The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
System x: information disclosure via IMM2 FFDC
An attacker can bypass access restrictions to data via IMM2 FFDC of System x, in order to obtain sensitive information...
BusyBox: buffer overflow via DHCP Client OPTION_6RD
An attacker can generate a buffer overflow via DHCP Client OPTION_6RD of BusyBox, in order to trigger a denial of service, and possibly to run code...
BusyBox: integer overflow via DHCP Client
An attacker can generate an integer overflow via DHCP Client of BusyBox, in order to trigger a denial of service, and possibly to run code...
BusyBox: denial of service via huft_build
An attacker can generate a fatal error via huft_build() of BusyBox, in order to trigger a denial of service...
Syntastic: code execution via Gcc Plugin
An attacker can use a vulnerability via Gcc Plugin of Syntastic, in order to run code...
libsndfile: buffer overflow via psf_memset
An attacker can generate a buffer overflow via psf_memset() of libsndfile, in order to trigger a denial of service, and possibly to run code...
WildFly: directory traversal
An attacker can traverse directories of WildFly, in order to create a file outside the service root path. This vulnerability is a member of the Zip Slip family (VIGILANCE-VUL-26357)...
Apache CXF: Man-in-the-Middle via com.sun.net.ssl
An attacker can act as a Man-in-the-Middle via com.sun.net.ssl on Apache CXF, in order to read or write data in the session...
Apache Kafka: denial of service via Data Replication
An attacker can generate a fatal error via Data Replication of Apache Kafka, in order to trigger a denial of service...
Apache Kafka: privilege escalation via SASL
An attacker can bypass restrictions via SASL of Apache Kafka, in order to escalate his privileges...
WordPress Mondula Multi Step Form: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Mondula Multi Step Form, in order to run JavaScript code in the context of the web site...
Linux kernel, Xen: memory corruption via PV Syscall Return Path
An attacker can generate a memory corruption via PV Syscall Return Path of Xen, in order to trigger a denial of service, and possibly to run code...
OpenStack Keystone: information disclosure via GET /v3/OS-FEDERATION/projects
An attacker can bypass access restrictions to data via GET /v3/OS-FEDERATION/projects of OpenStack Keystone, in order to obtain sensitive information...
Drupal Select Or Other: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Select Or Other, in order to run JavaScript code in the context of the web site...
WordPress Gwolle Guestbook: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Gwolle Guestbook, in order to run JavaScript code in the context of the web site...
WordPress Strong Testimonials: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Strong Testimonials, in order to run JavaScript code in the context of the web site...
WordPress Snazzy Maps: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Snazzy Maps, in order to run JavaScript code in the context of the web site...
Google Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
OpenBSD 6.3: denial of service via Expired IPsec Key
An attacker can generate a fatal error via Expired IPsec Key of OpenBSD 6.3, in order to trigger a denial of service...
OpenBSD: denial of service via sys/kern/exec_elf.c
An attacker can generate a fatal error via sys/kern/exec_elf.c of OpenBSD, in order to trigger a denial of service...
F5 BIG-IP: denial of service via HTML Rewrite Profile
An attacker can generate a fatal error via HTML Rewrite Profile of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP ASM: denial of service via CSRF Protections
An attacker can generate a fatal error via CSRF Protections of F5 BIG-IP ASM, in order to trigger a denial of service...
F5 BIG-IP: denial of service via vCMP
An attacker can generate a fatal error via vCMP of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: denial of service via HPACK Bomb
An attacker can generate a fatal error via HPACK Bomb of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: denial of service via DNS Express
An attacker can generate a fatal error via DNS Express of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP APM: memory leak via Per-request Policy Object
An attacker can create a memory leak via Per-request Policy Object of F5 BIG-IP APM, in order to trigger a denial of service...
F5 BIG-IP ASM: denial of service via HTTP Requests
An attacker can generate a fatal error via HTTP Requests of F5 BIG-IP ASM, in order to trigger a denial of service...
F5 BIG-IP: Man-in-the-Middle via HTTPS Monitor
An attacker can act as a Man-in-the-Middle via HTTPS Monitor on F5 BIG-IP, in order to read or write data in the session...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 842 843 844 845 846 847 848 849 850 852 854 855 856 857 858 859 860 861 862 881 901 921 941 961 981 1001 1012