The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Apple QuickTime: two vulnerabilities
An attacker can use several vulnerabilities of Apple QuickTime...
VMware vCenter Server: Man-in-the-Middle of Client Integration Plugin
An attacker can act as a Man-in-the-Middle of Client Integration Plugin on VMware vCenter Server, in order to read or write data in the session...
Qpid Proton: information disclosure
An attacker can bypass access restrictions to data of Qpid Proton, in order to obtain sensitive information...
Poppler: buffer overflow
An attacker can generate a buffer overflow of Poppler, in order to trigger a denial of service, and possibly to run code...
Asterisk: two vulnerabilities
An attacker can use several vulnerabilities of Asterisk...
Xen: infinite loop of hugetlbfs
An attacker in a PV guest system can generate an infinite loop via hugetlbfs of Xen, in order to trigger a denial of service on the host system...
Zend Framework: low entropy
An attacker can potentially predict randoms used by Zend Framework, in order to bypass security features...
Cisco Catalyst: information disclosure via NMSP
An attacker can use a vulnerability in NMSP of Cisco Catalyst, in order to obtain sensitive information...
Google Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
Debian, openSUSE: file reading /etc/quagga
A local attacker can read the file /etc/quagga of Debian/openSUSE, in order to obtain sensitive information...
Junos: multiple vulnerabilities
An attacker can use several vulnerabilities of Junos...
Junos Space: four vulnerabilities
An attacker can combine several vulnerabilities of Junos Space, in order to elevate his privileges...
ScreenOS: denial of service via SSL/TLS
An attacker can send a malicious SSL/TLS packet to ScreenOS, in order to trigger a denial of service...
Drupal Boost: information disclosure
An attacker can bypass access restrictions to data of Drupal Boost, in order to obtain sensitive information...
Drupal Features: denial of service
An attacker can generate a fatal error of Drupal Features, in order to trigger a denial of service...
TeamPass: SQL injection
An attacker can use a SQL injection of TeamPass, in order to read or alter data...
QEMU: information disclosure via patch_instruction
A local attacker can read a memory fragment of patch_instruction() of QEMU, in order to obtain sensitive information...
Tenable Nessus: two vulnerabilities
An attacker can use several vulnerabilities of Tenable Nessus...
pfSense: three vulnerabilities
An attacker can use several vulnerabilities of pfSense...
Linux kernel: denial of service via PPC State
A local attacker can generate an error in PowerPC states on the Linux kernel, in order to trigger a denial of service...
Windows: character injection via Microsoft Wireless Mouse
An attacker can send radio packets to USB dongles of Microsoft wireless mouses, in order to inject characters in the current application...
BlackBerry Enterprise Service: four vulnerabilities
An attacker can use several vulnerabilities of BlackBerry Enterprise Service...
Imlib: denial of service via Ellipse
An attacker can generate a fatal error with an ellipse in Imlib, in order to trigger a denial of service...
Imlib: out-of-bounds memory reading via GIF
An attacker can force a read at an invalid address in GIF of Imlib, in order to trigger a denial of service, or to obtain sensitive information...
Libreswan: denial of service via IKEv2 aes_xcbc
An attacker can send a malicious IKEv2 aes_xcbc packet to Libreswan, in order to trigger a denial of service...
Dell OpenManage Server Administrator: directory traversal
An authenticated attacker can traverse directories of Dell OpenManage Server Administrator, in order to read a file outside the service root path...
Windows 10: denial of service via HTTP 2.0
An attacker can send a malicious HTTP 2.0 packet to Windows 10, in order to trigger a denial of service...
Windows: privilege escalation via CSRSS
A local attacker can use CSRSS of Windows, in order to escalate his privileges...
Windows 10: privilege escalation via Secondary Logon
A local attacker can use the Secondary Logon of Windows 10, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 593 594 595 596 597 598 599 600 601 603 605 606 607 608 609 610 611 612 613 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1103