute force on SOAP
An attacker can try to authenticate with no limit on SOAP, in order to perform a brute force...
Linux kernel: use after free via aufs
A local attacker can force the usage of a freed memory area on the aufs filesystem on Linux kernel, in order to trigger a denial of service, and possibly to run code...
Cisco ASR: denial of service via PMIPv6
A remote attacker can send malicious PMIPv6 packets to Cisco ASR, in order to trigger a denial of service...
SSSD: memory leak via sssd_pac_plugin
An attacker can create a memory leak in sssd_pac_plugin of SSSD, in order to trigger a denial of service...
OpenSMTPD: vulnerability
A vulnerability of OpenSMTPD was announced...
SSH-1: Man-in-the-Middle of Session ID
An attacker can act as a Man-in-the-Middle of Session ID on SSH-1, in order to read or write data in the session...
Cisco Wireless LAN Controller: disconnecting clients
An attacker can send a disconnect query to the administration interface of Cisco Wireless LAN Controller, in order to trigger a denial of service...
ownCloud: eight vulnerabilities
An attacker can use several vulnerabilities of ownCloud...
Docker Engine: two vulnerabilities
An attacker can use several vulnerabilities of Docker...
LXDM: privilege escalation
An attacker can bypass restrictions of LXDM, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 552 553 554 555 556 557 558 559 560 562 564 565 566 567 568 569 570 571 572 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021