The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Drupal OAuth 2.0 Client Login: privilege escalation
An attacker can bypass restrictions of Drupal OAuth 2.0 Client Login, in order to escalate his privileges...
Drupal Focal Point: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Focal Point, in order to run JavaScript code in the context of the web site...
Sonatype Nexus Repository Manager: code execution via Java Code
An attacker can use a vulnerability via Java Code of Sonatype Nexus Repository Manager, in order to run code...
Django: memory corruption via django.utils.numberformat.format
An attacker can trigger a memory corruption via django.utils.numberformat.format() of Django, in order to trigger a denial of service, and possibly to run code...
WebKitGTK+: multiple vulnerabilities
An attacker can use several vulnerabilities of WebKitGTK+...
Python Slixmpp: privilege escalation via XEP-0223 Plugin
An attacker can bypass restrictions via XEP-0223 Plugin of Python Slixmpp, in order to escalate his privileges...
Firefox: information disclosure via ImageBitmapRenderingContext
An attacker can bypass access restrictions to data via ImageBitmapRenderingContext of Firefox, in order to obtain sensitive information...
Skia: integer overflow via Transform Operations
An attacker can trigger an integer overflow via Transform Operations of Skia, in order to trigger a denial of service, and possibly to run code...
Skia: use after free via Path Creation
An attacker can force the usage of a freed memory area via Path Creation of Skia, in order to trigger a denial of service, and possibly to run code...
CA Privileged Access Manager: privilege escalation via jk-manager/jk-status
An attacker can bypass restrictions via jk-manager/jk-status of CA Privileged Access Manager, in order to escalate his privileges...
Joomla Core: multiple vulnerabilities
An attacker can use several vulnerabilities of Joomla Core...
GVfs: information disclosure
An attacker can bypass access restrictions to data of GVfs, in order to obtain sensitive information...
snapd: privilege escalation via Socket Access Control
An attacker can bypass restrictions via Socket Access Control of snapd, in order to escalate his privileges...
Python Numpy: code execution via allow_pickle
An attacker can use a vulnerability via allow_pickle of Python Numpy, in order to run code...
Linux kernel: information disclosure via kvm_read_guest_virt
A local attacker can read a memory fragment via kvm_read_guest_virt() of the Linux kernel, in order to obtain sensitive information...
Linux kernel: privilege escalation via kvm_ioctl_create_device
An attacker can bypass restrictions via kvm_ioctl_create_device() of the Linux kernel, in order to escalate his privileges...
Linux kernel: privilege escalation via KVM Preemption Timer
An attacker can bypass restrictions via KVM Preemption Timer of the Linux kernel, in order to escalate his privileges...
IBM Rational ClearCase: privilege escalation via GIT Connector Password
An attacker can bypass restrictions via GIT Connector Password of IBM Rational ClearCase, in order to escalate his privileges...
Flatpak: privilege escalation via apply_extra
An attacker can bypass restrictions via apply_extra of Flatpak, in order to escalate his privileges...
Windows: vulnerabilities of February 2019
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Skype for Business Server: information disclosure via Spoofing
An attacker can bypass access restrictions to data via Spoofing of Microsoft Skype for Business Server, in order to obtain sensitive information...
Microsoft Office: vulnerabilities of February 2019
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Exchange: vulnerabilities of February 2019
An attacker can use several vulnerabilities of Microsoft products...
Microsoft .NET: vulnerabilities of February 2019
An attacker can use several vulnerabilities of Microsoft products...
Microsoft IE/Edge: vulnerabilities of February 2019
An attacker can use several vulnerabilities of Microsoft products...
Adobe Acrobat/Reader: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Acrobat/Reader...
Adobe Flash Player: out-of-bounds memory reading
An attacker can force a read at an invalid address of Adobe Flash Player, in order to trigger a denial of service, or to obtain sensitive information...
Python urllib3: information disclosure via TLS Certificate Validation
An attacker can bypass access restrictions to data via TLS Certificate Validation of Python urllib3, in order to obtain sensitive information...
Avast Antivirus: information disclosure via Process Memory
An attacker can bypass access restrictions to data via Process Memory of Avast Antivirus, in order to obtain sensitive information...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 897 898 899 900 901 902 903 904 905 907 909 910 911 912 913 914 915 916 917 921 941 961 981 1001 1021 1041 1061 1081 1101 1114