The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
TYPO3 phar-stream-wrapper: vulnerability
A vulnerability of TYPO3 phar-stream-wrapper was announced...
Grafana: privilege escalation via Org-Admin/Alerting Pages
An attacker can bypass restrictions via Org-Admin/Alerting Pages of Grafana, in order to escalate his privileges...
PHP: multiple vulnerabilities
An attacker can use several vulnerabilities of PHP...
Eclipse OpenJ9: NULL pointer dereference via Receiver Object
An attacker can force a NULL pointer to be dereferenced via Receiver Object of Eclipse OpenJ9, in order to trigger a denial of service...
Drupal Ubercart: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of Drupal Ubercart, in order to force the victim to perform operations...
Drupal voor Gemeenten: privilege escalation
An attacker can bypass restrictions of Drupal voor Gemeenten, in order to escalate his privileges...
Drupal EU Cookie Compliance: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal EU Cookie Compliance, in order to run JavaScript code in the context of the web site...
OpenSSL: information disclosure via ChaCha20-Poly1305 Long Nonces
An attacker can bypass access restrictions to data via ChaCha20-Poly1305 Long Nonces of OpenSSL, in order to obtain sensitive information...
Cisco NX-OS/Nexus: multiple vulnerabilities
An attacker can use several vulnerabilities of Cisco NX-OS/Nexus...
Cisco ASA: denial of service via HTTP URL
An attacker can trigger a fatal error via HTTP URL of Cisco ASA, in order to trigger a denial of service...
Jenkins Plugins: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins Plugins...
Notepad++: multiple vulnerabilities
An attacker can use several vulnerabilities of Notepad++...
WordPress Blog2Social: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Blog2Social, in order to run JavaScript code in the context of the web site...
WordPress Quiz And Survey Master: Cross Site Scripting via quiz_id
An attacker can trigger a Cross Site Scripting via quiz_id of WordPress Quiz And Survey Master, in order to run JavaScript code in the context of the web site...
Linux kernel: privilege escalation via Zero Address Mapping expand_downwards
An attacker can bypass restrictions via Zero Address Mapping expand_downwards() of the Linux kernel, in order to escalate his privileges...
Hiawatha: directory traversal via AllowDotFiles
An attacker can traverse directories via AllowDotFiles of Hiawatha, in order to read a file outside the service root path...
gpsd: buffer overflow via JSON Parser
An attacker can trigger a buffer overflow via JSON Parser of gpsd, in order to trigger a denial of service, and possibly to run code...
Erusev Parsedown: Cross Site Scripting via setMarkupEscaped
An attacker can trigger a Cross Site Scripting via setMarkupEscaped of Erusev Parsedown, in order to run JavaScript code in the context of the web site...
Smarty: directory traversal via Include Statement
An attacker can traverse directories via Include Statement of Smarty, in order to read a file outside the service root path...
Smarty: directory traversal via Smarty_Security-isTrustedResourceDir
An attacker can traverse directories via Smarty_Security::isTrustedResourceDir() of Smarty, in order to read a file outside the service root path...
Ignition: information disclosure via Log Files
An attacker can bypass access restrictions to data via Log Files of Ignition, in order to obtain sensitive information...
IBM Java: privilege escalation via RPATH
An attacker can bypass restrictions via RPATH of IBM Java, in order to escalate his privileges...
Eclipse OpenJ9: buffer overflow via jio_snprintf
An attacker can trigger a buffer overflow via jio_snprintf() of Eclipse OpenJ9, in order to trigger a denial of service, and possibly to run code...
Google Android/Pixel: multiple vulnerabilities of March 2019
An attacker can use several vulnerabilities of Google Android/Pixel...
Xen: denial of service via Insufficient TLB Flushing
An attacker, inside a guest system, can trigger a fatal error via Insufficient TLB Flushing of Xen, in order to trigger a denial of service on the host system...
Xen: privilege escalation via PV Kernel Context Switch
An attacker, inside a guest system, can bypass restrictions via PV Kernel Context Switch of Xen, in order to escalate his privileges on the host system...
Xen: privilege escalation via Insufficient TLB Flushing
An attacker, inside a guest system, can bypass restrictions via Insufficient TLB Flushing of Xen, in order to escalate his privileges on the host system...
Xen: denial of service via Failed IOMMU Update
An attacker, inside a guest system, can trigger a fatal error via Failed IOMMU Update of Xen, in order to trigger a denial of service on the host system...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 903 904 905 906 907 908 909 910 911 913 915 916 917 918 919 920 921 922 923 941 961 981 1001 1021 1041 1061 1081 1101 1103