The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Cisco Nexus 9000: privilege escalation via ACI Mode Shell Escape
An attacker can bypass restrictions via ACI Mode Shell Escape of Cisco Nexus 9000, in order to escalate his privileges...
Firefox/Thunderbird: multiple vulnerabilities
An attacker can use several vulnerabilities of Firefox/Thunderbird...
Veritas NetBackup Appliance: privilege escalation via Password Disclosure
An attacker can bypass restrictions via Password Disclosure of Veritas NetBackup Appliance, in order to escalate his privileges...
Mitel MiVoice 6800/6900: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on Mitel MiVoice 6800/6900, in order to read or write data in the session...
Synology DSM Calendar: code execution
An attacker can use a vulnerability of Synology DSM Calendar, in order to run code...
Linux kernel: memory leak via inotify_update_existing_watch
An attacker can create a memory leak via inotify_update_existing_watch() of the Linux kernel, in order to trigger a denial of service...
WordPress Booking Calendar: SQL injection
An attacker can use a SQL injection of WordPress Booking Calendar, in order to read or alter data...
WordPress Social Network Tabs: information disclosure
An attacker can bypass access restrictions to data of WordPress Social Network Tabs, in order to obtain sensitive information...
Openwsman: infinite loop via process_connection
An attacker can trigger an infinite loop via process_connection() of Openwsman, in order to trigger a denial of service...
Openwsman: file reading via Working Directory Full Access
A local attacker can read a file via Working Directory Full Access of Openwsman, in order to obtain sensitive information...
SUSE: privilege escalation via YaST RMT Cheetah CLI Password
An attacker can bypass restrictions via YaST RMT Cheetah CLI Password of SUSE, in order to escalate his privileges...
libssh2: multiple vulnerabilities
An attacker can use several vulnerabilities of libssh2...
Python: information disclosure via Cookie Domain Check
An attacker can bypass access restrictions to data via Cookie Domain Check of Python, in order to obtain sensitive information...
cloud-init: privilege escalation via Azure Extra Authorized Keys
An attacker can bypass restrictions via Azure Extra Authorized Keys of cloud-init, in order to escalate his privileges...
libjpeg-turbo: out-of-bounds memory reading via get_8bit_row
An attacker can force a read at an invalid address via get_8bit_row() of libjpeg-turbo, in order to trigger a denial of service, or to obtain sensitive information...
SQLALchemy: SQL injection via group_by
An attacker can use a SQL injection via group_by of SQLALchemy, in order to read or alter data...
SQLALchemy: SQL injection via order_by
An attacker can use a SQL injection via order_by of SQLALchemy, in order to read or alter data...
PuTTY: five vulnerabilities
An attacker can use several vulnerabilities of PuTTY...
TeamPass: privilege escalation via Delete Permission
An attacker can bypass restrictions via Delete Permission of TeamPass, in order to escalate his privileges...
Joomla JEvents: multiple vulnerabilities
An attacker can use several vulnerabilities of Joomla JEvents...
Linux kernel: assertion error via xfs_aops.c
An attacker can force an assertion error via xfs_aops.c of the Linux kernel, in order to trigger a denial of service...
QEMU: information disclosure via SLiRP tcp_emu
A local attacker, inside a guest system, can read a memory fragment via SLiRP tcp_emu() of QEMU, in order to obtain sensitive information on the host system...
LIVE555 Streaming Media Library: out-of-bounds memory reading via parseAuthorizationHeader
An attacker can force a read at an invalid address via parseAuthorizationHeader() of LIVE555 Streaming Media Library, in order to trigger a denial of service, or to obtain sensitive information...
Debian python-rdflib-tools: code execution via Local Python Modules
An attacker can use a vulnerability via Local Python Modules of Debian python-rdflib-tools, in order to run code...
VMware Workstation: two vulnerabilities via VMX Process
An attacker can use several vulnerabilities via VMX Process of VMware Workstation...
libvirt: denial of service via Agent Events Waiting
An attacker, inside a guest system, can trigger a fatal error via Agent Events Waiting of libvirt, in order to trigger a denial of service on the host system...
IBM MQ: Cross Site Scripting via Console
An attacker can trigger a Cross Site Scripting via Console of IBM MQ, in order to run JavaScript code in the context of the web site...
Drupal Simple Hierarchical Select: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of Drupal Simple Hierarchical Select, in order to force the victim to perform operations...
Drupal Video: code execution
An attacker can use a vulnerability of Drupal Video, in order to run code...
Drupal Views: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Views, in order to run JavaScript code in the context of the web site...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 906 907 908 909 910 911 912 913 914 916 918 919 920 921 922 923 924 925 926 941 961 981 1001 1021 1041 1061 1081 1101 1116