The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Node.js graphql-code-generator: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on Node.js graphql-code-generator, in order to read or write data in the session...
Red Hat JBoss Enterprise Application Platform, WildFly: privilege escalation via ElytronManagedThread
An attacker can bypass restrictions via ElytronManagedThread of Red Hat JBoss Enterprise Application Platform, in order to escalate his privileges...
WildFly: privilege escalation via PID File
An attacker can bypass restrictions via PID File of WildFly, in order to escalate his privileges...
bubblewrap: file corruption
A local attacker can create a symbolic link, in order to alter the pointed file, with privileges of bubblewrap...
LibreCAD: denial of service
An attacker can trigger a fatal error of LibreCAD, in order to trigger a denial of service...
phpBB3: denial of service via recherche
An attacker can trigger a fatal error via recherche of phpBB3, in order to trigger a denial of service...
Windows PowerShell: code execution
An attacker can spread a script the filename of which includes special characters, to make Windows PowerShell run it instead of the intended script...
Sonatype Nexus Repository Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Sonatype Nexus Repository Manager, in order to run JavaScript code in the context of the web site...
Cisco ASA: denial of service via WebVPN
An attacker can trigger a fatal error via WebVPN of Cisco ASA, in order to trigger a denial of service...
Novell Open Enterprise Server: Cross Site Scripting via Netstorage
An attacker can trigger a Cross Site Scripting via Netstorage of Novell Open Enterprise Server, in order to run JavaScript code in the context of the web site...
Linux kernel: denial of service via UDP
An attacker can send UDP packets without payload to the Linux kernel, in order to trigger a denial of service...
NetBSD: information disclosure via SIOCGIFCONF
A local attacker can read a memory fragment via SIOCGIFCONF of NetBSD, in order to obtain sensitive information...
NetBSD: memory corruption via mq_send
An attacker can trigger a memory corruption via mq_send() of NetBSD, in order to trigger a denial of service, and possibly to run code...
Gradle: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on Gradle, in order to read or write data in the session...
F5 BIG-IP: privilege escalation via tmsh
An attacker can bypass restrictions via tmsh of F5 BIG-IP, in order to escalate his privileges...
Google Chrome: four vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
F5 BIG-IP: privilege escalation via Resource Administrator Advanced Shell
An attacker can bypass restrictions via Resource Administrator Advanced Shell of F5 BIG-IP, in order to escalate his privileges...
F5 BIG-IP: privilege escalation via SFTP
A privileged attacker can bypass restrictions via SFTP of F5 BIG-IP, in order to escalate his privileges...
F5 BIG-IP: denial of service via HTTP/2 ALPN
An attacker can send malicious HTTP/2 ALPN packets to F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: information disclosure via SNMP
An attacker can bypass access restrictions to data via SNMP of F5 BIG-IP, in order to obtain sensitive information...
F5 BIG-IP: privilege escalation via tmsh
A privileged attacker can bypass restrictions via tmsh of F5 BIG-IP, in order to escalate his privileges...
F5 BIG-IP: privilege escalation
A privileged attacker can bypass restrictions of F5 BIG-IP, in order to escalate his privileges...
F5 BIG-IP: denial of service via PPTP
An attacker can send malicious PPTP packets to F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: denial of service via DNS
An attacker can send malicious DNS packets to F5 BIG-IP, in order to trigger a denial of service...
PHP: multiple vulnerabilities
An attacker can use several vulnerabilities of PHP...
Elasticsearch: information disclosure via Opt-out Query Cache
An attacker can bypass access restrictions to data via Opt-out Query Cache of Elasticsearch, in order to obtain sensitive information...
Microsoft Visual Studio: memory corruption via __asm Generated Code
An attacker can trigger a memory corruption via __asm Generated Code of Microsoft Visual Studio, in order to trigger a denial of service, and possibly to run code...
Cisco ASA: privilege escalation via VPN SAML Authentication Bypass
An attacker can bypass restrictions via VPN SAML Authentication Bypass of Cisco ASA, in order to escalate his privileges...
Cisco ASA: denial of service via VPN Session Manager
An attacker can trigger a fatal error via VPN Session Manager of Cisco ASA, in order to trigger a denial of service...
Cisco ASA: denial of service via IPsec
An attacker can trigger a fatal error via IPsec of Cisco ASA, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 922 923 924 925 926 927 928 929 931 933 934 935 936 937 938 939 940 941 961 981 1001 1012