The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
OpenSSH: key disclosure via Roaming
An attacker, who owns a malicious SSH server, can invite a client to connect with OpenSSH, and then call the Roaming feature, in order to obtain sensitive information about keys used by the SSH client...
ProcessOne ejabberd: predictability of random number
An attacker can predict a random in ProcessOne ejabberd, in order to access to some features...
FreeBSD: information disclosure via /etc/snmpd.config
An attacker can read /etc/snmpd.config of FreeBSD, in order to obtain sensitive information...
FreeBSD: denial of service via TCP MD5
A local (remote in some special configurations) attacker can send a malicious TCP packet to FreeBSD, in order to trigger a denial of service...
FreeBSD: privilege escalation via Linux setgroups
A local attacker can use setgroups() on the Linux Compatibility Layer of FreeBSD, in order to escalate his privileges...
FreeBSD: privilege escalation via Linux futex
A local attacker can use a futex on the Linux Compatibility Layer of FreeBSD, in order to escalate his privileges...
FreeBSD: assertion error via SCTP ICMPv6
An attacker can force an assertion error in the SCTP stack with ICMPv6 on FreeBSD, in order to trigger a denial of service...
HPE ArcSight Logger: two vulnerabilities
An attacker can use several vulnerabilities of HPE ArcSight Logger...
Drupal RedHen: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal RedHen, in order to run JavaScript code in the context of the web site...
Python-RSA: fake signature via Bleichenbacher Attack
An attacker can use a Bleichenbacher attack against Python-RSA, in order to create a fake signature...
Cisco Aironet 1800: privilege escalation via Default Account
An attacker can use a default account of Cisco Aironet 1800, in order to access to the system...
Cisco Aironet 1800: denial of service via IP
An attacker can send a malicious IP packet to Cisco Aironet 1800, in order to trigger a denial of service...
Cisco WLC: administration access
An attacker can bypass access restrictions of Cisco WLC, in order to read or alter configuration...
Junos: denial of service via J-Web Embedthis Appweb Server
An attacker can use J-Web Embedthis Appweb Server of Junos, in order to trigger a denial of service...
Junos: denial of service via IGMPv3
An attacker can send a malicious IGMPv3 packet to Junos, in order to trigger a denial of service...
Junos: infinite loop of EX-PFE
An attacker can generate an infinite loop in Junos on EX4300, in order to trigger a denial of service...
Junos: denial of service via RTSP
An attacker can send a malicious RTSP packet to Junos, in order to trigger a denial of service...
Junos: denial of service via LDP
An attacker can send a malicious LDP packet to Junos, in order to trigger a denial of service...
Node.js Mapbox.js: Cross Site Scripting of TileJSON
An attacker can trigger a Cross Site Scripting in TileJSON of Node.js Mapbox.js, in order to run JavaScript code in the context of the web site...
WordPress Commentator: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Commentator, in order to run JavaScript code in the context of the web site...
libvirt: denial of service via Volume Creation
An attacker can generate a fatal error in Volume Creation of libvirt, in order to trigger a denial of service...
FFmpeg: three vulnerabilities
An attacker can use several vulnerabilities of FFmpeg...
ISC DHCP: buffer overflow of decode_udp_ip_header
An attacker can generate a buffer overflow by sending an IPv4+UDP packet to an ISC DHCP client or server, in order to trigger a denial of service, and possibly to run code...
Shotwell: vulnerability of TLS Certificates
A vulnerability in TLS Certificates of Shotwell was announced...
Microsoft Exchange: four vulnerabilities of Spoofing
An attacker can use several vulnerabilities of Spoofing of Microsoft Exchange...
Windows: two vulnerabilities of Mount Point
Several vulnerabilities were announced in the management of mount points by Windows...
Windows: six vulnerabilities
An attacker can use several vulnerabilities of Windows...
Microsoft Silverlight: memory corruption via Decoder
An attacker can generate a memory corruption in with a decoder of Microsoft Silverlight, in order to trigger a denial of service, and possibly to run code...
Windows: two vulnerabilities of Kernel Drivers
An attacker can use several vulnerabilities of Kernel Drivers of Windows...
Microsoft Office, SharePoint, Visual Basic: five vulnerabilities
An attacker can use several vulnerabilities of Microsoft Office, SharePoint...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 571 572 573 574 575 576 577 578 579 581 583 584 585 586 587 588 589 590 591 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1070