The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Symantec Endpoint Protection: three vulnerabilities
An attacker can use several vulnerabilities of Symantec Endpoint Protection...
F5 BIG-IP: privilege escalation via SNMPv2 Default Community String
An attacker can bypass restrictions via SNMPv2 Default Community String of F5 BIG-IP, in order to escalate his privileges...
WordPress Yoast SEO: code execution via ZIP Import
An attacker can use a vulnerability via ZIP Import of WordPress Yoast SEO, in order to run code...
QEMU: integer overflow via Bluetooth
An attacker, inside a guest system, can generate an integer overflow via Bluetooth of QEMU, in order to trigger a denial of service, and possibly to run code on the host system...
Wireshark: multiple vulnerabilities
An attacker can use several vulnerabilities of Wireshark...
Drupal Date Reminder: privilege escalation
An attacker can bypass restrictions of Drupal Date Reminder, in order to escalate his privileges...
Drupal GatherContent: privilege escalation
An attacker can bypass restrictions of Drupal GatherContent, in order to escalate his privileges...
Drupal Bootstrap: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Bootstrap, in order to run JavaScript code in the context of the web site...
Magento Commerce/OpenSource: multiple vulnerabilities
An attacker can use several vulnerabilities of Magento Commerce/OpenSource...
Node Core: five vulnerabilities
An attacker can use several vulnerabilities of Node Core...
IBM DB2 LUW: file reading via IBM Spectrum Scale
A local attacker can read a file via IBM Spectrum Scale of IBM DB2 LUW, in order to obtain sensitive information...
IBM DB2: buffer overflow via db2pdcfg
An attacker can generate a buffer overflow via db2pdcfg of IBM DB2, in order to trigger a denial of service, and possibly to run code...
FreeBSD: privilege escalation via Loader Password
An attacker can bypass restrictions via Loader Password of FreeBSD, in order to escalate his privileges...
FreeBSD: buffer overflow via ICMP non-default net.inet.icmp.quotelen
An attacker can generate a buffer overflow via ICMP non-default net.inet.icmp.quotelen of FreeBSD, in order to trigger a denial of service, and possibly to run code...
FreeBSD: memory corruption via NFS Server
An attacker can generate a memory corruption via NFS Server of FreeBSD, in order to trigger a denial of service, and possibly to run code...
Ruby Loofah: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Ruby Loofah, in order to run JavaScript code in the context of the web site...
Git: code execution via run_command
An attacker can use a vulnerability via run_command() of Git, in order to run code...
WebKitGTK+: memory corruption
An attacker can generate a memory corruption of WebKitGTK+, in order to trigger a denial of service, and possibly to run code...
WebKitGTK+: memory corruption
An attacker can generate a memory corruption of WebKitGTK+, in order to trigger a denial of service, and possibly to run code...
Ghostscript: privilege escalation via psi/zfjbig2.c-JBIG2Decode
An attacker can bypass restrictions via psi/zfjbig2.c::JBIG2Decode of Ghostscript, in order to escalate his privileges...
Ghostscript: privilege escalation via psi/zicc.c-setcolorspace
An attacker can bypass restrictions via psi/zicc.c::setcolorspace of Ghostscript, in order to escalate his privileges...
Ghostscript: privilege escalation via psi/zdevice2.c
An attacker can bypass restrictions via psi/zdevice2.c of Ghostscript, in order to escalate his privileges...
Ghostscript: privilege escalation via LockSafetyParams
An attacker can bypass restrictions via LockSafetyParams of Ghostscript, in order to escalate his privileges...
Node.js flatmap-stream: code execution via Malicious Code
An attacker can use a vulnerability via Malicious Code of Node.js flatmap-stream, in order to run code...
WordPress Easy Testimonials: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Easy Testimonials, in order to run JavaScript code in the context of the web site...
Samba: multiple vulnerabilities via AD DC
An attacker can use several vulnerabilities via AD DC of Samba...
MariaDB Connector/C: memory leak
An attacker can create a memory leak of MariaDB Connector/C, in order to trigger a denial of service...
Linux kernel: NULL pointer dereference via __netlink_ns_capable
An attacker can force a NULL pointer to be dereferenced via __netlink_ns_capable() of the Linux kernel, in order to trigger a denial of service...
keepalived: buffer overflow via extract_status_code
An attacker can generate a buffer overflow via extract_status_code of keepalived, in order to trigger a denial of service, and possibly to run code...
Joomla Music Collection: SQL injection
An attacker can use a SQL injection of Joomla Music Collection, in order to read or alter data...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 877 878 879 880 881 882 883 884 885 887 889 890 891 892 893 894 895 896 897 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1103