The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Node.js react-marked-markdown: Cross Site Scripting via HREF Attributes
An attacker can trigger a Cross Site Scripting via HREF Attributes of Node.js react-marked-markdown, in order to run JavaScript code in the context of the web site...
Symantec Content Analysis: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of Symantec Content Analysis, in order to force the victim to perform operations...
Red Hat JBoss EAP: code execution via ReadOnlyAccessFilter
An attacker can use a vulnerability via ReadOnlyAccessFilter of Red Hat JBoss EAP, in order to run code...
OpenBSD: denial of service via IPsec/IPv6
An attacker can send malicious IPsec/IPv6 packets to OpenBSD, in order to trigger a denial of service...
xdg-utils: code execution via open_envvar
An attacker can use a vulnerability via open_envvar() of xdg-utils, in order to run code...
Node.js Modules: multiple vulnerabilities
An attacker can use several vulnerabilities of Node.js Modules...
Linux kernel: information disclosure via compat_get_timex
A local attacker can read a memory fragment via compat_get_timex() of the Linux kernel, in order to obtain sensitive information...
FortiOS: privilege escalation via SSL Deep-Inspection
An attacker can bypass restrictions via SSL Deep-Inspection of FortiOS, in order to escalate his privileges...
Cisco Unified Communications Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Unified Communications Manager, in order to run JavaScript code in the context of the web site...
Cisco IP Phone 7800/8800/8821: denial of service via SIP SDP
An attacker can generate a fatal error via SIP SDP of Cisco IP Phone 7800/8800/8821, in order to trigger a denial of service...
Apache Tomcat: privilege escalation via CORS Filter SupportsCredentials All Origins
An attacker can bypass restrictions via CORS Filter SupportsCredentials All Origins of Apache Tomcat, in order to escalate his privileges...
libvorbis: out-of-bounds memory reading via bark_noise_hybridmp
An attacker can force a read at an invalid address via bark_noise_hybridmp() of libvorbis, in order to trigger a denial of service, or to obtain sensitive information...
libvorbis: out-of-bounds memory reading via bark_noise_hybridm
An attacker can force a read at an invalid address via bark_noise_hybridm() of libvorbis, in order to trigger a denial of service, or to obtain sensitive information...
libgxps: out-of-bounds memory reading via gxps_images_guess_content_type
An attacker can force a read at an invalid address via gxps_images_guess_content_type() of libgxps, in order to trigger a denial of service, or to obtain sensitive information...
Leptonica: directory traversal via gplotMakeOutput
An attacker can traverse directories via gplotMakeOutput() of Leptonica, in order to read a file outside the service root path...
Tenable Nessus: privilege escalation via Session Fixation
An attacker can bypass restrictions via Session Fixation of Tenable Nessus, in order to escalate his privileges...
Tenable Nessus: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Tenable Nessus, in order to run JavaScript code in the context of the web site...
Matrix: denial of service via matrix-synapse
An attacker can generate a fatal error via matrix-synapse of Matrix, in order to trigger a denial of service...
MySQL Multi-Master Replication Manager: code execution via MMM-Agent-Helpers-Network-send_arp
An attacker can use a vulnerability via MMM::Agent::Helpers::Network::send_arp() of MySQL Multi-Master Replication Manager, in order to run code...
MySQL Multi-Master Replication Manager: code execution via MMM-Agent-Helpers-_execute
An attacker can use a vulnerability via MMM::Agent::Helpers::_execute() of MySQL Multi-Master Replication Manager, in order to run code...
Fedora, RHEL: code execution via /etc/NetworkManager/dispatcher.d/11-dhclient
An attacker can use a vulnerability via /etc/NetworkManager/dispatcher.d/11-dhclient of Fedora/RHEL, in order to run code...
curl: buffer overflow via FTP Shutdown Response
An attacker can generate a buffer overflow via FTP Shutdown Response of curl, in order to trigger a denial of service, and possibly to run code...
curl: out-of-bounds memory reading via RTSP
An attacker can force a read at an invalid address via RTSP of curl, in order to trigger a denial of service, or to obtain sensitive information...
Poppler: denial of service
An attacker can generate a fatal error of Poppler, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 819 820 821 822 823 824 825 826 827 829 831 832 833 834 835 836 837 838 839 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1104