The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Magento: multiple vulnerabilities
An attacker can use several vulnerabilities of Magento...
Node.js sequelize: SQL injection
An attacker can use a SQL injection of Node.js sequelize, in order to read or alter data...
QEMU: code execution via QMP guest-exec
An attacker can use a vulnerability via QMP guest-exec of QEMU, in order to run code...
QEMU: code execution via QMP Migrate
An attacker can use a vulnerability via QMP Migrate of QEMU, in order to run code...
WordPress miniOrange SAML SP Single Sign On: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress miniOrange SAML SP Single Sign On, in order to run JavaScript code in the context of the web site...
TYPO3 Core: multiple vulnerabilities
An attacker can use several vulnerabilities of TYPO3 Core...
libmysofa: denial of service via Multiplications/Additions
An attacker can trigger a fatal error via Multiplications/Additions of libmysofa, in order to trigger a denial of service...
bzip2: buffer overflow via BZ2_decompress
An attacker can trigger a buffer overflow via BZ2_decompress() of bzip2, in order to trigger a denial of service, and possibly to run code...
Linux kernel: read-write access via PowerPC Processes Memory
An attacker can bypass access restrictions via PowerPC Processes Memory of the Linux kernel, in order to read or alter data...
GraphicsMagick: file reading via Rendered Text
A local attacker can read a file via Rendered Text of GraphicsMagick, in order to obtain sensitive information...
aubio: three vulnerabilities
An attacker can use several vulnerabilities of aubio...
WordPress Ultimate Member: privilege escalation via Password Reset
An attacker can bypass restrictions via Password Reset of WordPress Ultimate Member, in order to escalate his privileges...
web2py: four vulnerabilities
An attacker can use several vulnerabilities of web2py...
web2py: information disclosure via Denied Host Brute Force
An attacker can bypass access restrictions to data via Denied Host Brute Force of web2py, in order to obtain sensitive information...
jackson-databind: file reading via Polymorphic Typing JSON Message
A local attacker can read a file via Polymorphic Typing JSON Message of jackson-databind, in order to obtain sensitive information...
jackson-databind: file reading via Polymorphic Typing JSON Message
A local attacker can read a file via Polymorphic Typing JSON Message of jackson-databind, in order to obtain sensitive information...
curl for Windows: privilege escalation via OpenSSL Engine Loading
An attacker can bypass restrictions via OpenSSL Engine Loading of curl for Windows, in order to escalate his privileges...
PowerDNS: denial of service via NOTIFY Packets
An attacker can trigger a fatal error via NOTIFY Packets of PowerDNS, in order to trigger a denial of service...
PowerDNS: denial of service via MASTER Zone Records
An attacker can trigger a fatal error via MASTER Zone Records of PowerDNS, in order to trigger a denial of service...
Exempi: NULL pointer dereference via WEBP-GetLE32
An attacker can force a NULL pointer to be dereferenced via WEBP::GetLE32() of Exempi, in order to trigger a denial of service...
Sophos XG Firewall: three vulnerabilities
An attacker can use several vulnerabilities of Sophos XG Firewall...
Check Point Endpoint Security Client for Windows: executing DLL code
An attacker can create a malicious DLL, and then put it in the current directory of Check Point Endpoint Security Client for Windows, in order to execute code...
Check Point Endpoint Security Client for Windows: code execution via Unquoted Command
An attacker can use a vulnerability via Unquoted Command of Check Point Endpoint Security Client for Windows, in order to run code...
Python: information disclosure via Punycode/IDNA NFKC Normalization
An attacker can bypass access restrictions to data via Punycode/IDNA NFKC Normalization of Python, in order to obtain sensitive information...
libvirt: code execution via virConnectBaselineHypervisorCPU
An attacker can use a vulnerability via virConnectBaselineHypervisorCPU of libvirt, in order to run code...
libvirt: code execution via virConnectGetDomainCapabilities
An attacker can use a vulnerability via virConnectGetDomainCapabilities of libvirt, in order to run code...
libvirt: information disclosure via virDomainManagedSaveDefineXML
An attacker can bypass access restrictions to data via virDomainManagedSaveDefineXML of libvirt, in order to obtain sensitive information...
libvirt: code execution via virDomainSaveImageGetXMLDesc
An attacker can use a vulnerability via virDomainSaveImageGetXMLDesc of libvirt, in order to run code...
McAfee: read-write access via Process Reimaging
An attacker can bypass access restrictions via Process Reimaging of McAfee, in order to read or alter data...
Firefox/Thunderbird: privilege escalation via Prompt-Open Sandbox Escape
An attacker can bypass restrictions via Prompt:Open Sandbox Escape of Firefox/Thunderbird, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 934 935 936 937 938 939 940 941 942 944 946 947 948 949 950 951 952 953 954 961 981 1001 1020