The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
2 Cisco UCS E-Series Servers: privilege escalation via BIOS Authentication Bypass
An attacker can bypass restrictions via BIOS Authentication Bypass of Cisco UCS E-Series Servers, in order to escalate his privileges...
1 Cisco AnyConnect Secure Mobility Client for Windows Desktop: denial of service
An attacker can generate a fatal error of Cisco AnyConnect Secure Mobility Client for Windows Desktop, in order to trigger a denial of service...
2 Symantec Endpoint Protection: two vulnerabilities
An attacker can use several vulnerabilities of Symantec Endpoint Protection...
2 Matrix Synapse: information disclosure via on_get_missing_events
An attacker can bypass access restrictions to data via on_get_missing_events() of Matrix Synapse, in order to obtain sensitive information...
2 TiMidity++: denial of service via play_midi
An attacker can generate a fatal error via play_midi() of TiMidity++, in order to trigger a denial of service...
2 Linux kernel: integer overflow via wmi_set_ie
An attacker can generate an integer overflow via wmi_set_ie() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
2 pam-modules: privilege escalation via unix2_chkpwd
An attacker can bypass restrictions via unix2_chkpwd of pam-modules, in order to escalate his privileges...
3 WordPress Comments Import and Export: code execution via CSV Injection
An attacker can use a vulnerability via CSV Injection of WordPress Comments Import & Export, in order to run code...
3 WordPress Advanced Order Export For WooCommerce: code execution via CSV Injection
An attacker can use a vulnerability via CSV Injection of WordPress Advanced Order Export For WooCommerce, in order to run code...
2 Cobbler Koan: code execution via reposync
An attacker can use a vulnerability via reposync of Cobbler Koan, in order to run code...
2 Ansible Core: information disclosure via Failed Tasks Log
An attacker can bypass access restrictions to data via Failed Tasks Log of Ansible Core, in order to obtain sensitive information...
2 Perl Email-Address: denial of service via Regular Expression
An attacker can generate a fatal error via Regular Expression of Perl Email::Address, in order to trigger a denial of service...
3 Oracle Outside In Technology: vulnerabilities of April 2018
Several vulnerabilities were announced in Oracle products...
2 Nikto: code execution via CSV Injection
An attacker can use a vulnerability via CSV Injection of Nikto, in order to run code...
2 Grafana: privilege escalation via API Keys Dashboard Overwrite
An attacker can bypass restrictions via API Keys Dashboard Overwrite of Grafana, in order to escalate his privileges...
2 aubio: NULL pointer dereference via aubio_source_avcodec_readframe
An attacker can force a NULL pointer to be dereferenced via aubio_source_avcodec_readframe() of aubio, in order to trigger a denial of service...
2 WordPress Quick Chat: SQL injection
An attacker can use a SQL injection of WordPress Quick Chat, in order to read or alter data...
2 WebKitGTK+: integer overflow via ImageBufferCairo
An attacker can generate an integer overflow via ImageBufferCairo of WebKitGTK+, in order to trigger a denial of service, and possibly to run code...
2 Berkeley DB: multiple vulnerabilities
An attacker can use several vulnerabilities of Berkeley DB...
2 DFArc: directory traversal via D-Mod Extractor
An attacker can traverse directories via D-Mod Extractor of DFArc, in order to read a file outside the service root path...
2 Epiphany: NULL pointer dereference via ephy-session.c
An attacker can force a NULL pointer to be dereferenced via ephy-session.c of Epiphany, in order to trigger a denial of service...
2 LibRaw: integer overflow via NOKIARAW
An attacker can generate an integer overflow via NOKIARAW of LibRaw, in order to trigger a denial of service, and possibly to run code...
2 WebKit: denial of service via webkitFaviconDatabaseSetIconForPageURL
An attacker can generate a fatal error via webkitFaviconDatabaseSetIconForPageURL of WebKit, in order to trigger a denial of service...
3 WebKit: memory corruption
An attacker can generate a memory corruption of WebKit, in order to trigger a denial of service, and possibly to run code...
3 WebKit: multiple vulnerabilities
An attacker can use several vulnerabilities of WebKit...
2 Singularity: multiple vulnerabilities
An attacker can use several vulnerabilities of Singularity...
2 Redis: integer overflow via Lua struct
An attacker can generate an integer overflow via Lua struct of Redis, in order to trigger a denial of service, and possibly to run code...
2 Redis: memory corruption via Lua cmsgpack
An attacker can generate a memory corruption via Lua cmsgpack of Redis, in order to trigger a denial of service, and possibly to run code...
2 strongSwan: denial of service via IKEv2 Key Derivation FIPS PRF HMAC-MD5
An attacker can generate a fatal error via IKEv2 Key Derivation FIPS PRF HMAC-MD5 of strongSwan, in order to trigger a denial of service...
2 Spring Framework: information disclosure via Cross-Domain Requests
An attacker can bypass access restrictions to data via Cross-Domain Requests of Spring Framework, in order to obtain sensitive information...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 829 830 831 832 833 834 835 836 837 839 841 842 843 844 845 846 847 848 849 861 881 901 921 941 961 981 996