The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
F5 BIG-IP AAM: privilege escalation via wamd
An attacker can bypass restrictions via wamd of F5 BIG-IP AAM, in order to escalate his privileges...
F5 BIG-IP: Cross Site Scripting via Configuration Utility
An attacker can trigger a Cross Site Scripting via Configuration Utility of F5 BIG-IP, in order to run JavaScript code in the context of the web site...
IBM API Connect: information disclosure via Consumer API
An attacker can bypass access restrictions to data via Consumer API of IBM API Connect, in order to obtain sensitive information...
OVMF: denial of service via DNS Header Size
An attacker can trigger a fatal error via DNS Header Size of OVMF, in order to trigger a denial of service...
OVMF: buffer overflow via BlockIo
An attacker can trigger a buffer overflow via BlockIo of OVMF, in order to trigger a denial of service, and possibly to run code...
OVMF: privilege escalation via FV Parsing
An attacker can bypass restrictions via FV Parsing of OVMF, in order to escalate his privileges...
Micro Focus ArcSight Logger: six vulnerabilities
An attacker can use several vulnerabilities of Micro Focus ArcSight Logger...
libcomps: use after free via comps_objmradix.c-comps_objmrtree_unite
An attacker can force the usage of a freed memory area via comps_objmradix.c:comps_objmrtree_unite() of libcomps, in order to trigger a denial of service, and possibly to run code...
Zabbix: multiple vulnerabilities
An attacker can use several vulnerabilities of Zabbix...
Zabbix: open redirect via Request Parameter
An attacker can deceive the user via Request Parameter of Zabbix, in order to redirect him to a malicious site...
XMLTooling: denial of service via Malformed XML Declaration
An attacker can trigger a fatal error via Malformed XML Declaration of XMLTooling, in order to trigger a denial of service...
glibc: information disclosure via getaddrinfo Accepted Invalid IPv4 Address
An attacker can bypass access restrictions to data via getaddrinfo() Accepted Invalid IPv4 Address of glibc, in order to obtain sensitive information...
WordPress Contact Form Email: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Contact Form Email, in order to run JavaScript code in the context of the web site...
WordPress WP Fastest Cache: denial of service via File Deletion
An attacker can trigger a fatal error via File Deletion of WordPress WP Fastest Cache, in order to trigger a denial of service...
Evolution: information disclosure via Spoofed OpenPGP Signatures
An attacker can bypass access restrictions to data via Spoofed OpenPGP Signatures of Evolution, in order to obtain sensitive information...
Poppler: buffer overflow via ImageStream-getLine
An attacker can trigger a buffer overflow via ImageStream::getLine() of Poppler, in order to trigger a denial of service, and possibly to run code...
Windows: privilege escalation via win32k-MNGetpItemFromIndex NtUserMNDragOver
An attacker can bypass restrictions via win32k::MNGetpItemFromIndex NtUserMNDragOver() of Windows, in order to escalate his privileges...
NTP.org: NULL pointer dereference via Authenticated Mode 6
An attacker can force a NULL pointer to be dereferenced via Authenticated Mode 6 of NTP.org, in order to trigger a denial of service...
Bootstrap: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Bootstrap, in order to run JavaScript code in the context of the web site...
IBM MQ: privilege escalation via Code Injection
An attacker can bypass restrictions via Code Injection of IBM MQ, in order to escalate his privileges...
IBM MQ: privilege escalation via Multiplexed Channels
An attacker can bypass restrictions via Multiplexed Channels of IBM MQ, in order to escalate his privileges...
OTRS Help Desk: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of OTRS Help Desk, in order to run JavaScript code in the context of the web site...
GNU Binutils: three vulnerabilities
An attacker can use several vulnerabilities of GNU Binutils...
NetApp Data ONTAP: code execution via NetApp Service Processor Privileged Account
An attacker can use a vulnerability via NetApp Service Processor Privileged Account of NetApp Data ONTAP, in order to run code...
Webmin/Usermin: code execution via Java File Manager / Upload And Download
An attacker can use a vulnerability via Java File Manager / Upload And Download of Webmin/Usermin, in order to run code...
NVIDIA: information disclosure via GPU Performance Counters
An attacker can bypass access restrictions to data via GPU Performance Counters of NVIDIA, in order to obtain sensitive information...
Python: information disclosure via Punycode/IDNA NFKC Normalization
An attacker can bypass access restrictions to data via Punycode/IDNA NFKC Normalization of Python, in order to obtain sensitive information...
IBM DB2: six vulnerabilities
An attacker can use several vulnerabilities of IBM DB2...
WebSphere AS: privilege escalation via Spoof Connection Information
An attacker can bypass restrictions via Spoof Connection Information of WebSphere AS, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 904 905 906 907 908 909 910 911 912 914 916 917 918 919 920 921 922 923 924 941 961 981 1001 1021 1041 1061 1081 1101 1116