The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
PIUS: information disclosure via pius-keyring-mgr
An attacker can bypass access restrictions to data via pius-keyring-mgr of PIUS, in order to obtain sensitive information...
Apache Struts 2.3: code execution via Struts 1 Plugin With Raw Message
An attacker can use a vulnerability via Struts 1 Plugin With Raw Message of Apache Struts 2.3, in order to run code...
IBM MQ: information disclosure via Trace
An attacker can bypass access restrictions to data via Trace of IBM MQ, in order to obtain sensitive information...
IBM MQ: information disclosure via Java/JMS Application
An attacker can bypass access restrictions to data via Java/JMS Application of IBM MQ, in order to obtain sensitive information...
QEMU: buffer overflow via usbredir_log_data
An attacker, inside a guest system, can generate a buffer overflow via usbredir_log_data() of QEMU, in order to trigger a denial of service, and possibly to run code on the host system...
IBM MQ: denial of service via Channel Status Inquiry
An attacker can generate a fatal error via Channel Status Inquiry of IBM MQ, in order to trigger a denial of service...
libxml2: buffer overflow via HTTP Port Redirect
An attacker can generate a buffer overflow via HTTP Port Redirect of libxml2, in order to trigger a denial of service, and possibly to run code...
libquicktime: multiple vulnerabilities
An attacker can use several vulnerabilities of libquicktime...
ncurses: memory corruption via fmt_entry
An attacker can generate a memory corruption via fmt_entry() of ncurses, in order to trigger a denial of service, and possibly to run code...
ncurses: buffer overflow via fmt_entry
An attacker can generate a buffer overflow via fmt_entry() of ncurses, in order to trigger a denial of service, and possibly to run code...
WordPress Shortcodes Ultimate: directory traversal
An attacker can traverse directories of WordPress Shortcodes Ultimate, in order to read a file outside the service root path...
Android OS: multiple vulnerabilities of July 2017
An attacker can use several vulnerabilities of Android OS...
Node.js hftp: directory traversal
An attacker can traverse directories of Node.js hftp, in order to read a file outside the service root path...
Node.js gfe-sass: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on Node.js gfe-sass, in order to read or write data in the session...
Node.js ikst: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on Node.js ikst, in order to read or write data in the session...
Node.js growl: code execution via Command Injection
An attacker can use a vulnerability via Command Injection of Node.js growl, in order to run code...
Node.js shout: Cross Site Scripting via Topic
An attacker can trigger a Cross Site Scripting via Topic of Node.js shout, in order to run JavaScript code in the context of the web site...
SIMATIC Logon: denial of service via 16389/tcp
An attacker can generate a fatal error via 16389/tcp of SIMATIC Logon, in order to trigger a denial of service...
FFmpeg: file reading via HTTP Live Streaming
A local attacker can read a file via HTTP Live Streaming of FFmpeg, in order to obtain sensitive information...
Radare2: buffer overflow via grub_memmove
An attacker can generate a buffer overflow via grub_memmove() of Radare2, in order to trigger a denial of service, and possibly to run code...
X.org: information disclosure via Event Endianess
An attacker can bypass access restrictions to data via Event Endianess of X.org, in order to obtain sensitive information...
X.org: buffer overflow via X Events
An attacker can generate a buffer overflow via X Events of X.org, in order to trigger a denial of service, and possibly to run code...
Cisco Nexus: read-write access via Telnet CLI Command Injection
An attacker can bypass access restrictions via Telnet CLI Command Injection of Cisco Nexus, in order to read or alter data...
Cisco Nexus: code execution via CLI Command Injection
An attacker can use a vulnerability via CLI Command Injection of Cisco Nexus, in order to run code...
Cisco IOS XR: denial of service via MSDP
An attacker can send malicious MSDP packets to Cisco IOS XR, in order to trigger a denial of service...
Cisco IOS XR: privilege escalation via CLI
An attacker can bypass restrictions via CLI of Cisco IOS XR, in order to escalate his privileges...
XnView: multiple vulnerabilities
An attacker can use several vulnerabilities of XnView...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 719 720 721 722 723 724 725 726 727 729 731 732 733 734 735 736 737 738 739 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021