The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
IBM MQ: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of IBM MQ, in order to run JavaScript code in the context of the web site...
LibTIFF: buffer overflow via LZWDecodeCompat
An attacker can generate a buffer overflow via LZWDecodeCompat() of LibTIFF, in order to trigger a denial of service, and possibly to run code...
BIG-IP: denial of service via Specific Configuration
An attacker can generate a fatal error via Specific Configuration of BIG-IP, in order to trigger a denial of service...
BIG-IP: denial of service via DNS Profile Protocol TCP
An attacker can generate a fatal error via DNS Profile Protocol TCP of BIG-IP, in order to trigger a denial of service...
BIG-IP: memory corruption via WebSocket
An attacker can generate a memory corruption via WebSocket of BIG-IP, in order to trigger a denial of service, and possibly to run code...
BIG-IP: denial of service via PEM Policy Content Insertion
An attacker can generate a fatal error via PEM Policy Content Insertion of BIG-IP, in order to trigger a denial of service...
BIG-IP: denial of service via Client SSL Profile
An attacker can generate a fatal error via Client SSL Profile of BIG-IP, in order to trigger a denial of service...
Drupal Exif: privilege escalation
An attacker can bypass restrictions of Drupal Exif, in order to escalate his privileges...
Drupal JSON API: information disclosure
An attacker can bypass access restrictions to data of Drupal JSON API, in order to obtain sensitive information...
Exempi: five vulnerabilities
An attacker can use several vulnerabilities of Exempi...
Processeurs AMD: privilege escalation via Firmware CHIMERA
An attacker can bypass restrictions via Firmware CHIMERA of Processeurs AMD, in order to escalate his privileges...
Processeurs AMD: privilege escalation via Firmware FALLOUT
An attacker can bypass restrictions via Firmware FALLOUT of Processeurs AMD, in order to escalate his privileges...
Processeurs AMD: privilege escalation via Firmware RYZENFALL
An attacker can bypass restrictions via Firmware RYZENFALL of Processeurs AMD, in order to escalate his privileges...
Processeurs AMD: privilege escalation via Firmware MASTERKEY
An attacker can bypass restrictions via Firmware MASTERKEY of Processeurs AMD, in order to escalate his privileges...
Chrome: memory corruption
An attacker can generate a memory corruption of Chrome, in order to trigger a denial of service, and possibly to run code...
Synology Drive: multiple vulnerabilities
An attacker can use several vulnerabilities of Synology Drive...
X-Pack Security: privilege escalation via XML Canonicalization
An attacker can bypass restrictions via XML Canonicalization of X-Pack Security, in order to escalate his privileges...
Linux kernel: memory corruption via ncp_read_kernel
An attacker can generate a memory corruption via ncp_read_kernel() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
SIMATIC WinCC OA UI for Android/iOS: read-write access via HMI Project Cache
An attacker can bypass access restrictions via HMI Project Cache of SIMATIC WinCC OA UI for Android/iOS, in order to read or alter data...
SIMATIC: denial of service via PROFINET DCP
An attacker can send malicious PROFINET DCP packets to SIMATIC, in order to trigger a denial of service...
Paramiko: code execution via SSH
An attacker can use a vulnerability via SSH of Paramiko, in order to run code...
libgit2: denial of service via Repository Index File
An attacker can generate a fatal error via Repository Index File of libgit2, in order to trigger a denial of service...
Calibre: code execution via bookmarkmanager.py
An attacker can use a vulnerability via bookmarkmanager.py of Calibre, in order to run code...
Dolphin: vulnerability via xxhash
A vulnerability via xxhash of Dolphin was announced...
Spring Batch Admin: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of Spring Batch Admin, in order to force the victim to perform operations...
Spring Batch Admin: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Spring Batch Admin, in order to run JavaScript code in the context of the web site...
Synology CardDAV Server: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Synology CardDAV Server, in order to run JavaScript code in the context of the web site...
Synology File Station: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Synology File Station, in order to run JavaScript code in the context of the web site...
Tenable Nessus: privilege escalation via Installation Directory
An attacker can bypass restrictions via Installation Directory of Tenable Nessus, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 802 803 804 805 806 807 808 809 811 813 814 815 816 817 818 819 820 821 841 861 881 901 921 941 961 981 1001 1021 1036