The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Linux kernel: memory corruption via blk_rq_map_user_iov
An attacker can generate a memory corruption via blk_rq_map_user_iov() on the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: information disclosure via environ_read
An attacker can bypass access restrictions to data via environ_read() on the Linux kernel, in order to obtain sensitive information...
Linux kernel: information disclosure via assoc_array_insert_into_terminal_node
An attacker can bypass access restrictions to data via assoc_array_insert_into_terminal_node() on the Linux kernel, in order to obtain sensitive information...
Linux kernel: use after free via get_task_ioprio
An attacker can force the usage of a freed memory area via get_task_ioprio() on the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: use after free via disk_seqf_stop
An attacker can force the usage of a freed memory area via disk_seqf_stop() on the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Roundcube: code execution via PHP mail
An attacker can use a vulnerability via PHP mail() of Roundcube, in order to run code...
Linux kernel: use after free via xc2028_set_config
An attacker can force the usage of a freed memory area via xc2028_set_config() on the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: use after free via swevent
An attacker can force the usage of a freed memory area via swevent on the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: use after free via sg_common_write
An attacker can force the usage of a freed memory area via sg_common_write() on the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Node.js Bitty: directory traversal
An attacker can traverse directories of Node.js Bitty, in order to read a file outside the service root path...
Nagios: privilege escalation
An attacker can bypass restrictions of Nagios, in order to escalate his privileges...
PHP: multiple vulnerabilities
An attacker can use several vulnerabilities of PHP...
WordPress Ultimate Member: privilege escalation via Password Reset
An attacker can bypass restrictions via Password Reset of WordPress Ultimate Member, in order to escalate his privileges...
QEMU: use after free via chardev
An attacker can force the usage of a freed memory area via chardev of QEMU, in order to trigger a denial of service, and possibly to run code...
Linux kernel: information disclosure via tty_set_termios_ldisc
An attacker can bypass access restrictions to data via tty_set_termios_ldisc() on the Linux kernel, in order to obtain sensitive information...
Cisco Prime Collaboration Assurance: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Prime Collaboration Assurance, in order to run JavaScript code in the context of the web site...
Cisco Unified Communications Manager: information disclosure via IM and Presence
An attacker can bypass access restrictions to data via IM and Presence of Cisco Unified Communications Manager, in order to obtain sensitive information...
Cisco Web Security Appliance: denial of service via HTTP URL
An attacker can generate a fatal error via HTTP URL of Cisco Web Security Appliance, in order to trigger a denial of service...
Cisco Web Security Appliance: privilege escalation via Decrypt Policy
An attacker can bypass restrictions via Decrypt Policy of Cisco Web Security Appliance, in order to escalate his privileges...
Cisco Email Security Appliance: privilege escalation via TAR
An attacker can bypass restrictions via TAR of Cisco Email Security Appliance, in order to escalate his privileges...
Cisco IOS: denial of service via Layer 2 Frame
An attacker can send malicious Layer 2 Frame packets to Cisco IOS, in order to trigger a denial of service...
Cisco IOS, IOS XE: privilege escalation via SSH X.509
An attacker can bypass restrictions via SSH X.509 of Cisco IOS, IOS XE, in order to escalate his privileges...
Cisco IOS XR: denial of service via HTTP 2.0
An attacker can send malicious HTTP 2.0 packets to Cisco IOS XR, in order to trigger a denial of service...
Cisco IOS, IOS XE: privilege escalation via Zone-Based Firewall
An attacker can bypass restrictions via Zone-Based Firewall of Cisco IOS or IOS XE, in order to escalate his privileges...
Cisco IOS XR: privilege escalation
An attacker can use an account that is predefined in Cisco IOS XR with a constant password, in order to get administration privileges on the underlying operating system...
Cisco ESA, SMA: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco ESA/SMA, in order to run JavaScript code in the context of the web site...
Cisco Unified Communications Manager: directory traversal via Unified Reporting Upload Tool
An attacker can traverse directories via Unified Reporting Upload Tool of Cisco Unified Communications Manager, in order to read a file outside the service root path...
Cisco Unified Communications Manager: Cross Site Scripting via Administration Page
An attacker can trigger a Cross Site Scripting via Administration Page of Cisco Unified Communications Manager, in order to run JavaScript code in the context of the web site...
Cisco IOS, IOS XE: directory traversal via Application-Hosting Framework
An attacker can traverse directories via Application-Hosting Framework of Cisco IOS or IOS XE, in order to read a file outside the service root path...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 658 659 660 661 662 663 664 665 666 668 670 671 672 673 674 675 676 677 678 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1020