The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
IBM Spectrum Protect Operations Center: information disclosure via Stack Trace Message
An attacker can bypass access restrictions to data via Stack Trace Message of IBM Spectrum Protect Operations Center, in order to obtain sensitive information...
QEMU: information disclosure via qemu-bridge-helper ACL Bypass
An attacker can bypass access restrictions to data via qemu-bridge-helper ACL Bypass of QEMU, in order to obtain sensitive information...
McAfee ePolicy Orchestrator: information disclosure via Plain Text Communication
An attacker can bypass access restrictions to data via Plain Text Communication of McAfee ePolicy Orchestrator, in order to obtain sensitive information...
FreeBSD: privilege escalation via cd ioctl
An attacker can bypass restrictions via cd ioctl of FreeBSD, in order to escalate his privileges...
FreeBSD: information disclosure via UFS/FFS
A local attacker can read a memory fragment via UFS/FFS of FreeBSD, in order to obtain sensitive information...
FreeBSD: buffer overflow via iconv
An attacker can trigger a buffer overflow via iconv of FreeBSD, in order to trigger a denial of service, and possibly to run code...
Google Android: multiple vulnerabilities of July 2019
An attacker can use several vulnerabilities of Google Android...
IBM Spectrum Protect Plus: two vulnerabilities
An attacker can use several vulnerabilities of IBM Spectrum Protect Plus...
IBM DB2: buffer overflow
An attacker can trigger a buffer overflow of IBM DB2, in order to trigger a denial of service, and possibly to run code...
Nessus: Cross Site Scripting via Feed Status Injection
An attacker can trigger a Cross Site Scripting via Feed Status Injection of Nessus, in order to run JavaScript code in the context of the web site...
Centreon: code execution via nagios_bin
An attacker can use a vulnerability via nagios_bin of Centreon, in order to run code...
WordPress Widget Logic: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress Widget Logic, in order to force the victim to perform operations...
Django: privilege escalation via Credentials Bypass
An attacker can bypass restrictions via Credentials Bypass of Django, in order to escalate his privileges...
GLPI: Cross Site Scripting via Rich Text / User Picture
An attacker can trigger a Cross Site Scripting via Rich Text / User Picture of GLPI, in order to run JavaScript code in the context of the web site...
F5 BIG-IP: multiple vulnerabilities
An attacker can use several vulnerabilities of F5 BIG-IP...
Symantec Endpoint Encryption, Symantec Encryption Desktop: privilege escalation
An attacker can bypass restrictions of Symantec Endpoint Encryption or Symantec Encryption Desktop, in order to escalate his privileges...
Node.js apostrophe: open redirect
An attacker can deceive the user of Node.js apostrophe, in order to redirect him to a malicious site...
gvfs: three vulnerabilities
An attacker can use several vulnerabilities of gvfs...
Dell EMC iDRAC6: buffer overflow
An attacker can trigger a buffer overflow of Dell EMC iDRAC6, in order to trigger a denial of service, and possibly to run code...
XnView: three vulnerabilities
An attacker can use several vulnerabilities of XnView...
Synology DSM Photo Station: two vulnerabilities
An attacker can use several vulnerabilities of Synology DSM Photo Station...
Irssi: use after free via SASL Login
An attacker can force the usage of a freed memory area via SASL Login of Irssi, in order to trigger a denial of service, and possibly to run code...
GraphicsMagick: memory leak via GMCommand
An attacker can create a memory leak via GMCommand() of GraphicsMagick, in order to trigger a denial of service...
GPAC: three vulnerabilities
An attacker can use several vulnerabilities of GPAC...
golang-googlecode-go-crypto: information disclosure via Salsa20 Counter Cycle
An attacker can bypass access restrictions to data via Salsa20 Counter Cycle of golang-googlecode-go-crypto, in order to obtain sensitive information...
Docker Engine/Moby: information disclosure via Symlink Exchange
An attacker can bypass access restrictions to data via Symlink Exchange of Docker Engine/Moby, in order to obtain sensitive information...
F5 BIG-IP: privilege escalation via TMOS Shell File Upload
An attacker can bypass restrictions via TMOS Shell File Upload of F5 BIG-IP, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 936 937 938 939 940 941 942 943 944 946 948 949 950 951 952 953 954 955 956 961 981 1001 1013