The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
2 F5 BIG-IP: information disclosure via HTTP Tab Character Parsing
An attacker can bypass access restrictions to data via HTTP Tab Character Parsing of F5 BIG-IP, in order to obtain sensitive information...
2 F5 BIG-IP APM: privilege escalation via PingAccess Caching User Impersonation
An attacker can bypass restrictions via PingAccess Caching User Impersonation of F5 BIG-IP APM, in order to escalate his privileges...
2 Symantec Ghost Solution Suite: code execution via DLL Hijacking
An attacker can use a vulnerability via DLL Hijacking of Symantec Ghost Solution Suite, in order to run code...
2 pfSense: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of pfSense, in order to run JavaScript code in the context of the web site...
2 Ceph: privilege escalation via Debug Logging Encryption Keys
An attacker can bypass restrictions via Debug Logging Encryption Keys of Ceph, in order to escalate his privileges...
2 Microsoft Exchange: privilege escalation via NTLM Relay Attack
An attacker can bypass restrictions via NTLM Relay Attack of Microsoft Exchange, in order to escalate his privileges...
3 Spice: memory corruption via Network Traffic
An attacker can trigger a memory corruption via Network Traffic of Spice, in order to trigger a denial of service, and possibly to run code...
3 Jenkins Plugins: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins Plugins...
2 PolicyKit: privilege escalation via Start Time Bypass
An attacker can bypass restrictions via Start Time Bypass of PolicyKit, in order to escalate his privileges...
3 Node.js stream-combine: code execution via Malicious Design
An attacker can use a vulnerability via Malicious Design of Node.js stream-combine, in order to run code...
3 Notepad++: multiple vulnerabilities
An attacker can use several vulnerabilities of Notepad++...
1 Linux kernel: infinite loop via hid_debug_events_read
An attacker can trigger an infinite loop via hid_debug_events_read() of the Linux kernel, in order to trigger a denial of service...
3 phpMyAdmin: SQL injection via Username
An attacker can use a SQL injection via Username of phpMyAdmin, in order to read or alter data...
2 phpMyAdmin: file reading via AllowArbitraryServer
A local attacker can read a file via AllowArbitraryServer of phpMyAdmin, in order to obtain sensitive information...
2 Linux kernel: memory corruption via drivers/vhost/net.c-get_rx_bufs
An attacker, inside a guest system, can trigger a memory corruption via drivers/vhost/net.c:get_rx_bufs() of the Linux kernel, in order to trigger a denial of service, and possibly to run code on the host system...
1 OpenBSD: memory leak via unveil
An attacker can create a memory leak via unveil() of OpenBSD, in order to trigger a denial of service...
1 OpenBSD: denial of service via NFS
An attacker can trigger a fatal error via NFS of OpenBSD, in order to trigger a denial of service...
1 OpenBSD: information disclosure via mincore
A local attacker can read a memory fragment via mincore() of OpenBSD, in order to obtain sensitive information...
3 coTURN: three vulnerabilities
An attacker can use several vulnerabilities of coTURN...
1 WordPress Wise Chat: open redirect
An attacker can deceive the user of WordPress Wise Chat, in order to redirect him to a malicious site...
2 CA Automic Workload Automation: Cross Site Scripting via AWI
An attacker can trigger a Cross Site Scripting via AWI of CA Automic Workload Automation, in order to run JavaScript code in the context of the web site...
2 runc: privilege escalation via pivot_root /proc mounting
An attacker can bypass restrictions via pivot_root /proc mounting of runc, in order to escalate his privileges...
2 QEMU: buffer overflow via tcp_emu
An attacker, inside a guest system, can trigger a buffer overflow via tcp_emu() of QEMU, in order to trigger a denial of service, and possibly to run code on the host system...
3 Mini-XML: buffer overflow via mxml_write_node
An attacker can trigger a buffer overflow via mxml_write_node() of Mini-XML, in order to trigger a denial of service, and possibly to run code...
2 IBM QRadar SIEM: information disclosure via Content Spoofing
An attacker can bypass access restrictions to data via Content Spoofing of IBM QRadar SIEM, in order to obtain sensitive information...
2 Node.js http-live-simulator: directory traversal
An attacker can traverse directories of Node.js http-live-simulator, in order to read a file outside the service root path...
2 Palo Alto PAN-OS: Cross Site Scripting via Management Web Interface
An attacker can trigger a Cross Site Scripting via Management Web Interface of Palo Alto PAN-OS, in order to run JavaScript code in the context of the web site...
2 Palo Alto PAN-OS: Cross Site Scripting via External Dynamic Lists
An attacker can trigger a Cross Site Scripting via External Dynamic Lists of Palo Alto PAN-OS, in order to run JavaScript code in the context of the web site...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 893 894 895 896 897 898 899 900 901 903 905 906 907 908 909 910 911 912 913 921 941 961 981 996