The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Linux kernel: buffer overflow via parse_hid_report_descriptor
An attacker can trigger a buffer overflow via parse_hid_report_descriptor() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
WordPress Blog2Social: SQL injection
An attacker can use a SQL injection of WordPress Blog2Social, in order to read or alter data...
FortiOS: information disclosure via TCP Timestamp
An attacker can bypass access restrictions to data via TCP Timestamp of FortiOS, in order to obtain sensitive information...
FortiOS: privilege escalation via HTTP/HTTPS Traffic Injection
An attacker can bypass restrictions via HTTP/HTTPS Traffic Injection of FortiOS, in order to escalate his privileges...
ArcSight Logger: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of ArcSight Logger, in order to run JavaScript code in the context of the web site...
GNU patch: code execution via src/pch.c
An attacker can use a vulnerability via src/pch.c of GNU patch, in order to run code...
OpenBSD: denial of service via TCP SACK Holes Chains
An attacker can trigger a fatal error via TCP SACK Holes Chains of OpenBSD, in order to trigger a denial of service...
FreeBSD: use after free via UNIX-Domain Socket Rights Transmission
An attacker can force the usage of a freed memory area via UNIX-Domain Socket Rights Transmission of FreeBSD, in order to trigger a denial of service, and possibly to run code...
FreeBSD: out-of-bounds memory reading via bhyve pci_xhci_device_doorbell
An attacker can force a read at an invalid address via bhyve pci_xhci_device_doorbell() of FreeBSD, in order to trigger a denial of service, or to obtain sensitive information...
FreeBSD: read-write access via mqueuefs
An attacker can bypass access restrictions via mqueuefs of FreeBSD, in order to read or alter data...
FreeBSD: information disclosure via freebsd32_ioctl
A local attacker can read a memory fragment via freebsd32_ioctl of FreeBSD, in order to obtain sensitive information...
FreeBSD: use after free via posix_openpt
An attacker can force the usage of a freed memory area via posix_openpt() of FreeBSD, in order to trigger a denial of service, and possibly to run code...
Drupal Existing Values Autocomplete Widget: information disclosure
An attacker can bypass access restrictions to data of Drupal Existing Values Autocomplete Widget, in order to obtain sensitive information...
Drupal Facebook Messenger Customer Chat Plugin: privilege escalation
An attacker can bypass restrictions of Drupal Facebook Messenger Customer Chat Plugin, in order to escalate his privileges...
Drupal Metatag: information disclosure
An attacker can bypass access restrictions to data of Drupal Metatag, in order to obtain sensitive information...
Node.js console-feed: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Node.js console-feed, in order to run JavaScript code in the context of the web site...
Node.js otpauth: privilege escalation
An attacker can bypass restrictions of Node.js otpauth, in order to escalate his privileges...
Protocole NTP: denial of service via Port 123 Off-path Attacks
An attacker can trigger a fatal error via Port 123 Off-path Attacks of Protocole NTP, in order to trigger a denial of service...
HAProxy: denial of service via htx_manage_client_side_cookies
An attacker can trigger a fatal error via htx_manage_client_side_cookies() of HAProxy, in order to trigger a denial of service...
WordPress GoUrl Bitcoin Payment Gateway: file upload
An attacker can upload a malicious file on WordPress GoUrl Bitcoin Payment Gateway, in order for example to upload a Trojan...
Truecrypt, VeraCrypt: buffer overflow via veracrypt.sys
An attacker can trigger a buffer overflow via veracrypt.sys of Truecrypt, in order to trigger a denial of service, and possibly to run code...
libsass: three vulnerabilities
An attacker can use several vulnerabilities of libsass...
libsass: multiple vulnerabilities
An attacker can use several vulnerabilities of libsass...
Slurm: SQL injection
An attacker can use a SQL injection of Slurm, in order to read or alter data...
Linux kernel: buffer overflow via uvc_parse_standard_control
An attacker can trigger a buffer overflow via uvc_parse_standard_control() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
FortiOS on IPS Engine: information disclosure via SSL Deep Inspection Padding Oracle
An attacker can bypass access restrictions to data via SSL Deep Inspection Padding Oracle of FortiOS on IPS Engine, in order to obtain sensitive information...
IBM QRadar SIEM: read-write access via Incorrect Permission
An attacker can bypass access restrictions via Incorrect Permission of IBM QRadar SIEM, in order to read or alter data...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 943 944 945 946 947 948 949 950 951 953 955 956 957 958 959 960 961 962 963 981 1001 1020