The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Drupal Views: information disclosure via Exposed Filters
An attacker can bypass access restrictions to data via Exposed Filters of Drupal Views, in order to obtain sensitive information...
Drupal Views: information disclosure via Argument Definitions Failing
An attacker can bypass access restrictions to data via Argument Definitions Failing of Drupal Views, in order to obtain sensitive information...
Civetweb: descriptor leak via SSL Connections Denied
An attacker can create a descriptor leak via SSL Connections Denied of Civetweb, in order to trigger a denial of service...
Centreon: multiple vulnerabilities
An attacker can use several vulnerabilities of Centreon...
Cockpit: denial of service via Base64 Headers
An attacker can trigger a fatal error via Base64 Headers of Cockpit, in order to trigger a denial of service...
libsndfile: out-of-bounds memory reading via wav_write_header
An attacker can force a read at an invalid address via wav_write_header() of libsndfile, in order to trigger a denial of service, or to obtain sensitive information...
OpenStack Neutron: privilege escalation via Iptables Unsupported Destination Port
An attacker can bypass restrictions via Iptables Unsupported Destination Port of OpenStack Neutron, in order to escalate his privileges...
Google Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
Joomla Core: four vulnerabilities
An attacker can use several vulnerabilities of Joomla Core...
WordPress Core: Cross Site Scripting via Comments
An attacker can trigger a Cross Site Scripting via Comments of WordPress Core, in order to run JavaScript code in the context of the web site...
Openswan: memory leak
An attacker can create a memory leak of Openswan, in order to trigger a denial of service...
IBM DB2: privilege escalation via Shared Libraries Loading
An attacker can bypass restrictions via Shared Libraries Loading of IBM DB2, in order to escalate his privileges...
PostgreSQL JDBC driver: Man-in-the-Middle via Host Name Unchecked
An attacker can act as a Man-in-the-Middle via Host Name Unchecked on PostgreSQL JDBC driver, in order to read or write data in the session...
Apache Guacamole: information disclosure via Insecure Cookie
An attacker can bypass access restrictions to data via Insecure Cookie of Apache Guacamole, in order to obtain sensitive information...
Linux kernel: denial of service via ELF Loader
An attacker can trigger a fatal error via ELF Loader of the Linux kernel, in order to trigger a denial of service...
WALinuxAgent: information disclosure via Swap Files
An attacker can bypass access restrictions to data via Swap Files of WALinuxAgent, in order to obtain sensitive information...
Windows: vulnerabilities of March 2019
An attacker can use several vulnerabilities of Microsoft products...
Skype for Business Server 2015: information disclosure via Spoofing
An attacker can bypass access restrictions to data via Spoofing of Skype for Business Server 2015, in order to obtain sensitive information...
Microsoft Visual Studio: code execution via DLL Loading
An attacker can use a vulnerability via DLL Loading of Microsoft Visual Studio, in order to run code...
Microsoft Office/SharePoint: vulnerabilities of March 2019
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Lync Server 2013: information disclosure via Spoofing
An attacker can bypass access restrictions to data via Spoofing of Microsoft Lync Server 2013, in order to obtain sensitive information...
Microsoft IE/Edge: vulnerabilities of March 2019
An attacker can use several vulnerabilities of Microsoft products...
SAP: multiples vulnerabilities of March 2019
An attacker can use several vulnerabilities of SAP products...
Node.js safer-eval: code execution via Sandbox Breakout
An attacker can use a vulnerability via Sandbox Breakout of Node.js safer-eval, in order to run code...
F5 BIG-IP APM: memory corruption via DTLS ClientHello
An attacker can trigger a memory corruption via DTLS ClientHello of F5 BIG-IP APM, in order to trigger a denial of service, and possibly to run code...
F5 BIG-IP: Cross Site Scripting via JSON Response
An attacker can trigger a Cross Site Scripting via JSON Response of F5 BIG-IP, in order to run JavaScript code in the context of the web site...
F5 BIG-IP: denial of service via TMUI
An attacker can trigger a fatal error via TMUI of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: privilege escalation via TMUI
An attacker can bypass restrictions via TMUI of F5 BIG-IP, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 905 906 907 908 909 910 911 912 913 915 917 918 919 920 921 922 923 924 925 941 961 981 1001 1021 1041 1061 1081 1101 1103