The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
NVIDIA: two vulnerabilities
An attacker can use several vulnerabilities of NVIDIA...
V8: memory corruption
An attacker can generate a memory corruption of V8, in order to trigger a denial of service, and possibly to run code...
F5 BIG-IP Virtual Server: information disclosure via TCP Sequence Number
An attacker can obtain TCP sequence numbers of F5 BIG-IP Virtual Server, which are reused during 4 seconds...
libblkid: infinite loop via EBR
An attacker can generate an infinite loop via EBR of libblkid, in order to trigger a denial of service...
powerpc-utils-python: code execution via amsvis
An attacker can use a vulnerability via amsvis of powerpc-utils-python, in order to run code...
Libreswan: denial of service via IKEv1
An attacker can generate a fatal error via IKEv1 of Libreswan, in order to trigger a denial of service...
RESTEasy: code execution via SerializableProvider
An attacker can use a vulnerability via SerializableProvider of RESTEasy, in order to run code...
sudo: privilege escalation via INPUTRC
An attacker can bypass restrictions via INPUTRC of sudo, in order to escalate his privileges...
subscription-manager: information disclosure via /var/lib/rhsm/
An attacker can bypass access restrictions to data via /var/lib/rhsm/ of subscription-manager, in order to obtain sensitive information...
389 Directory Server: information disclosure via Password
An attacker can bypass access restrictions to data via Password of 389 Directory Server, in order to obtain sensitive information...
389 Directory Server: information disclosure via ACI
An attacker can bypass access restrictions to data via ACI of 389 Directory Server, in order to obtain sensitive information...
SWIFT Alliance Access/Web: vulnerability
A vulnerability of SWIFT Alliance Access/Web was announced...
Drupal Workbench Moderation: information disclosure
An attacker can bypass access restrictions to data of Drupal Workbench Moderation, in order to obtain sensitive information...
Drupal D8 Editor File upload: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal D8 Editor File upload, in order to run JavaScript code in the context of the web site...
Drupal Bootstrap: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Bootstrap, in order to run JavaScript code in the context of the web site...
Drupal Profile 2 Registration Path: vulnerability
A vulnerability of Drupal Profile 2 Registration Path was announced...
Drupal Like/Dislike: privilege escalation
An attacker can bypass restrictions of Drupal Like/Dislike, in order to escalate his privileges...
Drupal Menu Views: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Menu Views, in order to run JavaScript code in the context of the web site...
Linux kernel: information disclosure via get_user_ex
A local attacker can read a memory fragment via get_user_ex() on the Linux kernel, in order to obtain sensitive information...
IBM Tivoli Storage Manager Client: information disclosure via Tracing
An attacker can read logs of Tracing of IBM Tivoli Storage Manager Client, in order to obtain sensitive information...
Cisco ASR 5500: denial of service via DPC2
An attacker can generate a fatal error via DPC2 of Cisco ASR 5500, in order to trigger a denial of service...
Cisco ASR 900: buffer overflow via TL1
An attacker can generate a buffer overflow via Transaction Language 1 of Cisco ASR 900, in order to trigger a denial of service, and possibly to run code...
Cisco ESA: bypassing via RAR
An attacker can send a malformed MIME header, in order to bypass the filter of Cisco ESA and WSA...
WordPress WP Database Backup: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress WP Database Backup, in order to force the victim to perform operations...
WordPress SAM Pro: file upload
An attacker can upload a malicious file on WordPress SAM Pro, in order for example to upload a Trojan...
Windows: privilege escalation via NtSetWindowLongPtr
A local attacker can call NtSetWindowLongPtr() on Windows, in order to escalate his privileges...
Ansible Core: two vulnerabilities
An attacker can use several vulnerabilities of Ansible Core...
Ansible Tower: privilege escalation via PostgreSQL
An attacker can bypass restrictions via PostgreSQL of Ansible Tower, in order to escalate his privileges...
Node.js igniteui: information disclosure
An attacker can bypass access restrictions to data of Node.js igniteui, in order to obtain sensitive information...
Node.js waterline-sequel: SQL injection
An attacker can use a SQL injection of Node.js waterline-sequel, in order to read or alter data...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 648 649 650 651 652 653 654 655 656 658 660 661 662 663 664 665 666 667 668 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1020