The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Linux kernel: assertion error via tcp_input.c
An attacker can force an assertion error via tcp_input.c of the Linux kernel, in order to trigger a denial of service...
IBM Tivoli Storage Manager: buffer overflow via AIX Client Journal-Based Backup
An attacker can generate a buffer overflow via AIX Client Journal-Based Backup of IBM Tivoli Storage Manager, in order to trigger a denial of service, and possibly to run code...
sudo: privilege escalation via wordexp
An attacker can bypass restrictions via wordexp() on sudo, in order to escalate his privileges...
Terminology: code execution
An attacker can use a vulnerability of Terminology, in order to run code...
WordPress WP Google Maps: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress WP Google Maps, in order to run JavaScript code in the context of the web site...
Linux kernel: NULL pointer dereference via kvm
An attacker can force a NULL pointer to be dereferenced via kvm on the Linux kernel, in order to trigger a denial of service...
OpenSSL 1.1: three vulnerabilities
An attacker can use several vulnerabilities of OpenSSL 1.1...
Nessus: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Nessus, in order to run JavaScript code in the context of the web site...
PHP: multiple vulnerabilities
An attacker can use several vulnerabilities of PHP...
Chrome: four vulnerabilities
An attacker can use several vulnerabilities of Chrome...
F5 BIG-IP ASM: denial of service via Proactive Bot Defense
An attacker can send a malformed HTTP query to Proactive Bot Defense of F5 BIG-IP ASM, in order to trigger a denial of service...
LibTIFF: buffer overflow via TIFFNumberOfStrips
An attacker can generate a buffer overflow via TIFFNumberOfStrips of LibTIFF, in order to trigger a denial of service, and possibly to run code...
dracut: information disclosure via initramfs
An attacker can bypass access restrictions to data via initramfs of dracut, in order to obtain sensitive information...
Drupal Views Send: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Views Send, in order to run JavaScript code in the context of the web site...
F5 BIG-IP: Cross Site Request Forgery via Configuration Utility
An attacker can trigger a Cross Site Request Forgery via Configuration Utility of F5 BIG-IP, in order to force the victim to perform operations...
WordPress XCloner Backup and Restore: two vulnerabilities
An attacker can use several vulnerabilities of WordPress XCloner Backup and Restore...
AIX: privilege escalation via lquerylv
An attacker can use lquerylv of AIX, in order to escalate his privileges...
Internet Explorer: seven vulnerabilities
An attacker can use several vulnerabilities of Internet Explorer...
Windows: privilege escalation via Secure Boot
A local attacker can bypass Secure Boot of Windows, in order to escalate his privileges...
Windows: privilege escalation via Kernel API
An attacker can bypass restrictions via Kernel API of Windows, in order to escalate his privileges...
Windows: four vulnerabilities via Virtual Hard Disk Driver
An attacker can use several vulnerabilities via Virtual Hard Disk Driver of Windows...
Windows: three vulnerabilities via Authentication Methods
An attacker can use several vulnerabilities via Authentication Methods of Windows...
Microsoft SQL Server: six vulnerabilities
An attacker can use several vulnerabilities of Microsoft SQL Server...
Windows: four vulnerabilities via Kernel-Mode Drivers
An attacker can use several vulnerabilities via Kernel-Mode Drivers of Windows...
Windows: multiple vulnerabilities via Common Log File System Driver
An attacker can use several vulnerabilities via Common Log File System Driver of Windows...
Microsoft Office: multiple vulnerabilities
An attacker can use several vulnerabilities of Microsoft Office...
Windows: four vulnerabilities via Graphics Component
An attacker can use several vulnerabilities via Graphics Component of Windows...
Windows: memory corruption via Microsoft Video Control
An attacker can generate a memory corruption via Microsoft Video Control of Windows, in order to trigger a denial of service, and possibly to run code...
Windows: three vulnerabilities
An attacker can use several vulnerabilities of Windows...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 650 651 652 653 654 655 656 657 658 660 662 663 664 665 666 667 668 669 670 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1013