The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
IBM DB2: denial of service via Function
An attacker can trigger a fatal error via Function of IBM DB2, in order to trigger a denial of service...
IBM DB2: information disclosure via TLS 1.2 3DES
An attacker can bypass access restrictions to data via TLS 1.2 3DES of IBM DB2, in order to obtain sensitive information...
IBM DB2: denial of service via Diagnostic
An attacker can trigger a fatal error via Diagnostic of IBM DB2, in order to trigger a denial of service...
IBM DB2: buffer overflow
An attacker can trigger a buffer overflow of IBM DB2, in order to trigger a denial of service, and possibly to run code...
IBM DB2: privilege escalation via Fenced User
An attacker can bypass restrictions via Fenced User of IBM DB2, in order to escalate his privileges...
Xpdf: denial of service via PostScriptFunction-exec
An attacker can trigger a fatal error via PostScriptFunction::exec() of Xpdf, in order to trigger a denial of service...
Xpdf: denial of service via ImageStream-ImageStream
An attacker can trigger a fatal error via ImageStream::ImageStream() of Xpdf, in order to trigger a denial of service...
Xpdf: denial of service via PSOutputDev-checkPageSlice
An attacker can trigger a fatal error via PSOutputDev::checkPageSlice() of Xpdf, in order to trigger a denial of service...
Xpdf: denial of service via PostScriptFunction-exec
An attacker can trigger a fatal error via PostScriptFunction::exec() of Xpdf, in order to trigger a denial of service...
Node.js ionic/core: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Node.js ionic/core, in order to run JavaScript code in the context of the web site...
Check Point Gaia: privilege escalation via SMB 8 Characters Password
An attacker can bypass restrictions via SMB 8 Characters Password of Check Point Gaia, in order to escalate his privileges...
Linux kernel: NULL pointer dereference via nfc_genl_deactivate_target
An attacker can force a NULL pointer to be dereferenced via nfc_genl_deactivate_target() of the Linux kernel, in order to trigger a denial of service...
Expat: infinite loop via XML Names Large Colons
An attacker can trigger an infinite loop via XML Names Large Colons of Expat, in order to trigger a denial of service...
IBM WebSphere AS: information disclosure via Admin Console
An attacker can bypass access restrictions to data via Admin Console of IBM WebSphere AS, in order to obtain sensitive information...
Drupal Advanced Forum: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Advanced Forum, in order to run JavaScript code in the context of the web site...
Cisco Data Center Network Manager: information disclosure via Web Management Interface
An attacker can bypass access restrictions to data via Web Management Interface of Cisco Data Center Network Manager, in order to obtain sensitive information...
Cisco Data Center Network Manager: file reading via Web Management Interface
A local attacker can read a file via Web Management Interface of Cisco Data Center Network Manager, in order to obtain sensitive information...
Cisco Data Center Network Manager: file upload via Web Management Interface
An attacker can upload a malicious file via Web Management Interface on Cisco Data Center Network Manager, in order for example to upload a Trojan...
Cisco Data Center Network Manager: privilege escalation via Web Management Interface Session
An attacker can bypass restrictions via Web Management Interface of Cisco Data Center Network Manager, in order to escalate his privileges...
Node.js rpc-websocket: code execution via Malicious Package
An attacker can use a vulnerability via Malicious Package of Node.js rpc-websocket, in order to run code...
Tenable Nessus: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Tenable Nessus, in order to run JavaScript code in the context of the web site...
pfSense: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of pfSense, in order to run JavaScript code in the context of the web site...
IBM API Connect: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of IBM API Connect, in order to force the victim to perform operations...
Ubuntu: read-write access via Startup Disk Creator
An attacker can bypass access restrictions via Startup Disk Creator of Ubuntu, in order to read or alter data...
ImageMagick: memory leak via SVGKeyValuePairs
An attacker can create a memory leak via SVGKeyValuePairs() of ImageMagick, in order to trigger a denial of service...
ImageMagick: out-of-bounds memory reading via SVGStripString
An attacker can force a read at an invalid address via SVGStripString() of ImageMagick, in order to trigger a denial of service, or to obtain sensitive information...
ImageMagick: infinite loop via Tiny Input File
An attacker can trigger an infinite loop via Tiny Input File of ImageMagick, in order to trigger a denial of service...
ImageMagick: out-of-bounds memory reading via WriteTIFFImage
An attacker can force a read at an invalid address via WriteTIFFImage() of ImageMagick, in order to trigger a denial of service, or to obtain sensitive information...
ImageMagick: denial of service via format8BIM
An attacker can trigger a fatal error via format8BIM() of ImageMagick, in order to trigger a denial of service...
ImageMagick: denial of service via ReadTIFFImage
An attacker can trigger a fatal error via ReadTIFFImage() of ImageMagick, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 935 936 937 938 939 940 941 942 943 945 947 948 949 950 951 952 953 954 955 961 981 1001 1020